PCI Standard Reports

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

Three Steps to PCI Compliance in the Cloud
sponsored by TechTarget Security
EGUIDE: PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

TechTarget Security

Compliance Driven Security
sponsored by DellEMC and Intel®
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

DellEMC and Intel®

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Symantec IT Compliance Solution
sponsored by Symantec Corporation
PRODUCT LITERATURE: Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage
sponsored by IBM
EGUIDE: In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM