Using gRPC and WASM to Transform Data Inside Envoy Proxy
Envoy is a powerful open-source modern HTTP proxy server. It doesn't just serve as a proxy; it’s also a swiss army knife widely used in current cloud infrastructure, thanks to the extensible filter design. The best part of Envoy's filter is that you can define your own filtering, routing and transformation logic easily with Lua or WASM and plug them into the Envoy server to achieve things that cannot be done with the built-in filters.
Continue readingWhat is Tokenization – and How Does It Influence PCI DSS Compliance?
For years now, tokenization has been the hot topic in the payments industry. Around the world, millions of businesses are now using tokenization to help secure payment data, sensitive transactions, and information such as credit card numbers, bank account numbers, and personally identifiable information (PII).
Continue readingProactive System Monitoring with VGS Notifications
We’re excited to announce the launch of VGS Notifications to proactively inform customers about events in their live integration with VGS. The first delivery method we offer is via webhooks, which is one of the fastest ways to track events.
Continue readingVGS Zero Data™: A Warp Drive for Payment Data
Humans have not been to the Moon in fifty years, but the space race is hotter than ever. In 2012, the Voyager 1 spacecraft left our Solar System with a copy of Beethoven’s Fifth Symphony. In 2020, a Chinese lunar rover explored what lies beneath the Moon’s surface with ground-penetrating radar. Last week, Russia tested an anti-satellite weapon, which created so much debris that astronauts aboard the International Space Station prepared for possible evacuation. SpaceX CEO Elon Musk hopes to send humans to Mars by 2024.
Continue readingAnnouncing VGS Payment Orchestration: Bringing Harmony to Your Payments Environment
This morning, the VGS Team at Money 20/20 in Vegas officially launched VGS Payment Optimization to the market. The flagship feature of this suite of products is Payment Orchestration, which allows clients to integrate easily with - and then route transactions among - payment gateways and Payment Service Providers (PSPs). A single, low-code integration to the VGS platform lets you set custom routing logic to reduce costs and increase transaction throughput while aggregating and owning all your payments data.
Continue readingAnnouncing VGS Universal Checkout
An All-In-One Checkout Experience for Optimized Secure Payments
VGS has simplified security and compliance for hundreds of businesses in the payments industry, helping merchants collect payments data both faster and more securely with our data security platform and libraries like VGS Collect and VGS Show.
VGS Payment Optimization Releases Account Updater
What It Is & Why It Matters
Many of us can remember our introduction to the power of compound interest at a young age. Maybe it was a grade school math teacher narrating the rice and chessboard fable or an early financial literacy course scaring you into saving for retirement by quoting Einstein: “Compound interest is the eighth wonder of the world. He who understands it earns it … he who doesn't pays it.”
Gain Deeper Insights with VGS Observability
When something goes wrong and there isn’t a clear root cause, it can seem impossible to find, understand, and fix the problem. But now with VGS Observability, you can determine when, why, and how an atypical event happened.
Continue readingA Proven PenTest Methodology
Penetration Tests, an Introduction
When your business is online, the front door of your business is directly in front of every potential customer. Unfortunately, it’s just as easy for attackers, fraudsters, and anyone who wants to prey on you and your customers to be at your doorstep too. With carefully architected locks and controls, you can make sure that your door only opens for your customers.
Penetration tests, or pen tests, are a critical part of making sure your controls remain as strong as you think they are. Specifically, it is important that your pen tests are conducted by a skilled external firm. And this is true even if your organization has a competent internal security team – even in our case, with a competent and specialized internal security team to support our data security business.Continue reading
How Zero Data Reduces the Impact of Ransomware
The Challenge of Ransomware
The threat from ransomware, a type of malware that encrypts your files and holds them hostage for purposes of extortion, is currently rising. In 2020, there were 65,000 ransomware attacks reported in the United States. In the summer of 2021, two major ransomware attacks were even called threats to national security. Colonial Pipeline paid $5 Million in ransom after hackers successfully shut down part of its East Coast operations. JBS paid $11 million in ransom as cybercriminals disrupted its food supply operations to restaurants, grocery stores, and farmers.Continue reading
VGS + Web Application Firewall: Part 2
VGS + WAF = <3
“VGS + Web Application Firewall: Part 1” discussed the need for enterprises to invest in a Web Application Firewall, or WAF, as part of a defense-in-depth security strategy. This follow-up blog explores where to position your WAF, specifically in relation to your VGS proxy, so it can best protect your applications and enterprise. The goal is to educate and empower you to secure your systems against the widest possible array of vulnerabilities and attacks.
VGS + Web Application Firewall: Part 1
Today, web applications, or “web apps” for short, dominate the business landscape. They gather, store, and process the sensitive personal and financial data of millions of Internet users. We now spend the majority of our computing time in the cloud, accessing online services and resources, from e-mail to e-commerce, via our browser.
Continue readingHow to save time on building a PCI compliant solution on Android
Whether you are an owner of a payment channel, retail, or e-commerce platform, you need PCI compliance. In this article, we are going to explain to you some of the benefits of how to save time on building world-class, PCI compliant solutions on Android using one of our products - VGS Collect SDK.
Continue readingOptimizing App Clip Size in iOS
Learn how to optimize App Clip size in iOS.
Continue readingVGS Has a New Look
We've updated the look and feel of the Vault Dashboard and Documentation, including a new dark mode for Docs.
Continue readingVGS Developer's Guide
An overview of VGS developer tools and an example integration guide.
Continue readingDesigning Android Apps with Accessibility in Mind
Learn what application accessibility is, how you can design accessible android apps, and how to check if your app is sufficiently accessible to users with disabilities or impairments.
Continue readingHow to Build a Secure Android Mobile Application
Android was designed to be open and flexible and has made launching apps extremely accessible across the globe. This post describes some essential security tips that you can follow to make sure that your Android app is keeping your users’ data protected.
Continue readingPersonalization of the developer experience
Personalizing the developer experience is one way we’re making our product more accessible. Here’s how we did it.
Continue readingSecure Compute Part 4: Network Policies with Calico
Network security is a pillar of a secure compute platform, especially on multi-tenant clusters. In this blog, we will look into constraining network access of OpenFaaS functions and kubernetes pods to isolate them from each other as well as external services.
Continue readingSecure Compute Part 3: Serverless Functions with OpenFaaS
To simplify the experience of developing and packaging applications, we would like to make use of serverless functions. In this blog, we will demonstrate how we enhance this experience with OpenFaaS serverless functions, without compromising on security.
Continue readingSecure Compute Part 2: gVisor Runtime on EKS
In this post, we want to build a platform that can run containers securely on an Amazon Elastic Kubernetes Service (EKS) Cluster. The first component we will look at is integrating a secure container runtime. We will explore the gVisor sandboxed container runtime environment and how to integrate it with EKS.
Continue readingSecure Compute Part 1: A Secure Compute Solution
In an era engulfed by the collection, storage and analysis of sensitive information, data privacy and security are among the foremost challenges to be solved. In this blog series, we are primarily interested in how we can compute securely on sensitive data using untrusted code on multi-tenant systems.
Continue readingIntroducing VGS Satellite: Local Integration
VGS is disrupting the typical linear integration flow that most of us are used to.
What does that mean for you? Let’s take a few minutes to explore how you can now seamlessly integrate VGS without sharing any of your data. In a world where information is worth almost as much as gold, you need to be able to implicitly trust a system that will be responsible for your business-critical data. That’s why we created VGS Satellite.