Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Payment Card Industry Data Security Standard Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PCI Compliance, Payment Card Industry Compliance
DEFINITION: Compliance regulation that helps protect customer credit and debit card information.
Payment Card Industry Data Security Standard ComplianceReports
1 - 25 of 200 Matches Previous Page  | Next Page
PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

When Worlds Collide: Cloud Apps and Financial Services
sponsored by BitGlass
WHITE PAPER: Read this white paper to learn how to tackle the two major hurdles that businesses must clear when moving financial data to public cloud applications: Security and compliance regulations.
Posted: 14 Nov 2014 | Published: 14 Nov 2014


How Tenable Optimized Vulnerability Management for Crosskey Banking Solutions
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how Crosskey Banking Solutions worked with Tenable Network Security to reduce risk and ensure PCI DSS compliance.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Tenable Network Security

Delivering Compliance, Security and Operations Intelligence
sponsored by LogRhythm, Inc.
CASE STUDY: This exclusive case study explores the security solution a theater went with to protect the information of its customers and employees.
Posted: 06 Nov 2014 | Published: 14 Sep 2014

LogRhythm, Inc.

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel® Services
WHITE PAPER: This white paper discusses how you can generate tokens that replace credit card numbers with surrogates, removing systems from PCI DSS "Scope"―which include any network components that are the primary focus of PCI DSS regulation, compliance, and assessment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

PCI DSS Tokenization Buyer’s Guide
sponsored by Intel® Services
WHITE PAPER: The guide describes how tokenization works, and how retailers and other businesses can deploy it to reduce risks of data compromise and the cost of PCI compliance.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Intel® Mashery™ API Gateway - Tokenization
sponsored by Intel® Services
WHITE PAPER: Intel® Mashery™ API Gateway - Tokenization is a hardware or software appliance that dramatically simplifies PCI DSS & PII compliance and administration for organizations across all industry types that accept, capture, store, transmit or process credit card, debit card, or sensitive personal data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Using PCI DSS Criteria for PII Protection
sponsored by Intel® Services
WHITE PAPER: This white paper describes how organizations can benefit from using PCI guidelines and solutions for PII data compliance, and also introduces a compliance and data protection gateway that helps organizations to achieve data protection for both PII and PCI data through data tokenization and format-preserving encryption.
Posted: 04 Nov 2014 | Published: 31 Jul 2014

Intel® Services

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Rosetta Stone Case Study: Improve Security and Compliance with Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores a threat management that can help you improve security and compliance.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Alert Logic

How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This whitepaper shares five important practices to follow in order to make sure data is properly secured and monitored in a PCI-DSS compliant fashion.
Posted: 10 Oct 2014 | Published: 10 Oct 2014


Retail Shopping Has Become More Personal, Relevant and Profitable
sponsored by Aerohive Networks
WHITE PAPER: This white paper reveals a strategy that defines a cloud-based approach to personalising the retail experience for every customer.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

Evolving Security Efforts to Meet PCI DSS v.3.0 Compliance Requirements
sponsored by CDW Corporation
WHITE PAPER: This white paper reveals the latest version of the payment card standard, which includes clarifications and new requirements that organizations must comply with by the end of 2014.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

Security Compliance:  A Common Thread
sponsored by CDW Corporation
RESOURCE: Access this infographic to discover how to properly secure your information and meet major compliance mandates for healthcare, finance and government data.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

4 Ways to Weave Security and Storage Into 1 Strategy
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: View this white paper to examine four key ways you can weave your storage and security into a single strategy through partitioning, encryption, role-based access and audit logging. Learn more about how you can protect your data, wherever it is stored.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

The Story Behind The PCI Data Security Standard 3.0
sponsored by CDW Corporation
WEBCAST: This webcast reveals how PCI DSS has changed and several ways to manage compliance.
Posted: 29 Sep 2014 | Premiered: May 30, 2014

CDW Corporation

Staying Compliant and Secure in the Cloud Era
sponsored by CipherCloud
WEBCAST: This webcast reveals what it takes to stay compliant and protected in the age of the cloud.
Posted: 22 Sep 2014 | Premiered: Mar 10, 2014

CipherCloud

Combining Security and the Cloud to Enhance Your Business
sponsored by GFI Cloud
EBOOK: This resource highlights the views of several tech influencers pertaining to security and the cloud. Each person provides valuable insight and explains how to implement them both into your business.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

GFI Cloud

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

eGuide: Patching Vulnerabilities with Web Application Firewalls
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Information Security in the E-Commerce Sector
sponsored by Alert Logic
WHITE PAPER: This resource looks at information security in the e-commerce sector, and how standards like PCI enforce the strong need to protect consumer personal information.
Posted: 18 Jun 2014 | Published: 28 Feb 2014

Alert Logic
1 - 25 of 200 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement