Vertical Industries  >   Financial Services Industry  >  

Payment Card Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Card Payment Industry, Credit Card Industry, PCI
DEFINITION: PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers. PAN truncation is used by point-of-sale (POS) terminals and has become nearly universal in recent years. In many jurisdictions, PAN truncation is mandated by the government. The intent is to prevent fraud  … 
Definition continues below.
Payment Card IndustryReports
1 - 25 of 122 Matches Previous Page  | Next Page
9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This white paper provides 9 strategies for retail security professionals to take control of their security posture and reduce the burden of achieving and maintaining PCI compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9, Inc.
WHITE PAPER: This informative white paper lists 10 ways to implement a stronger security strategy to protect your employees and customers from a costly data breach, while maintaining PCI compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection
sponsored by Bit9, Inc.
WHITE PAPER: This white paper defines potential compliance and security gaps; identifies the effect that these gaps can have on your organization; and explains how a positive security solution can close these gaps to ensure the security of servers and endpoints, as well as PCI DSS compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource details a simpler, more effective approach to compliance that aims to help your enterprise to meet Governance, Risk, and Compliance standards, while managing the systems, files, and user permissions that you need to meet the needs of your organization.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Bit9, Inc.

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This eBook defines potential compliance and security gaps; identifies what effect these gaps can have on your organization; and reveals how a positive solution can close these gaps to ensure the security of servers and endpoints, and help to ensure compliance with industry regulations.
Posted: 16 Dec 2014 | Published: 31 Jul 2014

Bit9, Inc.

A Positive Security Approach to PCI DSS 3.0 Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource sets out a roadmap to meeting the requirements of PCI DSS 3.0, helping you to break each step of the process down into manageable, easy-to-understand components.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9, Inc.
WHITE PAPER: This helpful white paper outlines 5 steps for reducing the complexity of PCI assessments, lowering administration costs, and accelerating the attainment of a compliant and secure environment.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

Understanding PCI Mobile Payment Processing Security Guidelines
sponsored by Delego
EGUIDE: Download this expert e-guide now to learn about the new Payment Card Industry Mobile Payment Acceptance Security Guidelines and how they will impact you.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Delego

3 Ways That Retailers Can Address POS Security Challenges
sponsored by Bit9, Inc.
VIDEO: In this short video, learn how to address evolving malware threats and meet PCI DSS 3.0 compliance requirements with a proactive approach to security.
Posted: 15 Dec 2014 | Premiered: 07 Nov 2014

Bit9, Inc.

Analysis of the 4 Acceptable PCI DSS Storage Methods
sponsored by Delego
WHITE PAPER: Continue on to this important whitepaper now to explore the pros and cons of the four acceptable storage methods as outlined by the PCI DSS.
Posted: 12 Dec 2014 | Published: 12 Dec 2013

Delego

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How to Build and Maintain a Secure Network
sponsored by Delego
WHITE PAPER: Download this informative whitepaper now for 12 chapters on how to navigate the PCI-DSS and stay in compliance while protecting your customer's information.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Delego

4 Best Practices for Building PCI DSS Compliant Networks
sponsored by SolarWinds, Inc.
WHITE PAPER: This white paper reveals four recommendations for building PCI DSS compliant networks to secure consumer's payment card data.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

SolarWinds, Inc.

PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

How Tenable Optimized Vulnerability Management for Crosskey Banking Solutions
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how Crosskey Banking Solutions worked with Tenable Network Security to reduce risk and ensure PCI DSS compliance.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Tenable Network Security

Delivering Compliance, Security and Operations Intelligence
sponsored by LogRhythm, Inc.
CASE STUDY: This exclusive case study explores the security solution a theater went with to protect the information of its customers and employees.
Posted: 06 Nov 2014 | Published: 14 Sep 2014

LogRhythm, Inc.

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Rosetta Stone Case Study: Improve Security and Compliance with Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores a threat management that can help you improve security and compliance.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Alert Logic

How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

Protect your SAP data environment with IBM InfoSphere Guardium
sponsored by IBM
BROCHURE: This white paper highlights a solution that allows you to build a database security platform that meets the challenges of the SAP data environment.
Posted: 06 Oct 2014 | Published: 31 Oct 2012

IBM

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

eGuide: Patching Vulnerabilities with Web Application Firewalls
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Singapore Land Transport Authority Leverages IBM Expertise to Minimize Traffic Congestion
sponsored by IBM
VIDEO: Find out how analytics and big data helped Singapore Land Transport Authority optimize their traffic control.
Posted: 10 Jul 2014 | Premiered: 31 Mar 2010

IBM
1 - 25 of 122 Matches Previous Page    1 2 3 4    Next Page
 
PAYMENT CARD INDUSTRY DEFINITION (continued): …  or identity theft in case a printed receipt is lost or carelessly discarded.Most credit card accounts are identified by a string of 16 numbers in four groups of four digits. When PAN truncation is used, only the last set of four digits appears on the printed receipt issued to the customer. The first three sets of four digits on the customer's receipt are replaced by wildcard characters, usually asterisks (*). The receipt contains enough relevant information so the buyer may, if necessary, identify the transaction at a later date. Such information can include the merchant's name and store location, … 
Payment Card Industry definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement