Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

card

Results 326 - 350 of 430Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Make compliance just another part of your processes by taking an operational approach to security.
Tags : 
tripwire, compliance, security, business continuity, security management, payment card industry, data security standard, pci dss
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.
Tags : 
tripwire, pci dss compliance, it security, automation solution, payment card industry, data security standard, audit
    
Tripwire
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability, it management
    
IBM
Published By: Business.com     Published Date: Oct 09, 2012
Paying with credit cards will help increase the consumer's want to buy and help increase the company's sales; however accepting credit cards isn't quite as easy as it seems.
Tags : 
credit cards, credit, processing, business, fees
    
Business.com
Published By: Business.com     Published Date: Oct 09, 2012
If you're in business these days, you need to accept credit cards. The problem is, which type of credit card processing should you choose?
Tags : 
credit card processing, credit card fees, credit card, merchant account
    
Business.com
Published By: Business.com     Published Date: Oct 09, 2012
Credit cards are an integral part of modern business. Even customers who don't use credit will want to use debit or gift cards based around similar technology.
Tags : 
credit card, processing, credit card terminal, business technology
    
Business.com
Published By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, security
    
Utimaco
Published By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security
    
Utimaco
Published By: Utimaco     Published Date: Aug 18, 2008
Better safe than sorry! When outsourcing, keeping an eye on data security right from the planning stage can save your company from nasty surprises. Readers should learn how to protect their confidential data when they exchange information with external partners.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, outsourcing, outsource, third party, 3rd party, security
    
Utimaco
Published By: Silverpop Engage B2B     Published Date: Mar 24, 2009
What happens to the leads your marketing department generates from initiatives such as white-paper downloads, referrals and trade-show business-card drops? According to research firm MarketingSherpa, 12.5 percent are genuine leads, ready or willing to buy and get moved into the sales cycle, while 17.5 percent get discarded right away because they clearly didn’t qualify or couldn’t be verified. Learn more today!
Tags : 
silverpop b2b, lead management, engagement marketing solutions, emarketing tools, single-message, drip campaigns, engage b2b, b2b database, bounce and unsubscribe, multitrack/multistep campaign, single-message campaign
    
Silverpop Engage B2B
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ID Card Group increased sales and conversions with McAfee SECURE ™ service. Download today!
Tags : 
b2b, retailer id, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales
    
McAfee, Inc.
Published By: Junta42     Published Date: Aug 20, 2009
How do you create trust and meaningful marketing content that doesn't read like a sales pitch? In an age of digital noise and an abundance of information, how do you reach your target audience and become a trusted brand? This eBook will show you how.
Tags : 
trust, junta 42, marketing content, ebook, target audience, digital noise, branding, loyalty, self-serving promotion, social networking, google, twitter, technorati, boardreader, mastercard, trusted
    
Junta42
Published By: IBM     Published Date: Jan 02, 2014
Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits. Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits.
Tags : 
ibm, business analytics, midsize businesses, geeknet, business intelligence, customer volatility, market volatility, variety of data, it managers, implementing analytics, ba systems, ba solutions, in-house analytics, ba capability, scorecarding, time-to-insight, business risk, business planning
    
IBM
Published By: Dell     Published Date: Jan 21, 2015
Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.
Tags : 
dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, data center design and management
    
Dell
Published By: Act-On     Published Date: Aug 28, 2012
Qualified leads are hard to get; you can't afford to lose or waste them. 70% of the qualified leads that make it to sales get disqualified or discarded, often because they just aren't ready to buy now.
Tags : 
lead generation, lead nurturing, b2b marketing, lead scoring
    
Act-On
Published By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : 
internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management
    
Symantec
Published By: Symantec     Published Date: Jan 11, 2013
When you employ services on the internet, SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, they can provide greater flexibility that traditional certificates.
Tags : 
ssl certificates, multi-use, san, wildcard, security, it management
    
Symantec
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm
    
Rapid7
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : 
best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business, website, threats, coverage, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a whitepaper about the business value of extended validation.
Tags : 
extended validation, certificate, internet, browser, ssl, tls, it management
    
Entrust Datacard
Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers
    
Viavi Solutions
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.