cheap jerseys cheap mlb jerseys wholesale jerseys wholesale jerseys cheap jerseys cheap authentic jerseys cheap wholesale jerseys wholesale jerseys china
24X7 TELEPHONE SUPPORT  1-612-294-6602


    Edge Technologies - HomeEdge Technologies - SoftwareEdge Technologies - HardwareEdge Technologies - ServicesEdge Technologies - Mobile Applications    
  Gift Cards
  Printer Supplies
  Security Cameras 
System Configuration


Protecting cardholder data and your business from data security-related risks can be confusing and sometimes seems like a daunting task. However, following a checklist of basic recommended operating procedures can help you start reducing these risks today. Building and maintaining a secure environment is tied to two main areas ´┐? technology and processes. These two go hand-in-hand when protecting cardholder data. Technology involves the use of software, hardware and third-party services that help protect cardholder data from various threats. Process is a specific set of operating procedures used to implement and maintain protection.

There are many ways to deploy and configure the applications and infrastructure you have at your restaurant. This can affect the security at your site. Make sure and work with your application and service providers to ensure your site is implemented in the most secure manner possible.

Security does not represent a point in time. It´┐Żs continuously ongoing and you need to ensure that you have processes established to monitor the security of the data at your restaurant. You may want to engage a Qualified Security Assessor (QSA) and/or an Authorized Scanning Vendor (ASV) to help you fill out your PCI compliance and provide periodic scanning services to test the security of your infrastructure.

The following links dig deeper into each of the categories represented. The recommended operating procedures and tasks included in each category can help you enhance the security at your site, but will not guarantee that you are secure.


-   Network Configuration

-   Remote Access Configuration

 Windows /OS Configuration

-    User Management

 -   POS Configuration

-    Auditing

PCI Compliance


The Payment Card Industry Data Security Standard, commonly known as the PCI DSS, was created with the sole purpose of securing and protecting cardholder data. Complying with this standard is mandatory for any business that stores, processes or transmits payment cardholder data. Demonstrating PCI compliance goes well beyond simply having a PA-DSS validated payment processing application. Restaurants are directly responsible for ensuring that they meet ALL requirements of the PCI DSS standard and reporting their compliance status. To prove compliance, at the very least, restaurants are required to complete the PCI Self Assessment Questionnaire (SAQ) on an annual basis and engage an Approved Scanning Vendor (ASV) to perform quarterly security scans on their infrastructure.

The PCI Data Security Standard has six main goals with twelve associated requirements. Below is an overview of each of the six main goals.  Please refer back to the PCI Security Standards Council website: for a full outline of the PCI Data Security Standard.


-   Build and maintain a secure network

-   Protect cardholder data

 Maintain a vulnerability management program

-    Implement Strong Access Control Measures

 -   Regularly monitor and test networks

-    Maintain an information security policy


Sign up for our  News Letter
Full Name:
Company Name:
Email Address:


We Made It EASY!
Digital Dining Software is intuitive´┐Żeven training has been a made easier with on screen prompts to guide the server throughout.
We Made It FAST!
Speed at the POS is critical to a restaurant's success. When it comes to speed, we exceed the limit.
Payment of guest checks is the most important step in a transaction. Digital Dining provides accuracy and flexibility effortlessly.. leaving no room for errors.
    Copyright ´┐? 2012-2018 Edge Technologies, LLC. All trademarks are property of their legal owner.