RSS feed Get our RSS feed

News by Topic

pci compliance

Results 51 - 75 of 158Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : ibm, pci dss, compliance, security
     IBM
By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management
     IBM
By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : ibm mmdg, credit card security, pci compliance, secure network, cardholder data
     IBM
By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
     Secure Computing
By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
     Secure Computing
By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
     Secure Computing
By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox
     Axeda Corporation
By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft
     netForensics
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
     NeoSpire Managed Hosting
By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
     Tripwire, Inc
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
     Tripwire, Inc
By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
     NetIQ
By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc
     NetIQ
By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : it operations, information technology, audit, compliance, pci, governance
     ITinvolve
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : security
     CDW-Trend Micro
By: CradlePoint     Published Date: May 17, 2016
Cradlepoint Helps Quick Serve Restaurant Achieve Network Success The combined solution of Cradlepoint AER2100 devices and Cradlepoint Enterprise Cloud Manager (ECM) enables Raising Cane’s to intelligently manage their converged wired and wireless connectivity, utilize advanced security applications like IPS/IDS - all while enabling PCI compliance. This allows Severns and his team to centrally configure, monitor, and manage the Raising Cane’s network with ease.
Tags : 
     CradlePoint
By: GFI Software     Published Date: Feb 24, 2011
This white paper contains 12 PCI DSS requirements that have been organized into six (6) logically related groups.
Tags : gfi software, sunbelt, pci-dss compliance, data security, american express, discover financial services, jcb international, mastercard worldwide
     GFI Software
By: Globalscape     Published Date: Jun 27, 2014
Globalscape’s Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.
Tags : globalscape, enhanced file transfer, high security module, auditing, reporting, security practices, compliance, file transfer
     Globalscape
By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security
     Globalscape
By: Alert Logic     Published Date: Jun 12, 2014
Alert logic’s cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logic’s solutions and the unique benefits offered.
Tags : pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic
By: Alert Logic     Published Date: Jun 12, 2014
While e-commerce remains a relatively small percentage of overall retail spending (rates vary by country, but are generally in the 5–10% range), it continues to grow. The ongoing growth of e-commerce suggests that one of the initial objections to online shopping—concerns about whether consumer personal information would be secure—has been largely overcome. Standards like PCI, and payment services like PayPal, along with a general increase in security awareness, have gone a long way to change the perception of online shopping. Learn more about Information Security in the E-commerce Sector.
Tags : cloud security, cloud e-commerce, cloud pci, e-commerce security, compliance
     Alert Logic
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Rackspace
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, vulnerability life cycle, security
     Alert Logic and Rackspace
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
     Alert Logic and Rackspace
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics