ISVs and Future Proofing Your Payment Integration

ISV Payment Integration Proofing

When a consumer walks into a store, or browses an online ecommerce site, very little thought is given over to the “paying” part until the time comes. At that moment, a fast and convenient point-of-sale or checkout experience helps create a positive memory, raising the loyalty factor a little bit. But a less-than-ideal transaction, caused by long lines, a failed tap, or a shopping cart page that crashes and burns, steers the shopper to the competition. No one has time to wait for a reboot or to listen to apologies.

ISV payment lineups

This attitude pervades the B2C retail world, but it is also happening in B2B, as buyers build their expectations towards seamless, location independent transactions. In both situations, the expectation and the requirement are that the payment system be up-to-date. For that to happen, the merchant and its ISV must be future-proof.

What’s the best way to future-proof something as complex as payment integration? The past few years have posed a challenge to ISVs faced with integrating payments to their software solutions. Issues around security, compliance, and certifications change constantly, and at the same time, customers expect ever faster and more convenient secure transactions. Any deployments done in haste run the risk of data loss, fraud, and costly errors.

But there’s another problem that tugs at every ISV’s mind: The future isn’t what it used to be. New developments, technologies, trends, and policies arrive extremely quickly, and the stakes have become much higher. In the recent past, B2B suppliers could draw up and follow a multi-month or even multi-year plan, and then convert that into a service relationship. But now, they and their clients must deal with change on an almost daily basis. Data has become the prime commodity – more valuable than money, and thieves operate 24/7 to try to steal from, and damage the system.

The As-a-Service Solution

The solution to the threats posed by constant change in the digital era comes from establishing relationships with cloud-based suppliers who themselves have transitioned into the as-a-service model. At its core, this model speaks to a philosophy of constant, proactive maintenance and a transition from hard goods to “services and upgrades.

Examples of this approach sit right in front of most peoples’ faces daily. Computers, tablets, and smartphones no longer require a customer to purchase boxed software. Every element of its functionality, from the operating system to any specific app, is downloaded – and more importantly, upgraded – invisibly and continually by the developer.

Other, non-traditional businesses have followed suit. Manufacturers of heavy items, such as cars, bulldozers, washing machines, and MRI scanners now realize greater revenue and customer retention by offering their product through the as-a-service model, using internet connectivity to do diagnostics, collect data, and proactively maintain the item. This approach activity, paired with the sale of services like training, aftermarket supplies and consulting, makes it unnecessary to actually sell the item. It can be loaned to a customer, with greater, longer-term revenue streams coming from those services.

For the end customers, this is future-proofing. Their investment in the machine – car, bulldozer, washer, or MRI – is now insured against failure and obsolescence through a permanent online relationship with a cloud-based manufacturer or intermediary.

ON the IT side, companies wary of data breaches, ransomware, DDoS attacks and similar events, recognize the value of pairing their internal IT staff with external, cloud-based security and data analytics companies, whose responsibility it is to stay up-to-date with every new threat and development in a way that no individual company could afford to do.

ISVs can Future Proof, Too

For ISVs, the situation is similar. As policies and protocols around PCI compliance and EMV network certifications evolve, and as new customer-facing payment options emerge, there is simply too much to keep track of reliably. Any prior bad experiences with payment processors and credit card companies will make them reluctant to move forward in a timely fashion, resulting in dangerous inertia.

Let’s say an ISV integrates to payment processor A, which works with device 1, the best mag stripe reader on the market. Then EMV comes out and the ISV needs a device with a chip reader for EMV. However, Processor A doesn’t support any chip readers. Now the ISV must start over with a different processor and a different device, and write a new integration.

Now imagine Processor B. Processor B has a cloud model that supports multiple devices. The ISV integrates to processor B, which gives it access to multiple devices. When EMV comes around, processor B adds new device 2 with a chip reader. The ISV can use device 2 with a few configuration changes – with the same integration. Now that’s future proof.

With an as-a-service relationship, it becomes the responsibility of the cloud-based supplier to ensure that every facet is taken care of, tested, delivered, and installed in a way that ensures that the ISV and its clients remain satisfied and safe. At present, this includes managing the latest in payments and security technology like Quick Chip for EMV, tokenization, and encryption (P2PE).

Not only is this essential on the customer-facing side, non-compliance can lead to harsh punishments from credit card companies and regulators.

Future proofing is not an option for retailers or B2B suppliers. It remains a perpetual top-drawer issue that demands attention, awareness and swift action from decision makers and stakeholders at all levels of an organization. It simply must be done.

To learn more about futureproofing your payment integration, visit our sponsor

By Steve Prentice

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website


Cloud Proofing Future Business Challenges

Cloud Proofing Future Business Challenges

Coping with Cloud Challenges Hardly a week goes by without coming across news around the increase in the number of ...
Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

2018 Augmented Reality If you’ve never heard of “Pokémon Go” — or at least never had the concept explained to ...
Protect Against Network Failures

Five Things Organizations Can Do To Protect Against Network Failures

Protect Against Network Failures It is no surprise that whenever there is an outage in a public or private cloud, ...
Four Cloud Security Mega Trends

Four Cloud Security Mega Trends

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid ...
5 Data Security Tips Small Businesses Should Mimic

5 Data Security Tips Small Businesses Should Mimic

Data Security Tips As more and more companies begin to switch to the cloud, cyber attacks need to be a ...
Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive ...


Rackspace Extends Managed Security to Google Cloud Platform

Rackspace Extends Managed Security to Google Cloud Platform

SAN ANTONIO, March 21, 2018 (GLOBE NEWSWIRE) -- Rackspace® announced today that Managed Security and Compliance Assistance for Google Cloud Platform (GCP) is now available for preview to new and existing customers that use Rackspace Managed Services for GCP ...
Google classroom

Helping G Suite customers stay secure with new proactive phishing protections and management controls

Security tools are only effective at stopping threats if they are deployed and managed at scale, but getting everyone in your organization to adopt these tools ultimately hinges on how easy they are to use ...
Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018

Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018

By 2021, Regulatory Compliance Will Become the Prime Influencer for IoT Security Uptake Internet of Things (IoT)-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 percent of organizations ...
BMW raises R&D spending for electric, autonomous cars

BMW raises R&D spending for electric, autonomous cars

Munich (Reuters) - German carmaker BMW (BMWG.DE) will increase research and development (R&D) spending to an all-time high of up to 7 billion euros ($8.6 billion) this year as part of efforts to bring 25 ...
Providers Benchmark Report: Cloud Spectator Releases Annual Top 10 Cloud IaaS

Providers Benchmark Report: Cloud Spectator Releases Annual Top 10 Cloud IaaS

Significant differences persist with price-performance across Public Clouds BOSTON, MA, March 20, 2018 — Cloud Spectator, the industry’s leading benchmarking and cloud consulting firm, today released its 2018 Top 10 Cloud IaaS Price-Performance Benchmark Report ...
Where's Zuck? Facebook CEO silent as data harvesting scandal unfolds

Where’s Zuck? Facebook CEO silent as data harvesting scandal unfolds

Amid calls for investigation and a #DeleteFacebook campaign, company releases an official statement but its figurehead keeps quiet The chief executive of Facebook, Mark Zuckerberg, has remained silent over the more than 48 hours since ...