Vertical Industries  >   Financial Services Industry  >  

Credit Card Industry

RSS Feed    Add to Google    Add to My Yahoo!
Credit Card IndustryWhite Papers (View All Report Types)
 
4 Ways to Weave Security and Storage Into 1 Strategy
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: View this white paper to examine four key ways you can weave your storage and security into a single strategy through partitioning, encryption, role-based access and audit logging. Learn more about how you can protect your data, wherever it is stored.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI
sponsored by Netcordia
WHITE PAPER: This paper describes the ways that Netcordia's NetMRI can help you quickly achieve and maintain PCI DSS compliance across your network.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Netcordia

On Common Ground: Where Compliance and Data Protection Overlap
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, we first explore the landscape in which CISOs now work—the new standards and regulations they face, increased attacks from hackers, and a more complex IT environment that includes virtualized infrastructure and outsourcing.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Secure and Compliant Collaboration and Access
sponsored by IBM
WHITE PAPER: As part of its comprehensive security framework, IBM offers a broad, unified array of integrated access authorization and identity management solutions that enable organizations to secure their collaboration and access processes in alignment with their overall business needs.
Posted: 28 Oct 2009 | Published: 31 Mar 2008

IBM

PCI Compliance Best Practices and Common Misconceptions - IT Briefing
sponsored by Qualys, Inc.
WHITE PAPER: This expert IT briefing by SearchSecurity describes the Payment Card Industry (PCI) standard, covers the standard's 12 specific requirements and details the nuances involved with meeting PCI guidelines.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Qualys, Inc.

ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
sponsored by ThreatMetrix
WHITE PAPER: This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Data Encryption 101: A Pragmatic Approach to PCI Compliance
sponsored by Prime Factors, Inc.
WHITE PAPER: The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Prime Factors, Inc.

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement