You have left Costco's site and are now subject to the privacy policy of the company that hosts this site. Review privacy policy.

alt

Sales

Monday - Friday

9:00 AM - 8:00 PM EST

1-866-325-3281

alt

Customer Service

Available 24/7

1-866-508-5856

Let our team help you choose the payment solution that is best for you.

*Required fields

Form Ends
alt

Thank you for your submission!

Thank you for getting in touch. We will be in contact with you within 48 hours.

Close

alt

Sales

Monday - Friday

9:00 AM - 8:00 PM EST

1-866-325-3281

alt

Customer Service

Available 24/7

1-866-508-5856

Form Ends
alt

Sales

Monday - Friday

9:00 AM - 8:00 PM EST

1-866-325-3281

alt

Customer Service

Available 24/7

1-866-508-5856

Form Ends
phone icon
866-325-3281

Sales Monday-Friday

phone icon
866-508-5856

Customer Service 24/7

Secure Payments Data Protected with Elavon's Security and PCI Compliance

Validate accepted payment cards

Fraud mitigation begins with ensuring your customer is the actual cardholder. Validate accepted cards with our advanced payment authentication technology.

Credit Card Chip Supported by Elavon's Chip Card Acceptance

Reduce chargebacks

Reduce chargebacks by authenticating cards right at the point-of-sale. Whether you sell online or in-person, we ensure payment data is kept safe.

Elavon's Point-to-Point Encryption (P2PE) Protecting Payments Data

In-transit security

From your business to your data centre, protect in-transit funds with our point-to-point encryption (P2PE) technology, which disguises data to minimize the impact of a potential security breach.

Encryption and tokenization image

Nothing to find, nothing to steal.

Through the use of encryption and tokenization, our payments security solutions protect card data during all phases of the payment process. With our hardware-based, tamper resistant security modules, encryption protects the card data until it is decrypted at our secure data centre. In this process, tokenization replaces cardholder data with a unique token ID, removing it from the processing environment to ensure sensitive information is inaccessible should a breach occur.