Standards  >   Security Standards  >  

PCI Data Security Standard

RSS Feed    Add to Google    Add to My Yahoo!
PCI Data Security StandardReports
 
Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
WHITE PAPER: Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

E-Guide: PCI DSS 2011: Key themes to watch
sponsored by SearchSecurity.com
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Three Steps to PCI Compliance in the Cloud
sponsored by SearchSecurity.com
EGUIDE: PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

SearchSecurity.com

BRIO Restaurant Group, Inc. Case Study
sponsored by SonicWALL
CASE STUDY: Previously, some of BBRG's restaurant banquet rooms were wired for Internet connectivity, but management wanted to provide wireless so that more guests could get online. BBRG would be one of the first in their industry tier to offer wireless services. To assist with the solution, BBRG turned to their experienced service provider, Cerdant.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

ArcSight Case Study: Experian
sponsored by ArcSight, an HP Company
CASE STUDY: Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.
Posted: 11 May 2010 | Published: 11 May 2010

ArcSight, an HP Company

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI
sponsored by Netcordia
WHITE PAPER: Many network monitoring products are easy to install and give you basic tools for managing your network, but achieving and maintaining compliance with the latest version of the PCI DSS requires a network solution that can manage unprecedented levels of change and complexity. Read this whitepaper to learn more about one such solution.
Posted: 17 Jul 2009 | Published: 17 Jul 2009

Netcordia

SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement