ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Data Security Standard White Papers

  • Understanding Your PCI DSS Guidelines: Successes and Failures

    Sponsored by: TechTarget Security

    This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.

  • PCI compliance in the cloud: Can cloud service providers manage PCI?

    Sponsored by: TechTarget Security

    Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • Three Steps to PCI Compliance in the Cloud

    Sponsored by: TechTarget Security

    PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.

  • PCI in the cloud: Compliance guide

    Sponsored by: TechTarget Security

    Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Voltage Success Story: Envision Pharmaceutical Services

    Sponsored by: Voltage Security, Inc.

    This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • 5 Ways Hosting Providers Prepare Clients for PCI 3.0

    Sponsored by: INetU Inc.

    This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.

  • Leverage Security Intelligence for Retail

    Sponsored by: IBM

    This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.

  • PCI DSS compliance 101

    Sponsored by: DellEMC and Intel®

    This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: TechTarget Security

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Better Security Intelligence for the Finance Industry

    Sponsored by: IBM

    A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett Packard Enterprise

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

  • Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management

    Sponsored by: Lumension

    In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.

  • CORE Security and the Payment Card Industry Data Security Standard

    Sponsored by: Core Security Technologies

    This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • Strategies to Maintain PCI DSS Compliance

    Sponsored by: GeoTrust, Inc.

    This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.

  • Mobile NFC in Retail

    Sponsored by: TechTarget ComputerWeekly.com

    This report from the GSMA explains the opportunities for NFC Mobile communications in retail.

  • Solutions to Meet your PCI Compliance Needs

    Sponsored by: Hewlett Packard Enterprise

    Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • Bluelock Virtual Datacenters Instrumental in Patronpath’s PCI-DSS Compliance in the Cloud

    Sponsored by: Bluelock

    One of the biggest challenges and concerns of businesses moving to the cloud is ensuring regulatory compliance and security. Discover how Patronpath, a company that processes and handles online credit card transactions for customers, increased scalability and decreased costs by adopting PCI-compliant cloud services.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: TechTarget Security

    This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  • Non-compliance outweighs the cost of compliance

    Sponsored by: IBM

    Even though compliance has proven to be more of a chore for companies than a pleasant task, the facts show that when companies put the effort into complying, savings occur. Read this expert tip guide and discover why the cost of non-compliance is more than maintaining it.

  • Passing a PCI Audit: A Global Perspective on Security Payment Card Data

    Sponsored by: IBM

    SearchSecurity.com presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.