SuperiorPayments
All insights
ResearchMay 11, 20267 min read

Choosing a Payment Gateway in 2026: A Merchant's Buyer's Guide

Gateways used to be plumbing. In 2026 they're product. We walk through the eight criteria that actually matter when a merchant picks (or replaces) a payment gateway — pricing structure, security tier, fraud defenses, authorization optimization, token portability, API compatibility, webhook reliability, and what really happens during a switch.

Five years ago a payment gateway was plumbing: the box your cart software called when a customer pressed "Pay". In 2026 it's product. The difference between a basic gateway and a modern one shows up directly on the chargeback line, the authorization-rate line, and in how much engineering time your team spends defending against things the gateway should have caught. For a merchant making the decision — or a finance team revisiting an old one — here's what actually matters and what doesn't.

1. The pricing structure (not just the headline rate)

Two gateways with the same per-transaction headline rate can cost wildly different amounts once the bill arrives. Things to look at on the merchant statement:

  • Monthly minimums.A "$0.10 per transaction" gateway with a $25 monthly minimum costs a small merchant $25/month regardless of volume.
  • Statement, batch, and authorization fees. Per-attempt charges (including declines) and per-batch settlement fees often dwarf the per-transaction line at low volumes.
  • PCI compliance fees. Some gateways pass PCI assessment fees through monthly; others bundle.
  • Add-ons that should be standard. Tokenization, fraud screening, recurring billing, account updaters, and 3DS routing are often priced as upcharges even when they're table stakes elsewhere.

The right exercise is to model your actual volume — auth attempts, declines, batches, and any add-ons you need — against each gateway's full fee schedule. Headline rates lie.

2. Security tier (and what the certifications mean)

Every reputable gateway is PCI-compliant. The meaningful distinction is between PCI Level 1 (the highest tier, required for processors handling over 6M card transactions/year and audited annually) and lower levels. Level 1 gives you a third-party-audited environment that moves PCI scope off your servers; lower-tier compliance can still leave you holding parts of the scope.

Look for: PCI DSS Level 1 attestation (not just "PCI compliant"), SOC 2 Type II reports available under NDA, and a vault architecture that means raw card data never traverses your systems. ISO 20022 settlement compatibility is increasingly relevant for B2B and faster-payment use cases.

3. Fraud defenses that come included

A gateway with no fraud screening forces you to bolt on a third-party vendor — Kount, Sift, Riskified, etc. — at per-transaction prices that add up fast. A modern gateway scores every authorization in-line, gives you both rule-based and ML-based defenses, and lets you tune them without leaving the gateway. The question for evaluation: "Is fraud detection included, or is it an add-on with its own per-transaction price?"

4. Authorization-rate engineering

Two gateways routing the same transaction can produce different approve/decline outcomes. The gap between a well-tuned gateway and a poorly-tuned one is routinely 4–8 percentage points on authorization rate, which translates directly to revenue. Things that drive the gap:

  • Multi-acquirer routing— the gateway can retry a soft decline on a second acquirer rather than giving up on the first "do not honor" response.
  • Network tokens — replacing a raw PAN with a Visa/Mastercard-network token lifts approval rates measurably on recurring and card-on-file transactions.
  • 3DS 2.x routing — knowing when to step up to 3DS for the liability shift vs. when to skip it to avoid friction. Frictionless 3DS adds approve-side confidence without a customer challenge.
  • Account updater enrollment— keeps card-on-file tokens current as customers' cards are reissued.

5. Token portability — both directions

Two questions worth asking before you commit:

  • Can you bring tokens in?If you have a vault at a previous gateway, can the new one ingest those tokens so your card-on-file customers don't have to re-enter cards?
  • Can you take tokens out?If you ever need to leave this gateway, will you get a token export? Locked-in tokens are the single biggest reason merchants stay on gateways they've outgrown.

The legal answer is that PCI rules require your processor to export tokens on request. The practical answer is that some gateways drag their feet for months. Ask the question on the evaluation call.

6. API compatibility (and the "rewrite tax")

If you've already integrated with Stripe, Square, Authorize.Net, or Braintree, switching gateways traditionally meant rewriting your integration. Modern gateways offerAPI translation — your existing API calls go to the new gateway, which translates them on the wire. That changes the math on a switch: instead of three months of engineering time, the cutover is configuration.

If you're newly integrating, the question is whether the gateway's native API is well-designed enough that you'd want to build on it directly. Things to look for: idempotency keys on writes, signed webhooks with retries, predictable error shapes, and SDK quality across the languages your stack uses.

7. Webhook reliability

Payment events that don't reach your application cause real damage — paid orders showing as unpaid, failed renewals that processed silently, refund states that diverge. A serious gateway treats webhooks as a first-class product:

  • Signed webhooks with verifiable secrets.
  • Automatic retries with exponential backoff on failures.
  • A dead-letter queue and a replay UI so you can re-deliver events after a downstream outage.
  • Idempotency tokens so duplicate retries don't cause double-processing.

8. What a switch actually costs

If you're evaluating a new gateway, scope the switch before you sign:

  • Engineering days for integration (zero if API translation is available).
  • Token migration timeline — typically 10–14 days from export request to live cutover.
  • Underwriting and onboarding — usually parallel with the token transfer, but can extend for complex structures.
  • Subscriber-impact testing— recurring billing flows post-migration. Don't skip this.

The honest answer most gateways won't give you up front: a switch is usually less painful than staying on a gateway that's costing you on chargebacks and auth rate. The cost of the migration is paid back inside a quarter for most mid-volume merchants.

How Superior Payments helps

Superior bundles fraud screening, automated chargeback rebuttal, network tokenization, account updaters, multi-acquirer routing, and Stripe / Square / Authorize.Net API translation into one price (0.5% + $0.10 per transaction, $50/month minimum). For a switching merchant, we'll quote the token-import timeline and cutover plan up front, in writing, before you sign anything.

Stay ahead of the changes.

Superior AI monitors the card networks for you and surfaces only what matters to your portfolio.