ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Data Security Standard Research

  • Your September Issue of Information Security Magazine– Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  • Knowledge is Power

    Sponsored by: IBM

    Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.

  • Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Sponsored by: Tripwire, Inc.

    Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity

    Sponsored by: Information Security Magazine

    The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.

  • E-Guide: Information Security Essential Guide to Compliance

    Sponsored by: Information Security Magazine

    Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  • E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa

    Sponsored by: TechTarget Security

    Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.

  • PCI Compliant Yesterday. Still Compliant Today?

    Sponsored by: Tripwire, Inc.

    This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.

  • Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops

    Sponsored by: Red Hat and JBoss

    The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.

  • Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance

    Sponsored by: Skybox Security

    PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.

  • Escaping PCI purgatory

    Sponsored by: IBM

    IBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.

  • Essential Guide to PCI DSS

    Sponsored by: Information Security Magazine

    This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • PCI Compliance Made Simple

    Sponsored by: Alert Logic

    Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.

  • Profiting from PCI Compliance

    Sponsored by: IBM

    This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.

  • Symantec IT Compliance Solution

    Sponsored by: Symantec Corporation

    Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.

  • Laws, regulations and compliance: Top tips for keeping your data under your control

    Sponsored by: Sophos

    This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

  • eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong

    Sponsored by: TechTarget ComputerWeekly.com 

    Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.

  • eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies

    Sponsored by: TechTarget Security

    Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.

  • PCI DSS Success: Archiving Compliance and Increasing Web Application Security

    Sponsored by: Citrix

    This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..

  • Expert Ebook: Mastering PCI

    Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

    This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.

  • Cisco PCI Compliance Services

    Sponsored by: Cisco Systems, Inc.

    Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.

  • Protecting Credit Card Data: How to Achieve PCI Compliance

    Sponsored by: Motorola Solutions

    This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.

  • Meeting the Payment Card Industry Data Security Standard

    Sponsored by: Prism Microsystems Inc.

    Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.

  • PCI Compliance Made Simple

    Sponsored by: Alert Logic

    This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1, discusses best practices to achieve PCI compliance, and identifies which of these requirements can be satisfied by Alert Logic.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.