Credit Card Database SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Credit Card Database Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Fraud Detection & Prevention
 •   Application Security
 •   Credit and Collections
 •   Endpoint Security

Related Searches
 •   Credit Accounting
 •   Credit Card Cycles
 •   Credit Card Database Risks
 •   Credit Card Database Warehouse
 •   Credit Card Seminars
 •   Credit Operations
 •   Credit Tools
 •   File Credit Card Database
 •   Markets Credit Card
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Data Encryption 101: A Pragmatic Approach to PCI Compliance by Prime Factors, Inc.

September 09, 2010 - (Free Research)
The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 28, 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 05, 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

How Can Security Management Technologies Help Me with PCI Compliance? by CA Technologies.

August 11, 2009 - (Free Research)
Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure. 
(WHITE PAPER) READ ABSTRACT |

Protecting Credit Card Data: How to Achieve PCI Compliance by Motorola, Inc.

July 2007 - (Free Research)
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

PCI compliance in the cloud: Can cloud service providers manage PCI? by SearchSecurity.com

April 2013 - (Free Research)
Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits. 
(EGUIDE) READ ABSTRACT |

Demystifying Customer Service Correspondence Work Flow in Cards by Wipro Technologies

May 2009 - (Free Research)
Methods for capturing customer attention and loyalty may have changed over the years, but the basic DNA of business has not - a focus on establishing new customer relationships and retaining existing ones. This paper provides both a business & technology insight into the credit card customer service workflow. 
(WHITE PAPER) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

PCI Compliance: Are UK Businesses Ready? by Tripwire, Inc.

April 2010 - (Free Research)
As of September 30, 2010, the Payment Card Industry Data Security Standard (PCI DSS) will apply to organizations in the UK. Recent research reveals that so far only 12 percent of UK organizations that handle credit card data currently have been certified PCI compliant. Read on to learn how your organization should be preparing for September 30th. 
(WHITE PAPER) READ ABSTRACT |

SonicWALL PCI Compliance Solution Brief by SonicWALL

February 2011 - (Free Research)
The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry. 
(WHITE PAPER) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Data Loss Prevention for IBM i by Innovatum, Inc.

April 2010 - (Free Research)
Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization. 
(WHITE PAPER) READ ABSTRACT |

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by Paymetric, Inc.

January 2008 - (Free Research)
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Return on Investment of Payment Card Industry Data Security Standards Compliance by IBM

June 2009 - (Free Research)
Compliance with PCI DSS has become a global requirement for any business or entity that processes credit card transactions as payment for goods and services. This paper explores the ROI implications and opportunities of PCI. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: ISACA PCI Compliance Symposium by Intel

May 2011 - (Free Research)
Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva

February 2011 - (Free Research)
Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased. 
(WHITE PAPER) READ ABSTRACT |

Intel® Expressway Tokenization Broker Data Sheet by Intel

March 2011 - (Free Research)
This doument provides details on how organizations can reduce PCI DSS scope and lower costs, by leveraging Intel® Expressway Tokenization Broker to manage Primary Account Number (PAN) data. Tokenization Broker is offered in conjunction with our industry-leading Intel® Expressway Service Gateway. 
(DATA SHEET) READ ABSTRACT |

PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com

October 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard. 
(EBOOK) READ ABSTRACT |

Winning the PCI Compliance Battle by Qualys

October 2011 - (Free Research)
This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS. 
(WHITE PAPER) READ ABSTRACT |

Reducing PCI DSS Scope: The Gateway Approach by Intel

March 2011 - (Free Research)
This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts