payment

Results 351 - 375 of 390Sort Results By: Published Date | Title | Company Name

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire

Profiting from PCI Compliance

Published By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : 
ibm, pci dss, compliance, security, software compliance, sarbanes oxley compliance
    
IBM

Digital Fraud & Identity Theft Made Protection of Payment Card Information More Critical Than Ever

Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data, security, access control, encryption, intrusion detection
    
ArcSight

Banks get relief with IBM WebSphere software

Published By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : 
ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management, internet banking delivery, networking, it management, enterprise applications
    
IBM

Vulnerability Management Buyer's Checklist - Key Questions to Ask Before You Select a VM Solution

Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management, firewalls
    
HP - Enterprise

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

Meet PCI Compliance using Security Information and Event Management (SIEM)

Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management, data protection, pci compliance
    
TriGeo Network Security

LogRhythm for PCI-DSS Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm

The Method Behind PCI's Madness

Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection, identity theft, pci compliance
    
LaGarde

The Business Case for Email Archiving

Published By: GFI     Published Date: Sep 04, 2008
For businesses around the world, email has become the primary means of communication with people inside and outside of the organization. Business transactions kick off in the form of an email, most customers use e-mail to negotiate contracts and agreements and exchange invoices and payment information. Email is also heavily used by marketing departments to issue mailshots to customers announcing new offers and special deals and so on.
Tags : 
email archiving, archive, archiving, email management, email, sarbox, sarbanes oxley, sarbanes-oxley, sox, gfi, mail archiver, mailarchiver, storage, sarbanes oxley compliance
    
GFI

Support for your PCI Security Compliance Efforts from IBM

Published By: IBM     Published Date: Aug 21, 2008
The world has embraced payment cards to support commercial transactions for almost every kind of business. Unfortunately, the data associated with these payment cards is the focus of many identity theft activities. This white paper outlines Payment Card Industry (PCI) requirements, as well as the benefits of compliance and the penalties for noncompliance.
Tags : 
ibm, ibm mi, ibm grm, pci, pci dss, pci-dss, pci compliance, data theft, cardholder data, identity theft, compliance, intrusion prevention, data protection
    
IBM

Cashless Self Checkout: A Growing Trend That May Be Right For You

Published By: IBM     Published Date: Jun 11, 2008
According to Selfserviceworld.com, 50 percent of consumers prefer to use credit cards at self-checkout counters. As credit card usage continues to rise, it's beneficial for retailers to consider non-cash methods of payment. Download the white paper and see how self-checkout solutions from IBM can help increase sales and improve customer satisfaction.
Tags : 
checkout, retail, point of sale, pos, customer service, ibm, mmdg, customer satisfaction, sales automation, customer experience management
    
IBM

Total Telecoms Expense Management: Looking Beyond Cost Cutting to Gain Greater Value

Published By: Quocirca     Published Date: Apr 15, 2008
Voice and data communications are taking up an increasing amount of organizations’ budgets as more information is shared between and across more businesses. Person to person contact now includes richer media, more participants and is becoming increasingly mobile. Historically, telecoms expense management has focused on the mechanistic processing of bills, payment and costs of individual items.
Tags : 
communication, communications, expense, cost, quocirca, ip telephony, total cost of ownership, voice over ip, spend management
    
Quocirca

PCI Compliance: The New Reality for European Retail Companies

Published By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : 
compliance, vpn, retail, managed networks, easynet, network management, pci compliance
    
Easynet

Embracing PCI: Making It Work For You

Published By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, intrusion prevention, pci compliance
    
Secure Computing

Lock Down Applications for PCI DSS Compliance

Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx, security, firewalls, intrusion prevention, pci compliance
    
Secure Computing

Facilitating PCI-DSS Compliance

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : 
pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection, data transmission, secure file transfer, file transfer, globalscape, security, database security
    
GlobalSCAPE

PCI Compliance Cost Analysis: A Justified Expense

Published By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : 
pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security, database security, cost of non-compliance, customer data, solidcore, fortrex, security, network security, intrusion prevention
    
Solidcore

PCI: How to Safeguard Your Customer's Data Against Threats

Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft, credit cards, payment card, consumer protection, information management, regulations, regulatory compliance, netforensics, security, compliance, internet security, database security
    
netForensics

Minimizing the Burden of PCI Compliance: A New Approach to Credit Card Encryption

Published By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : 
erp, pci, pci compliance, erp, pci, ompliance, sap, sap, encryption, credit cards, tokens, tokenization, token, credit card, payment card, payment cards, regulation, regulatory, paymetric, paymetrics
    
Paymetric

The Challenge of Securing Hard to Patch Servers in Health Care Environments

Published By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : 
healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa, hippa, hipaa compliance, sox, sox compliance, risk management, records management, medical records, bluelane, blue lane, servers, compliance, security management
    
Blue Lane

Payformance Protects Confidentiality of Payment Processing Information with NeoScale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

PCI Compliance: Learn Solutions To Help Your Organization Comply

Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : 
pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy, customer data, data privacy, data protection, net iq, netiq, cardholder, security management, change management, configuration management
    
NetIQ Corporation
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.