ComputerWeekly.com Research Library

Powered by Bitpipe.com

Payment Card Industry Research

  • Fraud Prevention and Detection for Credit and Debit Card Transactions

    Sponsored by: IBM

    Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.

  • Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization

    Sponsored by: HyTrust

    With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.

  • E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage

    Sponsored by: IBM

    In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.

  • PCI-Compliant Cloud Reference Architecture

    Sponsored by: HyTrust

    This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.

  • Preparing an RFI for Virtualization and the PCI Data Security Standard

    Sponsored by: HyTrust

    This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS).

  • How retailers can manage customer data collection to decrease fraud

    Sponsored by: SonicWALL

    This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.

  • PCI DSS: Next-Generation Data Security, Storage and Integrity

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    Sponsored by: Veracode, Inc.

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • Knowledge is Power

    Sponsored by: IBM

    Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.

  • Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Sponsored by: Tripwire, Inc.

    Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity

    Sponsored by: Information Security Magazine

    The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.

  • PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements

    Sponsored by: IBM

    High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.

  • Five Challenges to Continuous PCI DSS Compliance

    Sponsored by: Tripwire, Inc.

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.

  • E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa

    Sponsored by: TechTarget Security

    Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.

  • Escaping PCI purgatory

    Sponsored by: IBM

    IBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.

  • LogRhythm and PCI Compliance

    Sponsored by: LogRhythm, Inc.

    LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.

  • Overcoming the Three Biggest PCI Challenges

    Sponsored by: Alert Logic

    PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM

    Sponsored by: Red Hat and JBoss

    In 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.

  • PCI Compliance Made Simple

    Sponsored by: Alert Logic

    Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.

  • Profiting from PCI Compliance

    Sponsored by: IBM

    This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.

  • PCI DSS Success: Archiving Compliance and Increasing Web Application Security

    Sponsored by: Citrix

    This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..

  • Cisco PCI Compliance Services

    Sponsored by: Cisco Systems, Inc.

    Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.

  • Protecting Credit Card Data: How to Achieve PCI Compliance

    Sponsored by: Motorola Solutions

    This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.