Business of Information Technology  >   Business Environment  >   Financing  >  

Bank Credit Cards

RSS Feed    Add to Google    Add to My Yahoo!
Bank Credit Cards Reports
 
E-Guide: PCI DSS 2011: Key themes to watch
sponsored by SearchSecurity.com
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

Toward Active Management of Counterparty Credit Risk with CVA
sponsored by IBM
WHITE PAPER: To support this new and rapidly developing trading function, organizations must invest in flexible systems that can adapt to incorporate CCR best practices.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

IBM

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Log Management Best Practices: Six Tips for Success
sponsored by Novell, Inc.
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

Novell, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications
sponsored by Paymetric, Inc.
WHITE PAPER: Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.
Posted: 22 Jan 2008 | Published: 01 Jan 2008

Paymetric, Inc.

PCI Compliance Best Practices and Common Misconceptions - IT Briefing
sponsored by Qualys, Inc.
WHITE PAPER: This expert IT briefing by SearchSecurity describes the Payment Card Industry (PCI) standard, covers the standard's 12 specific requirements and details the nuances involved with meeting PCI guidelines.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Qualys, Inc.

Achieving PCI compliance with Dell SecureWorks' security services
sponsored by Dell, Inc.
WHITE PAPER: It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

How Can Security Management Technologies Help Me with PCI Compliance?
sponsored by CA Technologies.
WHITE PAPER: Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure.
Posted: 02 Mar 2010 | Published: 11 Aug 2009

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement