Fortify secures electronic ticketing solutions against vulnerabilities

Parkeon is using Fortify Software's expertise to check its electronic ticketing solutions to ensure the software is secure and vulnerability free.

One of the world's largest parking and transport management solution providers that are present in 40 countries, Parkeon's ticketing systems and software were designed and built in-house. The company is using Fortify's software and expertise to ensure that when it goes to market, its systems meet the stringent compliancy standards and recent regulations such as PCI DSS and PADSS.

Parkeon has developed over 150 software systems, processes 550,000 payment transactions per month and centrally monitors 21,000 terminals.

It was therefore essential that at the very early stages of designing its latest electronic ticketing and transaction product the developers were building stringent and secure software, with code that was watertight, free of flaws and would prevent any future hacking incident or breaches.

Luc Porchon at Parkeon, said: “We have clients all around the world who currently use our products and the market has needed a reliable and secure payment system. We decided in order to provide one that we trusted and would be up to the demands and scrutiny that our clients required, we would need to design and build it in-house.

“With the latest compliancy regulations it was imperative from the very early stages that our software was secure and bug free. Using Fortify's expertise to test our software right at the code development stage for vulnerabilities and then removing those flaws has been essential in getting our product to market on time.” 

Gael Barrez, country manager for Fortify in France, said: “For the last three months we have been consulting with Parkeon to check and scrutinise their software to make sure that it gets through the stringent standards expected of the latest PCI DSS and PADSS standards.

“Our latest software can quickly and easily check all code at source to test for flaws and then seal any vulnerabilities which is what most common hackers are looking for in order to breach the system.”

Sign up to our newsletters