card

Results 1 - 25 of 453Sort Results By: Published Date | Title | Company Name

Guide complet sur l'Authentification forte du client (SCA)

Published By: GoCardless     Published Date: Oct 16, 2019
Les nouvelles règles en matière de paiement en ligne entrent en vigueur le 14 septembre. L’Authentification forte du client, ou SCA, va avoir un impact majeur sur les entreprises à abonnement qui reçoivent des paiements par carte en ligne. Vos paiements par abonnement survivront-ils à la SCA ? Téléchargez notre guide complet et découvrez les réponses aux questions suivantes : Introduction à l’Authentification forte du client (SCA) Préparer votre entreprise à la SCA Exemptions de SCA GoCardless et la SCA
Tags : 
    
GoCardless

Der vollständige Leitfaden zur Strong Customer Authentication (SCA)

Published By: GoCardless     Published Date: Oct 16, 2019
Die Strong Customer Authentication wird einen großen Einfluss auf Abonnement-Unternehmen haben, die Online-Zahlungen mit Karten einziehen. Wie wird die SCA Ihr Abo-Unternehmen beeinflussen? Eine Einführung in die Strong Customer Authentication Die Vorbereitung Ihres Unternehmens auf SCA Ausnahmeregelungen für SCA Ist GoCardless SCA-konform?
Tags : 
    
GoCardless

The payment experience cheat sheet: A guide for recurring payment businesses

Published By: GoCardless     Published Date: Oct 14, 2019
Payment experience is the combination of customer touchpoints that lead to a payment taking place. The sum of all these touchpoints will contribute to the customer’s overall perception of your brand.
Tags : 
    
GoCardless

Sécurité ou simplicité de l'expérience de paiement : Que recherchent les acheteurs en ligne ?

Published By: GoCardless     Published Date: Oct 14, 2019
L'authentification forte du client (ou SCA pour Strong Customer Authentication) est une législation européenne qui entrera en vigueur le 14 septembre 2019. Pour de nombreuses entreprises, cette législation requirt la mise en place de mesures de sécurité supplémentaires au cours des achats en ligne. Les consommateurs accepteront-ils ces changements ou les rejetteront-ils en abandonnant la transaction en plein processus ? Les acheteurs recherchent-ils en priorité la sécurité ou la simplicité ? Nous avons mené une étude sur 4 000 clients en France, au Royaume Uni en Allemagne et en Espagne afin d'analyser leur attitude face à la sécurité et à la simplicité des achats en ligne. Téléchargez les résultats complets de l'étude et découvrez les réponses aux questions suivantes : Les acheteurs en ligne privilégient-ils la sécurité ou la simplicité ? Réduiraient-ils leurs achats auprès de marques disposant de processus de sécurité complexes ? Comment considèreraient-ils certains modes d'autorisat
Tags : 
    
GoCardless

Sicherheit vs. Komfort beim Bezahlen: Was ist für Kunden beim Online-Einkauf am wichtigsten?

Published By: GoCardless     Published Date: Oct 14, 2019
Die bald in Kraft tretende SCA zwingt Unternehmen einen Großteil ihrer Online-Zahlungen mit zusätzlichen Sicherheitsmaßnahmen zu versehen. Wir wissen: Kunden neigen dazu, einen komplexen Bezahlvorgang abzubrechen. Wie werden sie also auf die kommenden Änderungen reagieren? Wir haben 4.000 Kunden in Großbritannien, Frankreich, Deutschland und Spanien zu ihrer Einstellung zu Sicherheit und Komfort beim Online-Einkauf befragt. Wir stellten ihnen auch Fragen zu bestimmten Aspekten der neuen SCA-Gesetzgebung und darüber, wie sich eine erhöhte Sicherheit an der Kasse auf ihr Kaufverhalten auswirken würde. Werden beispielsweise abgefragte biometrische Daten wie ein Fingerabdruck Ihre Kunden verschrecken oder mehr Sicherheit vermitteln? Und würden sich die Befragten für das Lastschriftverfahren entscheiden, um den Komfort zu gewährleisten? Füllen Sie das Formular aus und erhalten Sie noch heute unseren kostenlosen Leitfaden mit allen detaillierten Umfrage-Ergebnissen.
Tags : 
    
GoCardless

A complete guide to SCA

Published By: GoCardless     Published Date: Oct 08, 2019
The PSD2 is the 2nd EU Payments Service Directive. The directive builds on three key areas of legislation first brought in with the original 2007 Directive. These areas include increased consumer rights in payments, creating a level playing field by bringing into scope the regulation of third-party access to account information and enhanced security. Enhanced security refers specifically to a set of requirements called Strong Customer Authentication (SCA). These requirements have far-reaching implications for any business with an online presence. This guide will explore SCA, who and what it affects and how businesses can prepare for the requirements taking effect.
Tags : 
    
GoCardless

Security vs. convenience in the payment experience

Published By: GoCardless     Published Date: Oct 08, 2019
With Strong Customer Authentication (SCA) coming into force on 14 September 2019 as the final part of PSD2, many online businesses are required to add additional security measures to large parts of their online payment experience. Key goals of SCA include reducing payment fraud and creating a safer payment experience for the customer.
Tags : 
    
GoCardless

How to Build Home Equity into your Marketing Mix

Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend

Live Threat Briefing New Attack Trends in Retail - Mengmeng Chen

Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security

Online Payment Fraud Whitepaper

Published By: Experian     Published Date: Aug 29, 2019
Card-not-present fraud is estimated to reach $19.3 billion by 2022. Online payment fraud will grow 13.7% from 2017-2022 – Juniper Dive deeper into these data points with a focus on assessing the impact, challenges and opportunities presented by emerging payment mechanisms and regulation, as well as an in-depth assessment of sector-specific trends and outlook in regard to digital fraud. It provides essential reading for those wishing to understand where the key strategic focus should lie and how market forces are affecting the industry.
Tags : 
    
Experian

7 Hypercard Use Cases For The Intelligent Enterprise

Published By: MicroStrategy     Published Date: Aug 28, 2019
Why HyperIntelligence? Today, despite massive investments in data, IT infrastructure, and analytics software, the adoption of analytics continues to lag behind. In fact, according to Gartner, most organizations fail to hit the 30% mark. That means that more than 70% of people at most organizations are going without access to the critical information they need to perform to the best of their abilities. What’s stopping organizations from breaking through the 30% barrier and driving the pervasive adoption of intelligence? Simple. The majority of existing tools only cater to users who are naturally analytically inclined—the analysts, data scientists, and architects of the world. The other 70%—the people making the operational decisions daily within a business—simply lack the time, skill, or desire to seek out data and intelligence on their own. HyperIntelligence helps organizations operationalize their existing investments and arm everyone across the organization with intelligence. Whether
Tags : 
    
MicroStrategy

IDC Report: Business Value of Stripe Payments Platform

Published By: Stripe     Published Date: Aug 06, 2019
Digital commerce is enabling businesses to rethink what they sell, how they sell, and where they sell. Fickle consumer and business buyers have come to expect an intuitive and instantaneous checkout process with multiple payment options. However, aging financial infrastructure and complex interdependencies between numerous parties make it difficult and expensive to accept payments online seamlessly and across markets and currencies. Stripe meets these challenges with an API-based payments platform that abstracts away the complexities around payment gateways, acquiring banks, and credit card networks. To understand the impact of Stripe’s products on processing online payments, IDC interviewed Stripe customers and surveyed hundreds of organizations around the world about how they currently process and manage online payments. KEY FINDINGS • Many organizations are using Stripe as a foundational platform for their online businesses, with many of those also using Stripe Connect to run thei
Tags : 
payment security, payment processing, payment solutions, business analytics, platform as a service (paas)
    
Stripe

Disputing Chargebacks: A guide for eCommerce merchants

Published By: Riskified     Published Date: Aug 06, 2019
In the competitive world of eCommerce, online retailers must provide an optimal customer experience or risk losing business. But many are seeing their hardearned revenue fall victim to costly credit card chargebacks.
Tags : 
    
Riskified

CERTIFICATE MANAGEMENT: POLICY, AUTOMATION AND ENTRUST DATACARD VALUE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard

DEVOPS AND SECURITY: TOO LITTLE, TOO LATE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard

PUBLIC KEY INFRASTRUCTURE (PKI) BUYERS GUIDE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
    
Entrust Datacard

The Evolution of PKI for IoT Establishing Trust in an Untrusted Environment

Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard

Busting Financial Crime with TIBCO - False Positive Investigations Explained

Published By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software

First Citizens Bank Turns to TIBCO Integration to Increase Deployment Speed and Win Awards

Published By: TIBCO Software     Published Date: Jul 22, 2019
First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services. With over 200 point-to-point applications and disparate systems, the bank needed a way to reduce its applications portfolio and streamline integration among systems, including fast integration of systems from newly acquired banks. First Citizens turned to TIBCO ActiveMatrix BusinessWorks™ and TIBCO® Messaging for their simplicity and ability to quickly get IT processes up and running. With standard services, this transformation resulted in reduced deployment time—from eight months to 18 weeks, resulting in reduced credit card loan project time.
Tags : 
    
TIBCO Software

PSD2, Important Open Banking and Strong Customer Authentication (SCA) Q&A

Published By: Entrust Datacard     Published Date: Jul 12, 2019
In this whitepaper you will find frequently asked questions regarding the qualified website authentication certificate.
Tags : 
    
Entrust Datacard

Revised Payment Services Directive (PSD2)

Published By: Entrust Datacard     Published Date: Jul 09, 2019
Revised Payment Services Directive (PSD2) is the European Commission (EC) and the European Banking Authority’s (EBA) newest regulatory directive to ensure customer security in the payments space, is upon us. In order to comply with these new regulations, you first need to ensure you have a good understanding of what they are, why they exist and how they will affect your organization’s business strategy moving forward. Don’t let the potential business impact of PSD2 hang over your head. PSD2 can actually be a catalyst for your digital= transformation. With the right solution, you can provide a more secure, better user experience for your customers. If you are able to capitalize on PSD2 and implement a forward-thinking strategy, you can ultimately differentiate your brand from emerging competition — like neobanks, fintechs and wallet providers — and retain customer trust and loyalty.
Tags : 
    
Entrust Datacard

Revised Payment Services Directive (PSD2)

Published By: Entrust Datacard     Published Date: Jul 08, 2019
Revised Payment Services Directive (PSD2) is the European Commission (EC) and the European Banking Authority’s (EBA) newest regulatory directive to ensure customer security in the payments space, is upon us. In order to comply with these new regulations, you first need to ensure you have a good understanding of what they are, why they exist and how they will affect your organization’s business strategy moving forward. Don’t let the potential business impact of PSD2 hang over your head. PSD2 can actually be a catalyst for your digital transformation. With the right solution, you can provide a more secure, better user experience for your customers. If you are able to capitalize on PSD2 and implement a forward-thinking strategy, you can ultimately differentiate your brand from emerging competition — like neobanks, fintechs and wallet providers — and retain customer trust and loyalty.
Tags : 
    
Entrust Datacard

The Business Case for SSL/TLS Encryption Orchestration

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd

6 Steps to Overcoming PCI DSS Compliance Challenges in Mult-Cloud and Hybrid Environments

Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic

Hearing Loss and Associated Comorbidities: What Do We Know?

Published By: Hamilton Captel     Published Date: May 15, 2019
Many studies have linked hearing loss to serious conditions, such as cognitive decline, Alzheimer’s disease, clinical depression, diabetes, heart disease and more. These linkages are often referred to as comorbidities—the simultaneous presence of two or more chronic conditions in an individual. The white paper by Harvey Abrams, Ph.D., focuses on the research literature surrounding seven comorbid conditions associated with hearing loss: social isolation, depression, increased risk of falling, cardiovascular disease, diabetes, dementia and even mortality.
Tags : 
    
Hamilton Captel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.