Pci RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Pci Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Encryption and Key Management
 •   Virtualization

Related Searches
 •   Contacts Pci
 •   Impact Of Pci Risk
 •   Pci Print
 •   Pci Risk Arizona
 •   Pci Risk File
 •   Pci Risk Guide
 •   Pci Risk Maintenance
 •   Portal Pci
 •   Procurement Pci
 •   Sheets Pci Risk
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

LogRhythm 3-Minute Product Demo by LogRhythm, Inc.

September 09, 2009 - (Free Research)
This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure. 
(PRODUCT DEMO) READ ABSTRACT |

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension

October 06, 2009 - (Free Research)
This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance. 
(WHITE PAPER) READ ABSTRACT |

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.

October 04, 2010 - (Free Research)
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards. 
(WEBCAST) READ ABSTRACT |

Profiting from PCI Compliance by IBM

September 01, 2007 - (Free Research)
This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension

December 31, 2009 - (Free Research)
In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance by Skybox Security

October 02, 2009 - (Free Research)
PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

March 22, 2011 - (Free Research)
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

How Can Security Management Technologies Help Me with PCI Compliance? by CA Technologies.

August 11, 2009 - (Free Research)
Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure. 
(WHITE PAPER) READ ABSTRACT |

Winning the PCI Compliance Battle by Qualys

October 17, 2011 - (Free Research)
This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS. 
(WHITE PAPER) READ ABSTRACT |

Customer Data Security: PCI and Beyond - Benchmark Study 2008 by Apani

March 2008 - (Free Research)
This 2008 Customer Data Security Study reveals how quickly and how well retailers are responding to the PCI mandate and what measures retailers are taking now to minimize the risks associated with the capture, retention, and use of customer-specific data. 
(WHITE PAPER) READ ABSTRACT |

PCI compliance in the cloud: Can cloud service providers manage PCI? by Hewlett-Packard Company

April 2013 - (Free Research)
Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits. 
(EGUIDE) READ ABSTRACT |

Simplifying the Scope of the PCI Audit: How Cross-Platform Server Isolation Helps Retailers Achieve Compliance by Apani

February 2008 - (Free Research)
This paper will describe how Apani EpiForce can solve key aspects of the PCI compliance challenge. Apani® EpiForce® proactively eliminates vulnerabilities within the corporate network by isolating computers and the business-critical data, personal information and intellectual property stored on them into logical security zones. 
(ARTICLE) READ ABSTRACT |

PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com

October 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard. 
(EBOOK) READ ABSTRACT |

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.

October 2010 - (Free Research)
In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council by Dell SecureWorks UK

August 2011 - (Free Research)
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Protecting Credit Card Data: How to Achieve PCI Compliance by Motorola, Inc.

July 2007 - (Free Research)
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution. 
(WHITE PAPER) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Predictive Security Intelligence for Retail Organizations by Q1 Labs, an IBM Company

February 2012 - (Free Research)
This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management. 
(WEBCAST) READ ABSTRACT |

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere by Imperva

December 2013 - (Free Research)
This resource offers a Web application firewall solution that addresses the Open Web Application Security Project (OWASP) Top 10 security risks. 
(WHITE PAPER) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Achieving Compliance in a Virtualized Environment by Tripwire, Inc.

September 2008 - (Free Research)
The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Has Your QSA Let You Down? by Dell SecureWorks UK

May 2011 - (Free Research)
Check out this white paper to learn the different problems organizations have faced with their QSA's, how to recognize these problems, and how to avoid hiring a QSA that will present these problems. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Dell Networking Support for Payment Card Industry Data Security Standard by Dell, Inc.

February 2014 - (Free Research)
This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts