Payment Card Industry Data Security Standard Compliance Research
-
E-Guide: PCI DSS 2011: Key themes to watch
Sponsored by: TechTarget SecurityThis expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
-
E-Book: Technical Guide on Web Application Firewalls
Sponsored by: TechTarget SecurityWeb application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
-
Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
Sponsored by: HyTrustWith a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
-
Information Security Ezine- Europe
Sponsored by: TechTarget ComputerWeekly.comThis e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
-
Presentation Transcript: ISACA PCI Compliance Symposium
Sponsored by: IntelOrganizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
-
Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
Sponsored by: IntelRead this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
-
Achieving PCI compliance with Dell SecureWorks' security services
Sponsored by: DellEMC and Intel®It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
-
May Issue of Information Security Magazine: Data Protection: Going the Distance
Sponsored by: Information Security MagazineThis month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.
-
ISACA PCI Compliance Symposium
Sponsored by: IntelAs we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
-
Reducing PCI DSS Scope: The Gateway Approach
Sponsored by: IntelThis White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
-
E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage
Sponsored by: IBMIn this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.
-
PCI-Compliant Cloud Reference Architecture
Sponsored by: HyTrustThis document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.
-
Preparing an RFI for Virtualization and the PCI Data Security Standard
Sponsored by: HyTrustThis paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS).
-
Log Management Best Practices: Six Tips for Success
Sponsored by: Novell, Inc.The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
-
The Complete Guide to Log and Event Management
Sponsored by: Novell, Inc.This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
-
BGMX Retail Solutions Case Study
Sponsored by: SonicWALLBGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
-
SonicWALL PCI Compliance Solution Brief
Sponsored by: SonicWALLThe Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
-
Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
Sponsored by: Tripwire, Inc.This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
-
Five Challenges to Continuous PCI DSS Compliance
Sponsored by: Tripwire, Inc.As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
-
PCI DSS: Next-Generation Data Security, Storage and Integrity
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
-
E-Book: Smart Virtualization Decisions
Sponsored by: Dell, Inc. and Intel®This e-book provides a roadmap to virtualization success for CIOs and strategic IT. Topics include: how to align virtualization with business priorities, virtualization beyond the server has its rewards, maintaining compliance in virtual environments, and futureproofing your virtualization roadmap.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
How the Guardium Platform Helped Dell IT Simplify Enterprise Security
Sponsored by: Guardium, an IBM CompanySafeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
-
Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
Sponsored by: Tripwire, Inc.Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.