pci

Results 251 - 275 of 277Sort Results By: Published Date | Title | Company Name

Top 10 misconceptions about PCI

Published By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : 
pci, neospire, security, compliance, paypal, data security standards, security management, pci compliance
    
NeoSpire Managed Hosting

Effective Solutions for Firewall Rule Cleanup

Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm., auditing, firewalls
    
Athena Security

Effective Solutions for Firewall Management

Published By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : 
solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm., auditing, firewalls
    
Athena Security

Merchant Can Use their Processing Statements to Improve their Financial and Risk Management Outlook

Published By: CSRSI - The Payment Advisors     Published Date: Aug 05, 2010
Most merchants don't know how to read their merchant statements. With a little knowledge, merchants can learn how to reduce their processing costs by reducing costly errors by staff, and correct errors by processors.
Tags : 
merchant processing, merchant statement, chargebacks, downgrades, fraud, pci compliance, csrsi
    
CSRSI - The Payment Advisors

Implementing PCI Compliance with ScriptLogic

Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual, environments, access control, application security, policy based management, application integration, best practices, business process management, performance testing, product lifecycle management, project management, return on investment, risk management
    
ScriptLogic

High-Performance Embedded Applications: The SUMIT Standard

Published By: VersaLogic Corp.     Published Date: Nov 03, 2010
How the SUMIT interconnect standard is designed to meet the evolving needs of embedded systems.
Tags : 
embedded, single board computer, sumit, pci express, pcie, form factor, embedded design, boards & modules, embedded systems and networking
    
VersaLogic Corp.

NetIQ Directory and Resource Administrator Powers NRG Energy with Automated Active Directory Mana

Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, application security, authentication, internet security, intrusion detection, intrusion prevention, policy based management, security management
    
NetIQ

Call Recording for Healthcare: Compliance Rules & Regulations for HIPAA, PCI and NACHA

Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics

The Future of Database Activity Monitoring

Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
    
IBM Corporation

Eight Ways to Reduce PCI DSS Audit Scope by Tokenizing Cardholder Data

Published By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : 
liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens, taas, direct marketer, cissp, credit card transactions, auditing, compliance, encryption, identity management, network security appliance, password management, data protection, pci compliance
    
Liaison Technologies

Tokenization for Dummies

Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management, network security, auditing, identity management, network security appliance, password management
    
Liaison Technologies

Tokenization Success Story - Reducing PCI DSS Audit Scope Using Tokenization

Published By: Liaison Technologies     Published Date: Jun 03, 2011
Tune in to this Tokenization webcast where we'll discuss the business drivers behind tokenization, exactly what 'tokenization' is, some best practices for a successful implementation, and lastly, a customer example of tokenization used to reduce the PCI DSS audit scope.
Tags : 
liaison, nubridges, tokenization implementation, pci dss audit scope, gary palgon, brian grafsgaard, data protection, auditing, encryption, identity management, network security appliance, password management, database security, pci compliance
    
Liaison Technologies

Beyond compliance: A pragmatic guide to making the most of your PCI DSS initiatives

Published By: The Logic Group     Published Date: Jun 07, 2011
If you are a business that accepts credit or debit card payments then achieving PCI DSS compliance is an industry requirement. But how can you make it work for your business & prevent it becoming an exercise in box ticking?
Tags : 
pci dss, compliance, credit card data, debit card data, customer data, retail, payments
    
The Logic Group

PCI Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage

PCI DSS Compliance with Stingray Traffic

Published By: Riverbed     Published Date: Nov 08, 2012
Payment Card Industry Data Security Standard is a set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. Read on to learn about securing your applications for security standard.
Tags : 
riverbed, stingray, pci dss compliance, stingray traffic, security, enterprise applications, business technology
    
Riverbed

eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance

Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security, compliance
    
Rapid7

The Complete Guide to Log and Event Management

Published By: NETIQ     Published Date: Mar 12, 2013
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security, business technology
    
NETIQ

Achieving ROI from Your PCI DSS Investment

Published By: NETIQ     Published Date: Mar 12, 2013
This whitepaper discusses the challenges of meeting PCI DSS compliance, as well as the ways in which organizations can leverage that work to provide better security.
Tags : 
pci dss compliance, security compliance, it management, business technology
    
NETIQ

Clearing the Path to PCI DSS Version 2.0 Compliance

Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management, business technology
    
NETIQ

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security, business technology
    
NETIQ

How to Simplify PCI DSS Compliance with AlienVault USM

Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, pci compliance
    
AlienVault

Alienvault Threat Detection Free Trial

Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.