Mastercard ServicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Mastercard Services returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Virtualization
 •   Customer Information Management/ Customer Databases
 •   Network Security
 •   Storage Security
 •   Fraud Detection & Prevention
 •   Open Source
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Computer Mastercard Services
 •   Enterprise Mastercard Services
 •   History Mastercard
 •   Mastercard Displays
 •   Mastercard Industry
 •   Mastercard Services Guideline
 •   Mastercard Services Rfp
 •   Mastercard Services Web
 •   Strategic Mastercard Services
 •   Techniques Mastercard Services
Advertisement

ALL RESULTS
1 - 25 of 494 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Complying with Payment Card Industry Data Security Standards Using SEA System I Solutions by Software Engineering of America, Inc.

February 2008 - (Free Research)
This document highlights how Software Engineering of America's solution for the System i help to ensure PCI Compliance. 
(WHITE PAPER) READ ABSTRACT |

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by Bit9, Inc.

June 2009 - (Free Research)
As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance... 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS) by IBM

July 2011 - (Free Research)
This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information. 
(WHITE PAPER) READ ABSTRACT |

Customer Data Security: PCI and Beyond - Benchmark Study 2008 by Apani

March 2008 - (Free Research)
This 2008 Customer Data Security Study reveals how quickly and how well retailers are responding to the PCI mandate and what measures retailers are taking now to minimize the risks associated with the capture, retention, and use of customer-specific data. 
(WHITE PAPER) READ ABSTRACT |

Federated Identity andSoftware as a Service (SaaS):Single Sign-on to the Cloud by Ping Identity Corporation

December 2010 - (Free Research)
This white paper serves as an overview of the market forces that have created the need for rapid deployment of Internet Single Sign-on for SaaS deployments. Inside, discover how you can address these IT needs with architecture, experience, and speed. 
(WHITE PAPER) READ ABSTRACT |

The cloud influence on governance, risk and compliance by SearchCompliance.com

April 2014 - (Free Research)
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook. 
(EBOOK) READ ABSTRACT |

Secure Internet Single Sign-On 101 by Ping Identity Corporation

December 2010 - (Free Research)
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise's security domain to outsourced services. This white paper explores the limitations of current SSO implementations outside of a single security domain and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot by Webroot

February 2014 - (Free Research)
This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance. 
(CASE STUDY) READ ABSTRACT |

Symantec In Health – Risk Management by Symantec Corporation

April 2014 - (Free Research)
This short webcast defines  a 7-step process that will equip your HCO with improved risk management and compliance strategies to best protect healthcare data and avoid violation fines. 
(WEBCAST) READ ABSTRACT |

Interview with Craig Hayman: Where and how Software as a Service is making a difference by IBM

April 2014 - (Free Research)
Join Steve Rogers, Director of the IBM Center for Applied Insights and Craig Hayman, General Manager for IBM Software Industry Solutions to learn about how companies are using SaaS for better decision making, improved collaboration, and quicker market-focused agility. 
(WEBCAST) READ ABSTRACT |

Cloud Provisioning: Provision. Orchestrate. Innovate. by OpenText

December 2013 - (Free Research)
In this white paper, learn about a cloud provisioning technology with a workflow-enabled framework, allowing you to create, provision, and orchestrate virtual "bundles" of on-premise and cloud capabilities that make up a new product, service, or application. 
(WHITE PAPER) READ ABSTRACT |

Advanced Malware Protection for your Email Services by Cisco Systems, Inc.

April 2014 - (Free Research)
This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services. 
(WHITE PAPER) READ ABSTRACT |

Recovery Performance-Based Pricing: An Innovation to Drive Business Growth by Asigra

December 2013 - (Free Research)
This whitepaper explores how service providers offer data protection in the marketplace and how they can adapt to data growth, BYOD and mobile workforces. 
(WHITE PAPER) READ ABSTRACT |

IBM System x x86 servers: Earning consistently high customer satisfaction through strength in hardware and support services by IBM and Intel

August 2013 - (Free Research)
This white paper details the value of an exceptional support team. 
(WHITE PAPER) READ ABSTRACT |

A Smarter Approach to IT: The Software-Defined Data Center and IT as a Service by VMware, Inc.

March 2014 - (Free Research)
This webcast covers how IT must transform the way it delivers services with IT-as-a-Service and how a software-defined data center is the foundation you need. 
(WEBCAST) READ ABSTRACT |

From MDM To Automation, CPI Charts Course For Managed Services Success With N-ABLE by N-able Technologies

October 2013 - (Free Research)
Read this whitepaper to find out why CPI chose N-able to help them move past traditional product-based delivery sales model and achieve greater growth. 
(WHITE PAPER) READ ABSTRACT |

Accelerate your Managed Services with the MSP Playbook and get an exclusive look at our new MSP Playbook by N-able Technologies

October 2013 - (Free Research)
Tune in now to access a helpful how-to playbook for understanding best business practices for your organization as a managed services provider (MSP). 
(WEBCAST) READ ABSTRACT |

Demand Pricing That Matches Business Value – The Radical Sourcing Trend for 2013 by Asigra

January 2013 - (Free Research)
This guide explores the nature of IT pricing models and how current obsolete models are costing MSPs a fortune. 
(WHITE PAPER) READ ABSTRACT |

Customer experience consistency key to successful CRM by TechTarget

April 2014 - (Free Research)
Customer service plays an integral role in business continuity, but in order to provide optimal customer satisfaction you need to access customer information and that takes integration, and a solid security plan. Take this brief survey and gain access to this guide showcasing a new realm of customer service that reaches far beyond the call center. 
(RESOURCE) READ ABSTRACT |

Forging a CEM Strategy That Can Power Commerce by SearchCRM

April 2014 - (Free Research)
With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach. 
(EBOOK) READ ABSTRACT |

How to Fine-Tune your Contact Center by SearchCRM

August 2013 - (Free Research)
With call center software, best business practices can be difficult to navigate. But the payoff is worth investigating. In this handbook, readers find detailed explanations of the latest call center technologies as well as insight on call center management—including schedule and workforce management. 
(EGUIDE) READ ABSTRACT |

Modern Infrastructure – April 2014 by SearchDataCenter.com

April 2014 - (Free Research)
Some enterprises are charging ahead with a cloud-first approach to their workloads—not just test and dev, but production workloads as well. This most recent, April-edition of Modern Infrastructure details several organizations for whom this cloud-first approach has proved very effective. 
(EZINE) READ ABSTRACT |

1 - 25 of 494 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts