Vertical Industries  >   Financial Services Industry  >  

Payment Card Industry

RSS Feed   
ALSO CALLED: Card Payment Industry, Credit Card Industry, PCI
DEFINITION: PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers. PAN truncation is used by point-of-sale (POS) terminals and has become nearly universal in recent years. In many jurisdictions, PAN truncation is mandated by the government. The intent is to prevent fraud  … 

Payment Card Industry definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Payment Card Industry Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
Altr's Blockchain-Based Tokenization Provides Transformative Reduction of PCI Scope
sponsored by ALTR
PRODUCT OVERVIEW: Merchants and issuers across the payments space are working to reduce the amount of PCI-sensitive data they store and the number of systems that touch that data, but this can be difficult across legacy systems. In this resource, learn how ALTR Protect can easily integrate into existing infrastructure to ensure that any type of data is protected.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST: Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Metro Bank Case Study
sponsored by Forcepoint
CASE STUDY: Metro Bank was looking for a platform that would provide secure, off-site access to their Microsoft cloud applications. Metro Bank was introduced to Forcepoint CASB and immediately saw the potential to resolve their Office 365 security challenges. In this case study, learn about the benefits Metro Bank saw after implementing Forcepoint CASB.
Posted: 03 May 2019 | Published: 03 May 2019

Forcepoint

Astute Solutions: Minimizing PCI Scope While Securing Stored Sensitive Data
sponsored by Armor
CASE STUDY: Astute is a consumer-engagement software company. In the past, Astute's customers didn't need to store cardholder data. But as the demand for instant payments increased, it became clear that it was no longer avoidable. In this case study, learn why Astute decided to implement Armor's TokenEx platform to help protect sensitive data.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Armor

How to Protect Your Business from a Magecart Data Skimming Attack
sponsored by Instart
WHITE PAPER: Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.
Posted: 16 Apr 2019 | Published: 30 Apr 2019

Instart

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

PCI DSS as a Foundation
sponsored by comForte AG
WHITE PAPER: There are many risks to personal and cardholder data. However, the GDPR and PCI DSS provide a clear roadmap on how organizations can most effectively protect that data. In this white paper, learn how to take advantage of the overlap between GDPR and PCI DSS to improve your overall data security strategy.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

How Magecart Skimming Attacks Work
sponsored by Instart
RESOURCE: Online data and credit card skimming attacks have become a serious concern for ecommerce websites and web applications around the world. Data skimming attacks typically follow a well-established pattern. In this blog, learn about the 3 things hackers must do to be successful. Also learn how to best defend against skimming attacks.
Posted: 12 Apr 2019 | Published: 21 Mar 2019

Instart

Global Payments Technology Company Achieves PCI Compliance
sponsored by comForte AG
CASE STUDY: An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

comForte AG

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by comForte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

Thailand's Government Savings Bank
sponsored by comForte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Secure Your Business with Data Protection
sponsored by comForte AG
WHITE PAPER: Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets. In this white paper, learn about SecurDPS Enterprise which provides the technology to successfully protect any sensitive data. Explore the benefits of using SecurDPS Enterprise.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by comForte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Fighting ATO Attacks
sponsored by Riskified
WHITE PAPER: Online fraud is becoming more and more sophisticated, as cybercriminals try and keep a step ahead of fraud solutions and tools. In this white paper, learn how your organization can determine when and how to block bad users, notify customers of suspicious login attempts, and request additional verification.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

Riskified

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Data Protection and PCI Scope Reduction for Today's Businesses
sponsored by Micro Focus
WHITE PAPER: Tokenization is a method of data protection and audit scope reduction recommended by the PCI DSS Security Standards Council. However, merchants and service providers who have implemented it have encountered problems. In this white paper, learn about the SecureData platform with Secure Stateless Tokenization.
Posted: 30 Jan 2019 | Published: 30 Jun 2018

Micro Focus

The Ultimate B2B Payment Processing Hack: How to Lower Interchange Rates
sponsored by Preferred Payments
WHITE PAPER: B2B customers generally make purchases with corporate or commercial cards, which have a high interchange rate – a rate that can ultimately cost merchants thousands on single transactions. Click inside to find out a little-known B2B "hack" that can help prevent your business from eating high interchange rates – and that's easier than it seems.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Preferred Payments

Top 10 PCI DSS Compliance Pitfalls and How to Avoid Them
sponsored by AT&T Cybersecurity
RESOURCE: Download this white paper for the most common PCI DSS pitfalls, what you can do to avoid them, and how to maintain continuous compliance.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

AT&T Cybersecurity

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Payment Behaviour in Australia: May 2014 Findings
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: Learn where future investment in payment technologies will be required, and get insight into the state of consumer payments in Australia, with findings on payment method trends and changes in consumer spending behaviour. Learn about consumer attitudes toward payment methods, and the likely effect on the future of the payments system. And much more!
Posted: 22 May 2014 | Published: 01 May 2014

Hewlett Packard Enterprise

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
sponsored by ThreatMetrix
WHITE PAPER: This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement