card

Results 1 - 25 of 454Sort Results By: Published Date | Title | Company Name

A Step-by-Step Migration Guide to SHA-2 SSL Certificates

Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha, application security, compliance, intrusion detection, intrusion prevention, security management, security policies
    
Entrust Datacard

10 Ways to Increase your Online Payments Conversion Rate by 25% or More

Published By: Zooz Payments     Published Date: Feb 11, 2016
This white paper will describe the main problems merchants face when it comes to customer conversions and payment acceptance, and suggest solutions that will enable you to increase your conversion rate.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments, risk management
    
Zooz Payments

1010REVEAL Q2 2018 CPG Ecommerce Scorecard

Published By: 1010data     Published Date: Sep 05, 2018
To learn more about 1010data CPG Ecommerce Download Now!
Tags : 
    
1010data

2017 Retail Vision Study

Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers, state of the hospitality industry, smart data dives, automating convenience, the personalization equation, location technologies, key qr code applications, customer service, customer satisfaction
    
Zebra Technologies

3-D Secure Authentication Using Advanced Models

Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral, research
    
CA Technologies

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
    
Entrust Datacard

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard

5 Essential Factors Business Owners Must Understand Before Choosing a Payment Processing Provider

Published By: Total Merchant Services     Published Date: Jul 02, 2009
Accepting credit cards at your business, whether online or at your physical location, can be a challenging task.  The Credit Card Processing Industry is highly fragmented, with many companies offering conflicting or a confusing range of services.  This fact filled paper will provide you with a framework to make an informed decision for your payment system including; Equipment Costs, Rates, Types of Processing and Terms of the Agreement.
Tags : 
total merchant services, payment processing provider, credit cards
    
Total Merchant Services

5 Simple Steps: Be a Better Manager MEOW

Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : 
management fundamentals, hiring best practices
    
CSB by Cornerstone on Demand

5 Steps to Implement & Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault

5 Ways to Ensure Digital Business Success

Published By: Entrust Datacard     Published Date: Oct 24, 2016
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.
Tags : 
    
Entrust Datacard

6 Steps to Overcoming PCI DSS Compliance Challenges in Mult-Cloud and Hybrid Environments

Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic

7 Hypercard Use Cases For The Intelligent Enterprise

Published By: MicroStrategy     Published Date: Aug 28, 2019
Why HyperIntelligence? Today, despite massive investments in data, IT infrastructure, and analytics software, the adoption of analytics continues to lag behind. In fact, according to Gartner, most organizations fail to hit the 30% mark. That means that more than 70% of people at most organizations are going without access to the critical information they need to perform to the best of their abilities. What’s stopping organizations from breaking through the 30% barrier and driving the pervasive adoption of intelligence? Simple. The majority of existing tools only cater to users who are naturally analytically inclined—the analysts, data scientists, and architects of the world. The other 70%—the people making the operational decisions daily within a business—simply lack the time, skill, or desire to seek out data and intelligence on their own. HyperIntelligence helps organizations operationalize their existing investments and arm everyone across the organization with intelligence. Whether
Tags : 
    
MicroStrategy

7 Undeniable Truths of IT Governance

Published By: Innotas     Published Date: May 12, 2009
Today's business challenges are both epic and unprecedented, which, if not met by quick and decisive actions, can result in catastrophic consequences. Taking control of IT is one of the best ways to take control of your business.
Tags : 
issue management, issues management, it governance, pmo, ppm, professional services automation, program management, program management office, program portfolio management, project arena, project management office, project portfolio management, projectarena, resource management, resource utilization, time and expense, time card, time management, time sheet, time tracking
    
Innotas

A Balanced Approach to Delivering the Strategy

Published By: Oracle Primavera     Published Date: Feb 10, 2015
By having a strong grip on strategic projects across a global organization, business leaders can ensure the right projects are getting the right resources, and measure their success according to criteria that reflect strategic priorities. In this executive brief, Harvard Professor Robert Kaplan walks through his six-stage system for integrating strategy and execution using the balanced scorecard. The combination of measuring performance and leveraging software tools designed to track a global portfolio of projects and initiatives can help businesses achieve breakthrough performance.
Tags : 
oracle, integrating strategy, strategic projects, project management
    
Oracle Primavera

A complete guide to SCA

Published By: GoCardless     Published Date: Oct 08, 2019
The PSD2 is the 2nd EU Payments Service Directive. The directive builds on three key areas of legislation first brought in with the original 2007 Directive. These areas include increased consumer rights in payments, creating a level playing field by bringing into scope the regulation of third-party access to account information and enhanced security. Enhanced security refers specifically to a set of requirements called Strong Customer Authentication (SCA). These requirements have far-reaching implications for any business with an online presence. This guide will explore SCA, who and what it affects and how businesses can prepare for the requirements taking effect.
Tags : 
    
GoCardless

A Culture Shift Has Occurred

Published By: Entrust Datacard     Published Date: Jun 29, 2017
Customers are the ones in control. And they give their business to the businesses keeping pace. To learn how you can keep pace, get a sneak peek into the upcoming webinar – “The Bottom Line About Instant Card Issuance” by downloading the new insight infographic.
Tags : 
    
Entrust Datacard

A Practical Approach to Authentication in an Evolving Enterprise Environment

Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure, 4g iphone, iphone jail break, jail break iphone, iphone jailbreak, jailbreak, iphone, authentication, encryption, bluetooth, mobile data systems, mobile workers, pda
    
Entrust Datacard

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : 
foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
    
Entrust Datacard

A Shift Away from China Manufacturing: Why Companies are Choosing Southeast Asia

Published By: Sparton Corporation     Published Date: Oct 12, 2017
For decades, China has offered a skilled, low-cost manufacturing base. But more and more companies are leaving China for Southeast Asia — Viet Nam, Cambodia, Malaysia and others. Investment figures suggest a long-term shift in manufacturing is underway. What’s behind the move away from China? Our white paper explains the issues, details the benefits of Southeast Asia and addresses questions about quality and production.
Tags : 
outsourced manufacturing, southeast asia, global manufacturing, vietnam, manufacturing services asia, contract manufacturing asia, design services asia, low cost manufacturing, circuit card manufacturing, alternatives to manufacturing in china
    
Sparton Corporation

A Smarter Kind of Government Is Born

Published By: Infosys     Published Date: May 21, 2018
In a country often referred to as the business hub of the Middle East, bringing a new person into the world gave parents plenty to keep them busy. For each birth, parents were required to visit a number of different government agencies to collect the necessary legal documents such as a birth certificate and a national ID card. But a new emphasis on 'Smart Government' aimed to transform the experience for the benefit of all citizens.
Tags : 
government, identification, birth certificate, legal, document
    
Infosys

A Top U.S. Retail Bank

Published By: SundaySky     Published Date: Mar 06, 2018
Card members at this consumer retail bank, enjoy a large variety of products and services. The bank offers standard banking transactions, credit cards, insurance, and investment products. After the 2008 financial crisis, the bank experienced a sharp decline in overall customer satisfaction, and also learned that its customers were more empowered than before. In order to adapt, the bank adopted a customer-centric approach by introducting: • A new customer motto: “Know me, value me, make it easy for me, and protect me” • A new core initiative is to always teach digital first • An understanding that customers are serviced on the digital channels they prefer to use SundaySky SmartVideo enables the bank to take a strategic approach to enhancing the customer engagement process with personalized video experiences that welcome new card members and assist them in fully understanding how to get the most out of their new product.
Tags : 
    
SundaySky

Accelerating Business Transaction with Effortless Authentication

Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard

Acceleration Business Transformation with Effortless Authentication

Published By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.