Payment Card Industry Research
-
Fraud Prevention and Detection for Credit and Debit Card Transactions
Sponsored by: IBMOver the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
-
Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
Sponsored by: HyTrustWith a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
-
E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage
Sponsored by: IBMIn this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.
-
PCI-Compliant Cloud Reference Architecture
Sponsored by: HyTrustThis document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.
-
Preparing an RFI for Virtualization and the PCI Data Security Standard
Sponsored by: HyTrustThis paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS).
-
How retailers can manage customer data collection to decrease fraud
Sponsored by: SonicWALLThis expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
-
PCI DSS: Next-Generation Data Security, Storage and Integrity
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
-
Basic Building Blocks: Preparing for PCI DSS 2.0
Sponsored by: Veracode, Inc.With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
Sponsored by: Tripwire, Inc.Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
-
Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
Sponsored by: Information Security MagazineThe industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
-
PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
Sponsored by: IBMHigh transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
-
Five Challenges to Continuous PCI DSS Compliance
Sponsored by: Tripwire, Inc.As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
-
Escaping PCI purgatory
Sponsored by: IBMIBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.
-
LogRhythm and PCI Compliance
Sponsored by: LogRhythm, Inc.LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
-
Overcoming the Three Biggest PCI Challenges
Sponsored by: Alert LogicPCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
-
The Best PCI Audit of Your Life
Sponsored by: LumensionThis white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
-
Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM
Sponsored by: Red Hat and JBossIn 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.
-
PCI Compliance Made Simple
Sponsored by: Alert LogicMajor data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
-
Profiting from PCI Compliance
Sponsored by: IBMThis paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
-
PCI DSS Success: Archiving Compliance and Increasing Web Application Security
Sponsored by: CitrixThis paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
-
Cisco PCI Compliance Services
Sponsored by: Cisco Systems, Inc.Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.