Business of Information Technology  >   Business Management  >   Financial Management  >  

Credit Card Payment Processing

RSS Feed    Add to Google    Add to My Yahoo!
Credit Card Payment ProcessingReports
 
Simple Steps to Prevent Data Theft
sponsored by HID
RESOURCE: This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Posted: 29 Jul 2014 | Published: 26 Jun 2014

HID

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Winning the PCI Compliance Battle
sponsored by Qualys, Inc.
WHITE PAPER: Learn about the payment card industry (PCI) including, participation and validation requirements, compliance requirements of PCI Data Security Standard, validation enforcement and the three important things to look for in a PCI network scanning service.
Posted: 19 Mar 2007 | Published: 01 Oct 2006

Qualys, Inc.

Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers
sponsored by Qualys
WHITE PAPER: The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Qualys

5 Steps to Automating Accounts Payable
sponsored by Kofax, Inc.
WHITE PAPER: This white paper proposes a 5-step approach to automate an accounts payable operation, describing the typical costs of processing invoices manually and the saving that can be achieved with each of the incremental steps.
Posted: 03 Feb 2009 | Published: 03 Feb 2009

Kofax, Inc.

Presentation Transcript: Enabling Total Spend Analysis in the Enterprise
sponsored by TIBCO Spotfire Division
PRESENTATION TRANSCRIPT: In this transcript of the webcast, TIBCO Spotfire's John Callan will discuss how you can perform Total Spend Analysis to help drive supplier consolidation, contract compliance and identify maverick spend in a user-friendly, visual analysis environment.
Posted: 04 Dec 2009 | Published: 04 Dec 2009

TIBCO Spotfire Division

Presentation Transcript: Optimizing Business Performance with Automated Accounts Payable Processing for your SAP System
sponsored by ReadSoft
PRESENTATION TRANSCRIPT: In this transcript food pioneer Rich Products shares the strategies that streamlined their payable processes, consolidated AP processing from 19 locations to one and saved them six figures in discounts.
Posted: 05 Nov 2009 | Published: 05 Nov 2009

ReadSoft

Integration case study: Reduce time and cost of payment services
sponsored by IBM
WHITE PAPER: Scotiabank needed the right solution to help its corporate customers manage the complexity of their payment processes. In this case study, learn how, like Scotiabank, you can successfully reduce the time and cost of providing enhanced payment services with the right integrated payments service.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Integrating Automated Cash Collection with SAP® Solutions
sponsored by Esker Inc.
WHITE PAPER: For many SAP customers, cash collection still involves manual delivery of documents. Learn how to increase the speed and accuracy of business information exchange, improving financial management and key performance indicators.
Posted: 09 Jul 2007 | Published: 01 Jul 2007

Esker Inc.

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement