ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Research

  • How to Secure Retail’s Highly Distributed Environment and POS

    Sponsored by: Palo Alto Networks

    Discover how to secure retail's highly distributed environment and POS. Read on to arm yourself to combat brand/customer trust protection, PCI compliance, destructive malware, and more.

  • Making PCI Compliance Manageable

    Sponsored by: Unisys

    While organizations implement data encryption to comply with PCI security requirements, most struggle with an increasing scope to manage their CDE with evolving business requirements. Uncover ways to mitigate resultant compliance expenses by reducing your audit scope.

  • Lighting a Path to PCI Compliance

    Sponsored by: Illumio

    Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.

  • Improving payment Card Compliance

    Sponsored by: Verizon

    Learn how the bank was able to secure customer data in a cost-efficient manner by focusing on the most important applications. With ongoing consulting, the bank can maintain the strong PCI stance it has built and continue to earn customer trust while driving business growth.

  • Simplify Compliance while Reinforcing Data Security Best Practices

    Sponsored by: Unisys

    Learn more about the Payment Card Industry Data Security Standard (PCI DSS), and why your scope of it must be reduced. Access this resource so you can conceal communication endpoints, make them undetectable to all unauthorized parties, and more.

  • Setting new standards in cardholder data protection

    Sponsored by: Verizon

    Learn how CartaSi implemented powerful new vulnerability scanning and penetration testing capabilities into its security process, adding new layers of defense to its customer web portals. Get Broader enhancements to data protection with the ability to monitor security-related trends across multiple portals.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • Addressing PCI Compliance Through Privileged Access Management

    Sponsored by: CA Technologies

    Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.

  • Accelerate PCI DSS Compliance and Unify Your Defenses

    Sponsored by: AlienVault

    Relying on standalone products to help you meet PCI compliance requirements can be costly and time-consuming. Access this resource now and find out how you can unify your defenses, save time and money, and reduce the complexity of doing it yourself.

  • Defending against POS Malware

    Sponsored by: AlienVault

    This white paper takes a look at PoS security and some of the common types of malware used to exploit these systems. Access now to learn about the wide range of hardware and applications, including ubiquitous POS terminals in retail locations.

  • Point-of-Sale Security for Dummies

    Sponsored by: Carbon Black

    This e-book highlights the essential knowledge and requirements for keeping your POS in check. It shares with you the limitations of existing security controls and what you can do to ensure you have proper protection.

  • PCI Compliance: Risks that Financial Institutions can't Afford to Ignore

    Sponsored by: Unisys

    In this guide, you'll discover the steps to reducing the scope of audit while providing end-to-end data protection and reducing costs associated Payment Card Industry Data Security Standard (PCI DSS) compliance.

  • Automate PCI Compliance Monitoring, Investigation & Reporting

    Sponsored by: AccelOps Inc.

    This helpful white paper outlines the 12 PCI DSS requirements a compliance automation strategy needs to fulfill and explores what features to look for when selecting an approach.

  • How Do You Secure Financial Transaction Data Across Multiple Retail Locations?

    Sponsored by: Unisys

    In this white paper, learn how one major Brazilian supermarket chain closed network and access security vulnerabilities to become PCI DSS compliant. Read on and discover the benefits of micro-segmentation.

  • How to Simplify PCI DSS Compliance with AlienVault USM

    Sponsored by: AlienVault

    In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.

  • Internet Trust Marks: Building Confidence and Profit Online

    Sponsored by: Symantec Website Security Solutions

    This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

  • How to Stay Compliant with PCI DSS Standards

    Sponsored by: LogRhythm, Inc.

    This white paper explains how to ensure you meet the 6 standards of PCI compliance with reporting enabled by automatic log data categorization, identification, and normalization. Access this white paper to discover 12 guiding principles for compliance.

  • Addressing PCI Compliance

    Sponsored by: CA Technologies.

    Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.

  • Voltage Success Story: Envision Pharmaceutical Services

    Sponsored by: Voltage Security, Inc.

    This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.

  • Payment Behaviour in Australia: May 2014 Findings

    Sponsored by: Hewlett Packard Enterprise

    Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    Sponsored by: Symantec Corporation

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

  • 5 Ways Hosting Providers Prepare Clients for PCI 3.0

    Sponsored by: INetU Inc.

    This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.

  • ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage

    Sponsored by: ThreatMetrix

    This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.

  • Leverage Security Intelligence for Retail

    Sponsored by: IBM

    This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.