Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

PCI Compliance

RSS Feed    Add to Google    Add to My Yahoo!
PCI Compliance Reports
 
PCI in the cloud: Compliance guide
sponsored by SearchSecurity.com
EGUIDE: Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.
Posted: 26 Apr 2012 | Published: 26 Apr 2012

SearchSecurity.com

Intel® Expressway Tokenization Broker Data Sheet
sponsored by Intel
DATA SHEET: This doument provides details on how organizations can reduce PCI DSS scope and lower costs, by leveraging Intel® Expressway Tokenization Broker to manage Primary Account Number (PAN) data. Tokenization Broker is offered in conjunction with our industry-leading Intel® Expressway Service Gateway.
Posted: 31 Mar 2011 | Published: 31 Mar 2011

Intel

Achieving PCI compliance with Dell SecureWorks' security services
sponsored by Dell, Inc.
WHITE PAPER: It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

Data Encryption 101: A Pragmatic Approach to PCI Compliance
sponsored by Prime Factors, Inc.
WHITE PAPER: The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Prime Factors, Inc.

QSA Tokenization Broker Assessors Guide
sponsored by Intel
WHITE PAPER: Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE: Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011

HP Enterprise Security

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

PCI DSS compliance 101
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

Mapping Security For Your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Information Security Ezine- Europe
sponsored by SearchSecurity.co.UK
EZINE: This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

SearchSecurity.co.UK
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement