pci

Results 76 - 100 of 277Sort Results By: Published Date | Title | Company Name

Coalfire, a leading independent QSA, Qualifies LogRhythm's SIEM 2.0 Solution

Published By: LogRhythm     Published Date: Jan 24, 2013
Coalfire's assessment of LogRhythm's SIEM 2.0 solution validates the ability to meet specific PCI controls augment others. LogRhythm's technology encompasses key control areas for PCI compliance.
Tags : 
siem solution, logrhythm, solution, siem solution, pci controls, augment, pci compliance, it management, data management, business technology, data center
    
LogRhythm

Wall-Mount Rack Solutions for PCI Compliance

Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite

El manual de estrategias para la gestión de API

Published By: CA Technologies EMEA     Published Date: May 24, 2018
En la economía digital, las interfaces de programación de aplicaciones (API) son esenciales para ejecutar ideas con rapidez y aprovechar nuevas oportunidades de negocio. Constituyen los pilares fundamentales de la transformación digital, ya que permiten a las organizaciones ofrecer experiencias de cliente excepcionales, crear flujos de ingresos nuevos y conectar a los empleados, los partners, las aplicaciones y los dispositivos con los datos en cualquier momento y lugar.Las API no son necesariamente una tecnología nueva, pero en el mundo digital actual, han adquirido mayor relevancia y se han vuelto importantes para todas las facetas de la empresa. A su vez, esto ha aumentado la demanda de una gestión de API eficaz. Ahora bien, ¿cómo es una solución eficaz?
Tags : 
    
CA Technologies EMEA

Digital Engagement Planner

Published By: Moxie     Published Date: Feb 08, 2018
Achieve your goals by successfully mapping common sources of customer struggle to the right engagement opportunities. With ever changing customer expectations and behaviors in the new Guided Economy, Crate and Barrel decided to build a competitive advantage to improve customer experience, engagement, and acquisition across mobile and desktop shoppers. By mapping struggle to engagements, digital channels are used to help shoppers select the right products, complete orders, or process payment transactions in a PCI-compliant environment.
Tags : 
customer, opportunities, engagement, planner, digital, templates
    
Moxie

A Guide to Achieving SaaS Security and Compliance

Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint

Thirteen Essential Steps to Meeting the Security Challenges of the New EU GDPR

Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable

Resulta más difícil que nunca ofrecer una experiencia óptima

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Como resultado, debe encontrar la forma de cuantificar las métricas que de verdad importan, es decir, el compromiso, la lealtad y la satisfacción. Asimismo, es fundamental que iguale el nivel de agilidad con el de calidad, lo que convierte el rendimiento de las aplicaciones en una prioridad para todos los departamentos: desde el comercial hasta el de marketing, pasando por el de TI. Por último, debe preparar a su empresa para el futuro mediante la rápida adopción de las últimas tecnologías e innovaciones, que satisfarán y superarán las expectativas de los clientes.
Tags : 
    
CA Technologies EMEA

Safer Online Payments: Small business Payment Survival Guide.

Published By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : 
ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme, anti spam, anti spyware, anti virus, security management
    
Worldpay

PCI DSS 3.0: Countdown to Compliance

Published By: Firehost     Published Date: Jan 07, 2015
This Webinar covers all of the details you will need to know about PCI DSS 3.0.
Tags : 
pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, anti virus, application security, intrusion detection, intrusion prevention, security management, data protection, database security
    
Firehost

Auditing for PCI Compliance using Riverbed SteelCentral Netauditor

Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management, data center
    
Riverbed

10 Essential SQL Server Security Tasks

Published By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection, database security
    
GreenSQL

Microsoft SQL Server Security Best Practices

Published By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection, database security
    
GreenSQL

Securing Data at Rest: An Enterprise Strategy for Data Encryption

Published By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : 
data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical, storage management, compliance, data protection, pci compliance
    
HP

Web Application Threats are Evolving. Are Your Security Efforts Keeping Pace? Today, Web

Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs, international computing
    
VeriSign Incorp.

Meet PCI Compliance using Security Information and Event Management (SIEM)

Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management, data protection, pci compliance
    
TriGeo Network Security

Critical Scalability Considerations in Evaluating Log Management Solutions

Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets, networking, network security, intrusion detection, intrusion prevention, hipaa compliance
    
ArcSight

Digital Fraud & Identity Theft Made Protection of Payment Card Information More Critical Than Ever

Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data, security, access control, encryption, intrusion detection
    
ArcSight

ForeScout CounterACT and Compliance

Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
    
ForeScout

PCI DSS Compliance: A Baseline for Security Best Practices

Published By: CDW     Published Date: Nov 13, 2012
The standard can help organizations improve handling of personally identifiable information.
Tags : 
cdw, pci, dss, compliance, cybersecurity attack, hacker attacks, verizon, pos, point of sales, business technology
    
CDW

Continuous Compliance to the Rescue

Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, email security, encryption, hacker detection, identity management, internet security
    
McAfee

Secure Your Fixed Function Devices

Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security, printer security, automotive system security, aeronautical system security, pci dss, nerc, dynamic whitelisting, zero day attacks, anti spam, anti spyware, anti virus, application security, security management
    
McAfee

Strong Security with Lower Operational Costs and Simplified Compliance

Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci, anti spam, anti spyware, anti virus, application security, auditing, compliance
    
McAfee

Comply fully and reduce database security risk

Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases, anti spam, anti spyware, compliance, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management, data loss prevention
    
McAfee

Technology and approach for providing real-time, protection for all types of databases.

Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba, sox, cobit, iso, hipaa, fisma, database activity monitoring, database vulnerability manage, database activity monitoring, anti spyware, anti virus, auditing, compliance
    
McAfee

A Practical Guide to Database Security

Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit, anti spam, anti spyware, anti virus, compliance, disaster recovery, encryption, firewalls, hacker detection, internet security
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.