Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

card

Results 101 - 125 of 431Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 
3d secure, ca technologies, mobile
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure
    
CA Technologies
Published By: LifeLock     Published Date: Mar 02, 2015
See a comparison of LifeLock identity theft protection services versus credit monitoring via card companies and credit bureaus.
Tags : 
    
LifeLock
Published By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Oct 12, 2017
Research Now, a leading global research firm, recently surveyed 200 IT decision makers to compare satisfaction levels among four different backup and recovery solutions. Carbonite backup and recovery powered by EVault technology received the top ratings in several categories, including reliability and ease of use. Overall, Carbonite ranked #1 in five of the eight factors IT pros said were most important to them.
Tags : 
evault technology, reliability, recovery, ease of use, research now
    
Carbonite
Published By: Wasabi     Published Date: Oct 20, 2017
For the past several years cloud storage has been dominated by three main players, Amazon, Google and Microsoft, offering relatively comparable services and solutions. Armed with revolutionary technology and an egalitarian philosophy, Wasabi is transforming what cloud storage can be and do. In this white paper we focus on cloud storage pricing comparing the economics of Wasabi versus the leading cloud storage options. Free trial with no credit card required offer available as well.
Tags : 
cloud storage, wasabi, cloud computing, storage, data protection
    
Wasabi
Published By: Wasabi     Published Date: Oct 23, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
wasabi, cloud storage, data storage, storage solutions
    
Wasabi
Published By: Wasabi     Published Date: Oct 26, 2017
At Wasabi, we believe that storage should be simple, inexpensive, interchangeable, reliable, fast and readily available to anyone who needs it. Just like bandwidth or electricity. Not only that it is mission critical. As data storage needs grow, both in terms of volume and leverage-ability, next generation cloud storage will become more and more of a necessity. In this White Paper Wasabi discusses that and more through their ‘5 Immutable Laws for Storing ALL Your Data in the Cloud.’ Free Trial Available: 1 TB. 30 Days. No Credit Card Required.
Tags : 
cloud storage, big data, hot storage, data protection, amazon s3
    
Wasabi
Published By: Equinix EMEA     Published Date: Mar 21, 2019
Globally, payments are going digital—whether they are cash moving to cards, QR codes at point of sale (POS), purchases moving from physical to online stores with electronic forms of payment, or payments becoming seamless with in-app experiences. This phenomenon is not new, but does appear to be accelerating. This increased speed of adoption is driven by multiple factors, including an abundance of new electronic payment methods—many of which are layered on top of existing payment methods— focused on convenience, speed and the overall consumer experience. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: Workday     Published Date: Aug 07, 2018
Rethink the way you plan, budget, and forecast. This webinar, hosted by Workday and featuring Paul Hamerman of Forrester Research, provides insight into the advantages of: Uniting organizational, workforce, and financial data Collaborating with stakeholders and planning participants Guiding the business with reporting, dashboards, and scorecards Watch the webinar replay to learn best practices for planning, budgeting, and forecasting that’ll help your organization succeed.
Tags : 
budget, forecast, forrester, best practices
    
Workday
Published By: VersaSuite     Published Date: Aug 13, 2013
Healthcare providers do not have to live with functionality interruptions and budget strains created by an EHR that does not fit the facility. VersaSuite delivers a customizable EHR/HIS system to streamline the entire range of healthcare business processes.
Tags : 
ehr, electronic health records, ehr replacement, emr software, emr, electronic medical records, emar, ophthalmology, ent, cardiology, otolaryngology, cardiovascular, versasuite, practice management, pacs, hospital information system, his, budget, revenue cycle management, cpoe
    
VersaSuite
Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards, chargeback liability, security, it management
    
Sage
Published By: Fiserv     Published Date: Nov 15, 2017
"Learn how you can reduce loan defects, improve data quality and simplify compliance in the mortgage lending process. Co-presented with Craig Focardi, mortgage industry executive and technology advisor, this webinar provides insights into mortgage lending process challenges and how they impact experiences for lenders and borrowers, as well as the overall performance of the loan. The webinar also provides suggestions for reducing loan defects and strategies to correct them."
Tags : 
    
Fiserv
Published By: Loop Commerce     Published Date: Mar 08, 2019
As retail continues its internet-influenced change and customer demand for “right now” service increases, a new area is open for business. There is no reason to send a shirt that is the wrong size or give an impersonal gift card. G-Commerce is here, offering a new type of personalized transaction and digitalized merchandise for those shopping for others. Learn how Loop Commerce's flagship product, GiftNow: • Increased % of sales from gifts by 2X • Drove 24% of Christmas Eve sales • Increased 6X demand over gift cards Retailers can grab last-minute shoppers literally up to the moment before a holiday, and increase profits through fewer merchandise returns.
Tags : 
    
Loop Commerce
Published By: Planview - Innotas     Published Date: Jun 06, 2017
This white paper details the five pillars of PPM and how they can set you up for future success. Because the last thing you want to do is watch your hard work crumble around you.
Tags : 
project portfolio management, ppm, roi, return on investment, infrastructure
    
Planview - Innotas
Published By: Gelato     Published Date: Jul 03, 2018
The creation, building, and protection of a brand is one of the highest priorities of a corporate marketing team. Your logo and company colors are printed around the world on business cards, thought leadership, signage, and for internal branding, among other things. Do you really know how many people are creating and printing materials on behalf of the company? Gelato CMO Christian Sæterhaug will shed light on the surprising discoveries our customers have made when investigating the issue. Watch the video to learn more.
Tags : 
    
Gelato
Published By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure, software authentication platforms
    
Entrust Datacard
Published By: Oracle     Published Date: Mar 07, 2019
Innovation is backed by 84% of boards – and finance’s role as an innovation partner is growing. This 2,000-exec global study shows that innovation and growth are as closely linked as ever. It also shows, that for CFOs: • Customer satisfaction has become a key KPI for innovation • Having too many innovation projects is their biggest hurdle • Establishing business case viability and go/no-go decisions are a key challenge Read the report
Tags : 
    
Oracle
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.