Vertical Industries  >   Financial Services Industry  >  

Card Payment Industry

RSS Feed    Add to Google    Add to My Yahoo!
Card Payment IndustryReports
 
Understanding Your PCI DSS Guidelines: Successes and Failures
sponsored by SearchSecurity.com
EGUIDE: This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

SearchSecurity.com

PCI DSS Questions Answered: Solutions To Tough Compliance Problems
sponsored by Pwine Express
WHITE PAPER: In this expert Q&A, get expert answers to the compliance and security issues that are most affecting the payment card industry today.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Pwine Express

PCI DSS compliance 101
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

CradlePoint Enablers for PCI Compliant Systems
sponsored by CradlePoint
WHITE PAPER: Explore this informative paper that will help you better understand how to create and maintain a Payment Card Industry (PCI) compliant network. Read on to learn about PCI security standards, and what one player in the network connectivity market recommends for PCI compliance.
Posted: 16 Sep 2014 | Published: 08 Jan 2014

CradlePoint

Optimising your OmniPayments: Consumers, payments and the future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

ComputerWeekly.com

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing
sponsored by nCircle
WHITE PAPER: Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations.
Posted: 16 Mar 2009 | Published: 02 Mar 2009

nCircle

Solution Profile: PCI Compliance
sponsored by Third Brigade
PRODUCT LITERATURE: This comprehensive white paper shows you how to proactively protect customer account data and successfully achieve PCI compliance.
Posted: 18 Jun 2007 | Published: 30 Apr 2007

Third Brigade

Secure and Compliant Collaboration and Access
sponsored by IBM
WHITE PAPER: As part of its comprehensive security framework, IBM offers a broad, unified array of integrated access authorization and identity management solutions that enable organizations to secure their collaboration and access processes in alignment with their overall business needs.
Posted: 28 Oct 2009 | Published: 31 Mar 2008

IBM

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement