Standards  >   Security Standards  >  

Payment Card Industry Data Security Standard

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PCI DSS, Payment Card Industry Standard, PCI Standard, PCI Data Security Standard
DEFINITION: The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information. The PCI DSS was created jointly in 2004 by four major credit-card companies: Visa, MasterCard, Discover and American Express.The PCI DSS specifies  … 
Definition continues below.
Payment Card Industry Data Security StandardReports
76 - 100 of 161 Matches Previous Page  | Next Page
E-Guide: PCI DSS 2011: Key themes to watch
sponsored by SearchSecurity.com
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Has Your QSA Let You Down?
sponsored by Dell SecureWorks
WHITE PAPER: This white paper details the different types of problems that organizations often face with their QSAs in the course of achieving PCI compliance. Learn how to recognize common problems before you hire a QSA who doesn't have your business' best interest in mind.
Posted: 09 May 2011 | Published: 04 May 2011

Dell SecureWorks

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Presentation Transcript: Has Your QSA Thrown You Under a Bus?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

PCI-Compliant Cloud Reference Architecture
sponsored by HyTrust
WHITE PAPER: Check out this resource to learn how Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS).
Posted: 13 Jul 2011 | Published: 13 Jul 2011

HyTrust

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
sponsored by HyTrust
CASE STUDY: With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

HyTrust

Presentation Transcript: ISACA PCI Compliance Symposium
sponsored by Intel
PRESENTATION TRANSCRIPT: Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
sponsored by Intel
PRESENTATION TRANSCRIPT: Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Achieving PCI compliance with Dell SecureWorks' security services
sponsored by Dell, Inc.
WHITE PAPER: It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

QSA Tokenization Broker Assessors Guide
sponsored by Intel
WHITE PAPER: Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel

Intel® Expressway Tokenization Broker Data Sheet
sponsored by Intel
DATA SHEET: This doument provides details on how organizations can reduce PCI DSS scope and lower costs, by leveraging Intel® Expressway Tokenization Broker to manage Primary Account Number (PAN) data. Tokenization Broker is offered in conjunction with our industry-leading Intel® Expressway Service Gateway.
Posted: 31 Mar 2011 | Published: 31 Mar 2011

Intel

E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage
sponsored by IBM
EGUIDE: In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

PCI-Compliant Cloud Reference Architecture
sponsored by HyTrust
WHITE PAPER: This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

HyTrust

Preparing an RFI for Virtualization and the PCI Data Security Standard
sponsored by HyTrust
WHITE PAPER: This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS).
Posted: 22 Mar 2011 | Published: 22 Mar 2011

HyTrust

BRIO Restaurant Group, Inc. Case Study
sponsored by SonicWALL
CASE STUDY: Previously, some of BBRG's restaurant banquet rooms were wired for Internet connectivity, but management wanted to provide wireless so that more guests could get online. BBRG would be one of the first in their industry tier to offer wireless services. To assist with the solution, BBRG turned to their experienced service provider, Cerdant.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

PCI Basics: What it Takes to Be Compliant
sponsored by Tripwire, Inc.
WHITE PAPER: This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Posted: 08 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers
sponsored by Qualys
WHITE PAPER: The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Qualys

PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

SearchSecurity.com
76 - 100 of 161 Matches Previous Page    2 3 4 5 6 7    Next Page
 
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD DEFINITION (continued): …  and elaborates on six major objectives.First, a secure network must be maintained in which transactions can be conducted. This requirement involves the use of firewalls that are robust enough to be effectivewithout causing undue inconvenience to cardholders or vendors. Specialized firewalls are available for wireless LANs, which are highly vulnerable to eavesdropping and attacks by malicious hackers. In addition, authentication data such as personal identification numbers (PINs) and passwords must not involve defaults supplied by the vendors. Customers should be able to conveniently and frequently … 
Payment Card Industry Data Security Standard definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement