Research Library

Powered by

Payment Card Industry Data Security Standard Compliance Research

  • Bluelock Virtual Datacenters Instrumental in Patronpath’s PCI-DSS Compliance in the Cloud

    Sponsored by: Bluelock

    One of the biggest challenges and concerns of businesses moving to the cloud is ensuring regulatory compliance and security. Discover how Patronpath, a company that processes and handles online credit card transactions for customers, increased scalability and decreased costs by adopting PCI-compliant cloud services.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: TechTarget Security

    This technical guide, brought to you by offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  • Three Steps to PCI Compliance in the Cloud

    Sponsored by: TechTarget Security

    PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.

  • PCI in the cloud: Compliance guide

    Sponsored by: TechTarget Security

    Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.

  • February Technical Guide on Cloud Compliance

    Sponsored by: TechTarget Security

    In this month’s Technical Guide from, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.

  • Non-compliance outweighs the cost of compliance

    Sponsored by: IBM

    Even though compliance has proven to be more of a chore for companies than a pleasant task, the facts show that when companies put the effort into complying, savings occur. Read this expert tip guide and discover why the cost of non-compliance is more than maintaining it.

  • Passing a PCI Audit: A Global Perspective on Security Payment Card Data

    Sponsored by: IBM presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome.

  • A Decision Maker's Guide to Log Management

    Sponsored by: HP Enterprise Security

    Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.

  • E-Book: Technical Guide on PCI

    Sponsored by: TechTarget Security

    TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.

  • E-Guide: Shortcut guide to Web application firewall deployment

    Sponsored by: TechTarget Security

    Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.

  • E-Guide: Using web application firewalls to ease compliance efforts

    Sponsored by: TechTarget Security

    When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.

  • E-Guide: Ease compliance efforts with a robust information security program Part 2

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • Tokenization Buyer's Guide

    Sponsored by: Intel

    PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.

  • E-Guide: Ease compliance efforts with a robust information security program

    Sponsored by: IBM

    This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

  • E-Guide: PCI DSS: Understanding key themes and assessment changes

    Sponsored by: IBM

    This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.

  • Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector

    Sponsored by: Dell SecureWorks

    Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget.

  • Presentation Transcript: Has Your QSA Thrown You Under a Bus?

    Sponsored by: Dell SecureWorks

    After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.

  • Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council

    Sponsored by: Dell SecureWorks

    In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.

  • Reducing PCI DSS Scope with the First Data® TransArmor® Solution

    Sponsored by: First Data Corporation

    Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.

  • How Security Can Help Grow Your Business: The Marketing Side of Tokenization

    Sponsored by: First Data Corporation

    Tokenization is more than a security measure and more than a cost savings technique. It can be used to build your business. This white paper discusses the ways tokens can be used in back-end business operations to develop powerful marketing programs.

  • Compliance and Cloud Security eBook

    Sponsored by: TechTarget Security presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.

  • PCI-Compliant Cloud Reference Architecture

    Sponsored by: HyTrust

    Check out this resource to learn how Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS).

  • Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance

    Sponsored by: HyTrust

    2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.

  • Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization

    Sponsored by: HyTrust

    With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.

  • Information Security Ezine- Europe

    Sponsored by: TechTarget 

    This e-zine presented by will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.