card

Results 326 - 350 of 454Sort Results By: Published Date | Title | Company Name

Safelite Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance

Hospital Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance

PCI Compliance: Are UK Businesses Ready?

Published By: Tripwire     Published Date: Apr 28, 2010
Learn more about the survey results and how the right attitudes and technical controls can change that outlook.
Tags : 
tripwire, pci compliance, pci dss, it security, auditing, compliance, internet security, data protection
    
Tripwire

Fax over IP: Fax takes its place on the IP network

Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : 
kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip, voice market, voip, multi- function peripherals, mfps, erp, public switched telephone network, pstn, fax over internet protocol, t.37, store and forward, t.38, real-time
    
Lane Telecommunications

Vulnerability Management Buyer's Checklist - Key Questions to Ask Before You Select a VM Solution

Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys

Growing Gift Card Demand Evokes Change

Published By: CommercialWare     Published Date: Mar 06, 2007
Customers enjoy buying and receiving gift cards. The new challenge is for retailers to provide gift cards that mesh with the way customers want to use the cards. Many early systems cannot efficiently support the changes in demand.
Tags : 
customer service, customer interaction service, customer relationship management, gift cards, datavantage, commercialware, ebusiness
    
CommercialWare

Minimizing the Burden of PCI Compliance: A New Approach to Credit Card Encryption

Published By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : 
erp, pci, pci compliance, erp, pci, ompliance, sap, sap, encryption, credit cards, tokens, tokenization, token, credit card, payment card, payment cards, regulation, regulatory, paymetric, paymetrics
    
Paymetric

Facilitating PCI-DSS Compliance

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : 
pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection, data transmission, secure file transfer, file transfer, globalscape, security, database security
    
GlobalSCAPE

Successful Mobile Deployments Require Robust Security

Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software
    
BlackBerry

Credit Issuers: Stop Application Fraud at the Source with Device Reputation

Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, identity theft, global fraud database, forensic analysis, credit card industry, application security, identity management, internet security, security management, web service security
    
Iovation

Forrester Research Reports Real ROI Results Through Device-Based Fraud

Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk, application security, auditing, internet security, network security appliance, security management, web service security
    
Iovation

Populating a Data Quality Scorecard with Relevant Metrics

Published By: SAS     Published Date: Mar 14, 2014
This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, measured value, emergent patterns, quality metrics, potential classifications, data analyst, scorecard, reporting the scorecard, improve scorecard, business process, best practices, business activity monitoring
    
SAS

Observing Data Quality Service Level Agreements: Inspection, Monitoring and Tracking

Published By: SAS     Published Date: Mar 14, 2014
This paper will consider the relevance of measurement and monitoring – defining inspection routines, inserting them into the end-to-end application processing, and reporting the results.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, measured value, emergent patterns, quality metrics, potential classifications, data analyst, scorecard, reporting the scorecard, improve scorecard, business process, best practices, business analytics
    
SAS

7 Undeniable Truths of IT Governance

Published By: Innotas     Published Date: May 12, 2009
Today's business challenges are both epic and unprecedented, which, if not met by quick and decisive actions, can result in catastrophic consequences. Taking control of IT is one of the best ways to take control of your business.
Tags : 
issue management, issues management, it governance, pmo, ppm, professional services automation, program management, program management office, program portfolio management, project arena, project management office, project portfolio management, projectarena, resource management, resource utilization, time and expense, time card, time management, time sheet, time tracking
    
Innotas

Control Employee Spending by use of Business Prepaid Cards.

Published By: PEX Card     Published Date: Nov 02, 2010
Get Funds To Employees For Purchases Instantly -Anytime, Anywhere
Tags : 
pex, small business, finance, pre-paid cards, contractors
    
PEX Card

Enterprise Payment Security 2.0: A New Look at Payment Security

Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture, 2.0, encryption, network security appliance, ebusiness, eprocurement
    
Akamai

Four Steps to Achieving Paperless Pay

Published By: Comdata     Published Date: Nov 28, 2011
When it comes to payroll, many companies are no longer choosing paper over plastic. Today's paperless payroll programs have become a variable option for many employers. These programs complement direct deposit and reduce payroll expenses; they also offer added convenience to unbanked employees by offering them immediate access to funds on payday. Paperless payroll programs deliver value to employers and employees alike, and the key to achieving a thriving, effective program is all in how you roll it out to your employees. If your company is planning to implement a paycard program, consider the four simple steps to launch a successful program.
Tags : 
comdata, finance, paperless pay, payroll, payment, payroll program, funds
    
Comdata

A Balanced Approach to Delivering the Strategy

Published By: Oracle Primavera     Published Date: Feb 10, 2015
By having a strong grip on strategic projects across a global organization, business leaders can ensure the right projects are getting the right resources, and measure their success according to criteria that reflect strategic priorities. In this executive brief, Harvard Professor Robert Kaplan walks through his six-stage system for integrating strategy and execution using the balanced scorecard. The combination of measuring performance and leveraging software tools designed to track a global portfolio of projects and initiatives can help businesses achieve breakthrough performance.
Tags : 
oracle, integrating strategy, strategic projects, project management
    
Oracle Primavera

Point of Sale Security: What Every Merchant Should Know

Published By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems

A Shift Away from China Manufacturing: Why Companies are Choosing Southeast Asia

Published By: Sparton Corporation     Published Date: Oct 12, 2017
For decades, China has offered a skilled, low-cost manufacturing base. But more and more companies are leaving China for Southeast Asia — Viet Nam, Cambodia, Malaysia and others. Investment figures suggest a long-term shift in manufacturing is underway. What’s behind the move away from China? Our white paper explains the issues, details the benefits of Southeast Asia and addresses questions about quality and production.
Tags : 
outsourced manufacturing, southeast asia, global manufacturing, vietnam, manufacturing services asia, contract manufacturing asia, design services asia, low cost manufacturing, circuit card manufacturing, alternatives to manufacturing in china
    
Sparton Corporation

PCI Compliance: Are You Onboard?

Published By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, consumer data, data protection, customer data, tripwire, security, authentication, compliance, internet security, security management, security policies
    
Tripwire

ITCi White Paper: Challenges and Opportunities of PCI

Published By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : 
compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire, pci compliance
    
Tripwire

PCI DSS Compliance with Tripwire

Published By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire

The PCI Data Security Standard

Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.