GPayments Blog

GPayments Blog


Recent Posts


Recent Comments


    Archives


    Categories


    Meta


    Navigation
    CategoryWhitepapers
    Featured

    Whitepapers

    Top 5 Online Payment Trends in 2017

    Posted on September 22, 2017.

    Online payment trends keep evolving as customers continue to favour more user-friendly solutions and solution-makers compete for market share by constantly trying to reinvent the next big thing. This paper will outline the top 5 trends that are shaping the future of card-not-present payment as we know it.

    Featured

    Whitepapers

    How will 3D Secure 2.0 affect Merchants, Payment Gateways, Banks and Cardholders

    Posted on July 5, 2017.

    3DS 2.0 is more than just an update of an old standard. It is designed with the intent to create a frictionless payment experience for cardholders. It will do this by facilitating a richer cardholder data exchange, allowing risk-based authentication by issuers for low risk transactions, instead of authentication challenges to the...

    Featured

    Whitepapers

    Card-Not-Present Authentication Standards in 2017

    Posted on April 13, 2017.

    Infographic Report: Global Authentication Protocols Used to Combat Fraud

    Featured

    Articles

    Two-Factor Authentication: An essential guide in the fight against Internet fraud

    Posted on February 18, 2006.

    GPayments releases two-factor authentication whitepaper which details important two-factor authentication concepts and solutions. It explores these concepts and implementation options for two-factor authentication and also outlines the importance of adopting solutions based on open standards. The paper provides essential information...

    Featured

    Whitepapers

    Two Factor Authentication: An Industry Wide Solution

    Posted on July 18, 2005.

    GPayments has released a white paper outlining a blueprint for an industry wide two factor authentication solution using it’s ActiveAccess authentication platform. The paper discusses the reasons for adoption of a two factor authentication solution, what are the problems associated with implementing such a solution and how many of...