Vertical Industries  >   Financial Services Industry  >  

Payment Card Industry

RSS Feed   
ALSO CALLED: Card Payment Industry, Credit Card Industry, PCI
DEFINITION: PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers. PAN truncation is used by point-of-sale (POS) terminals and has become nearly universal in recent years. In many jurisdictions, PAN truncation is mandated by the government. The intent is to prevent fraud  … 

Payment Card Industry definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Payment Card Industry Reports
1 - 25 of 74 Matches Previous Page  |  Next Page
Achieving PCI Compliance with Alcide Kubernetes Security
sponsored by Alcide
WHITE PAPER: Download this white paper to learn how Alcide’s software solutions can help organizations combat the challenges of PCI compliance in a cloud native era.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Alcide

How PCI-Compliant SD-WAN Helps Retailers Effectively Boost Security
sponsored by Comcast Business
RESOURCE: In this blog, ensure your retail business is doing everything it can to secure its networks by looking at the types of attacks leading to data breaches and learning how an SD-WAN solution not only addresses the business needs associated with application device and network proliferation, but also enables more efficient and effective PCI compliance.
Posted: 07 Feb 2020 | Published: 10 Jan 2020

Comcast Business

Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

PCI Deep Dive Webinar: Software Security Framework to Replace PA-DSS
sponsored by Snyk
WEBCAST: Developing secure payment software can be tricky, especially when dealing with third-party components. PCI secure software frameworks offer clear procedures, tools, and recommendations for compliancy. In this webinar, four experts dive into how to ensure PCI compliance and protect your organization from vulnerabilities. Watch the webinar now.
Posted: 21 Jan 2020 | Premiered: Jan 21, 2020

Snyk

Gentek Global Secures Payment Systems with Application Shielding
sponsored by Intertrust
CASE STUDY: In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

Intertrust

Achieving Compliance and Reducing Risk
sponsored by Comforte AG
VIDEO: Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.
Posted: 13 Dec 2019 | Premiered: 13 Dec 2019

Comforte AG

3 Ways to Reduce PCI DSSv3.2 Audit Scope
sponsored by Comforte AG
RESOURCE: Discover a quick reference guide summarizing PCI requirements and common technologies deployed to meet the requirements
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Comforte AG

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Splunk

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

The Threat of Online Skimming to Payment Security
sponsored by Tala Security
RESOURCE: The emerging threat of online skimming presents a great threat to the payment security industry. In this blog, explore basic questions with PCI SSC Chief Technology Officer Troy Leach about a newly released bulletin by the PCI SSC on the topic of digital skimming and how to detect and prevent this dangerous threat.
Posted: 09 Aug 2019 | Published: 01 Aug 2019

Tala Security

Cloud Visibility Report
sponsored by FairWarning
RESEARCH CONTENT: As businesses leverage cloud computing as a central point of business, they have begun looking for security-centric ways to monitor how users are interacting with cloud applications. In this Cloud Visibility Report, learn how other organizations are proactively monitoring their cloud application to gain critical insights into application usage.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

FairWarning

Global Payments Technology Company Achieves PCI Compliance
sponsored by Comforte AG
CASE STUDY: An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Comforte AG

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by Comforte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Comforte AG

Thailand's Government Savings Bank
sponsored by Comforte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by Comforte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Payment Behaviour in Australia: May 2014 Findings
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!
Posted: 22 May 2014 | Published: 01 May 2014

Hewlett Packard Enterprise

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
sponsored by ThreatMetrix
WHITE PAPER: This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

DellEMC and Intel®

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.
1 - 25 of 74 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info