ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Data Security Standard Research

  • Capsule8 for PCI Compliance

    Sponsored by: Capsule8

    As e-commerce becomes essential to the revenue stream of digital businesses, ensuring the PCI DSS compliance and securing cardholder data becomes increasingly critical. Download this solution brief and explore Capsule8’s Protect platform, designed to ensure security while easing PCI DSS compliance workload.

  • Industry and Financial Regulations: The Implications for Application Security

    Sponsored by: Veracode, Inc.

    Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.

  • How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience

    Sponsored by: DivvyCloud

    Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.

  • AudioCodes Case Study

    Sponsored by: AudioCodes

    PCI Pal’s unique requirements demanded an SBC solution that went beyond standard functionality. In this case study, learn how AudioCodes Mediant VE and CE SBCs running in AWS delivered a unique solution for protecting contact center customers’ sensitive credit card data in compliance with the requirements of PCI DSS.

  • Ensuring Cloud Security and Compliance in the Financial Services Industry

    Sponsored by: DivvyCloud

    In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.

  • How PCI-Compliant SD-WAN Helps Retailers Effectively Boost Security

    Sponsored by: Comcast Business

    In this blog, ensure your retail business is doing everything it can to secure its networks by looking at the types of attacks leading to data breaches and learning how an SD-WAN solution not only addresses the business needs associated with application device and network proliferation, but also enables more efficient and effective PCI compliance.

  • PCI Deep Dive Webinar: Software Security Framework to Replace PA-DSS

    Sponsored by: Snyk

    Developing secure payment software can be tricky, especially when dealing with third-party components. PCI secure software frameworks offer clear procedures, tools, and recommendations for compliancy. In this webinar, four experts dive into how to ensure PCI compliance and protect your organization from vulnerabilities. Watch the webinar now.

  • Achieving Compliance and Reducing Risk

    Sponsored by: Comforte AG

    Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.

  • 3 Ways to Reduce PCI DSSv3.2 Audit Scope

    Sponsored by: Comforte AG

    Discover a quick reference guide summarizing PCI requirements and common technologies deployed to meet the requirements

  • Global Payments Technology Company Achieves PCI Compliance

    Sponsored by: Comforte AG

    An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.

  • The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance

    Sponsored by: Comforte AG

    In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.

  • Thailand's Government Savings Bank

    Sponsored by: Comforte AG

    Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.

  • Leading Canadian Bank Achieves Compliance for Themselves and their Customers

    Sponsored by: Comforte AG

    To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.

  • Understanding Your PCI DSS Guidelines: Successes and Failures

    Sponsored by: SearchSecurity.com

    This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Voltage Success Story: Envision Pharmaceutical Services

    Sponsored by: Voltage Security, Inc.

    This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • 5 Ways Hosting Providers Prepare Clients for PCI 3.0

    Sponsored by: INetU Inc.

    This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.

  • Leverage Security Intelligence for Retail

    Sponsored by: IBM

    This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.

  • PCI DSS compliance 101

    Sponsored by: DellEMC and Intel®

    This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.

  • PCI 101: A Beginner’s Guide to PCI DSS Compliance

    Sponsored by: FireHost Inc.

    This webcast covers everything you need to know about the payment card industry data security standard.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Better Security Intelligence for the Finance Industry

    Sponsored by: IBM

    A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett Packard Enterprise

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.