Scale in any cloud, premise, Kubernetes, orchestration
Security as standard, custom security easy to set up
A Host for any acquiring protocol: ISO8583, TLV, CSV, XML, JSON
Handle any switch, member bank or Institution with no code changes
Easy to integrate with HSMs, Fraud, other banks
Switch, route, log, convert on the fly any payments
Built to be Flexible, Customizable and Reliable
Customizable business logic with flexible configurable rules
A great Host for cards, balances, validation EMV, PIN, balance
Forward ISO8583 messages or settlement files to Interchanges
Incoming ISO8583 messages to custom debit systems, card management or Dispute Management
no installation
unpack and run
platform independent
very simple User Interface
server mode with no-UI
move to local, test mode
high TPS, low impact
small footprint
all memory run
no database required
console output
log to files as any message
generate XML, HTML logs
superb HTML reports, graphs
version control configuration
several configuration streams possible
in-house business logic updates
no delivery dependency
files, any encoding, even binary
TCP , Web Services, HTTP
CSV files storage
databases
API, PSD2
XML, JSON, ISO8583, ISO20022, SWIFT, TLV, CSV, SQL in the box
fully configurable
crazy flexible: insert ISO8583 in XML
crazy powerful: send ISO8583 to file
crazy conversion: ISO8583-XML-SQL
EMV, PIN, MAC, in the box
several cryptogram methods
several PIN block methods
any encryption standard
Based on the neaPay core Engine, with authorization scripts for cards, balance, limits and rules check, the neaPay Host has unrivalled speed for limited-resource servers. It runs on any platform where you have Java, and reads JavaScript authorization scripts that specify the logic to authorize transactions.
Use cards and message configuration from any input source, starting
from all databases compatible with Java, including custom binary
databases like HP NSK Enscribe and even just flat files. Configure
simple authorization rules in spreadsheets or use complex logic or
formatting in authorizations scripts.
Do not worry about
speed, all file-related configuration is loaded to memory, so it is
memory-to-memory fast.
Well, we promise it will. There has not been a single interface that we encountered which we could not implement. Also, we come up with a very cautious approach which will be tailored in such a way that you have nothing to loose.
Big&fast implementations involve a lot of risk, which we assess, share, and agree upon, in advance. Usually such projects require more people, more effort and more cost, so tell us about it.
Big or small, Authorization host systems can be set up for almost any system and requirements. starting from small simulated environments
Analysis of requirements
Free Proof of concept gurantees solution functionality
Estimate and divide into phases
Finalcial and contractual arrangements for Project and Bau
Fast Proof of Concept delivery for simple sceanrio
Immediate implementation of the most used scenarios
Iterative delivery of the agreed behaviour
Project go-live threshold acheived
Fast Proof of Concept delivery for simple sceanrio
Immediate implementation of the most used scenarios
Iterative delivery of the agreed behaviour
Project go-live threshold acheived
Long term support ensures that the delivered product and customizations are up to date with changing requirements,
up to date with technlogical updates, and of course, benefit from the newest upgrades
Remaining tasks can be scheduled during bau
Mandates, updates, extra requirements as in project
Iterative delivery of scope
During License Yearly subscription
Just license option with no support
Company license
No restrictions in instances or individuals
White label options available
Support requsts and incident management
Implementation of fixes, bugs, issues and extra features
Updates and upgrades to the newest product or features
Yearly schedule and release management
T
1. Directly from a user, in a secure environment, via an interactive UI or command prompt
2. From a pre-defined configuration file
3. Via commands from a web interface
1. Database data that is used by the Authorization system. This can be a file, a direct connection to the database, or other format
2. Card Data that needs to be sent to the card printing company, in a file or via a direct connection, like a database, web host, FTP
3. Other data, like pin printing or other cardholder information, which can be sent securely to another system ro just a file
Watch this deployment video before you download
Watch this test run video before your first run
Only Logged in users can download.
Register Sign inJava is required to run the product. Please follow this guide to Download/Check Java version
Convert ISO8583 to JSON XML SQL
ISO8583 Interface Handler
Convert ISO20022 to ISO8583 ...
Build ISO8583 from scratch
ISO8583 Router by criteria
Authorize cards and ledger
Acquiring host from devices
Generate and issue cards
ISO8583 HISO98 HISO87 simulator
ISO20022 & SWIFT simulator
POS protocols simulator
Web API tester Performance
Get a free quote, Ask for details
Get help
Try the software yourself
Download
Read Documentation and Start guides
Online Tools Overview