ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Data Security Standard Research

  • PCI in the cloud: Compliance guide

    Sponsored by: TechTarget Security

    Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.

  • E-Book: Technical Guide on PCI

    Sponsored by: TechTarget Security

    TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.

  • E-Guide: PCI DSS 2011: Key themes to watch

    Sponsored by: TechTarget Security

    This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.

  • Non-compliance outweighs the cost of compliance

    Sponsored by: IBM

    Even though compliance has proven to be more of a chore for companies than a pleasant task, the facts show that when companies put the effort into complying, savings occur. Read this expert tip guide and discover why the cost of non-compliance is more than maintaining it.

  • Passing a PCI Audit: A Global Perspective on Security Payment Card Data

    Sponsored by: IBM

    SearchSecurity.com presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome.

  • Tokenization Buyer's Guide

    Sponsored by: Intel

    PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.

  • SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes

    Sponsored by: IBM

    This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.

  • Presentation Transcript: Has Your QSA Thrown You Under a Bus?

    Sponsored by: Dell SecureWorks

    After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.

  • Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council

    Sponsored by: Dell SecureWorks

    In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.

  • PCI-Compliant Cloud Reference Architecture

    Sponsored by: HyTrust

    Check out this resource to learn how Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS).

  • Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance

    Sponsored by: HyTrust

    2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.

  • Fraud Prevention and Detection for Credit and Debit Card Transactions

    Sponsored by: IBM

    Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.

  • Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization

    Sponsored by: HyTrust

    With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.

  • Presentation Transcript: ISACA PCI Compliance Symposium

    Sponsored by: Intel

    Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.

  • Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization

    Sponsored by: Intel

    Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.

  • Achieving PCI compliance with Dell SecureWorks' security services

    Sponsored by: DellEMC and Intel®

    It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.

  • The Complete Guide to Log and Event Management

    Sponsored by: Novell, Inc.

    This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.

  • ISACA PCI Compliance Symposium

    Sponsored by: Intel

    As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

  • Reducing PCI DSS Scope: The Gateway Approach

    Sponsored by: Intel

    This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.

  • E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage

    Sponsored by: IBM

    In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.

  • PCI-Compliant Cloud Reference Architecture

    Sponsored by: HyTrust

    This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.

  • Preparing an RFI for Virtualization and the PCI Data Security Standard

    Sponsored by: HyTrust

    This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS).

  • BRIO Restaurant Group, Inc. Case Study

    Sponsored by: SonicWALL

    Previously, some of BBRG's restaurant banquet rooms were wired for Internet connectivity, but management wanted to provide wireless so that more guests could get online. BBRG would be one of the first in their industry tier to offer wireless services. To assist with the solution, BBRG turned to their experienced service provider, Cerdant.

  • SonicWALL PCI Compliance Solution Brief

    Sponsored by: SonicWALL

    The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.

  • PCI DSS: Next-Generation Data Security, Storage and Integrity

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.