sponsored by Intel
Posted:  19 May 2011
Published:  19 May 2011
Format:  PDF
Length:  14  Page(s)
Type:  Presentation Transcript
Language:  English

Access this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. Speakers demonstrate how security gateways offer effective alternatives to outsourced solutions that can be impacted by token migration and card processor lock-in concerns.

Learn how to address six key compliance areas with a single solution:

  • Tokenizing customers’ credit card data to reduce potential PCI scope.
  • Restricting access to privileged data to those with a business need to know.
  • Adopting application-level security proxy and firewalling capabilities.
  • Incorporating on-premise virus scanning to reduce the threat of malicious attachments.
  • Tracking, monitoring and logging authorization requests from merchants to card processors.
  • Maintaining auditable security policies in a single, hardened form-factor, allowing for future review and change control.

Compliance (Finance) | Credit Cards | Data Security | Payment Card Industry Data Security Standard | Payment Card Industry Data Security Standard Compliance | Security Management | Security Tokens

View All Resources sponsored by Intel

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement