Visa DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Visa Data returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Virtualization
 •   Technology Outsourcing
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Integrated E-Commerce Solutions
 •   Treasury / Cash / Risk Management
 •   Customer Relationship Management (CRM)
 •   Customer Information Management/ Customer Databases

Related Searches
 •   Downloads Visa Data
 •   Issues Visa Data
 •   Mac Visa Data
 •   Managers Visa Data
 •   Visa Data Audits
 •   Visa Data California
 •   Visa Data Check
 •   Visa Data Pos
 •   Visa Data Sql
 •   Visa Group
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Computer Weekly 15 November 2011: Read this week's issue of the UK's leading technology publication, with all the latest news, analysis and opinion for IT managers by ComputerWeekly.com

November 11, 2011 - (Free Research)
In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now. 
(EZINE)

Visa Desjardins Provides a Differentiated Customer Experience by Genesys

February 27, 2013 - (Free Research)
Access this video case study today to learn how Visa Desjardins – the largest financial cooperative group in Canada – optimized customer service delivery by investing in a new blended call center environment. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 8 April 2014: Cloud wars by ComputerWeekly.com

April 08, 2014 - (Free Research)
In this week's Computer Weekly, cloud users are set to benefit from cheaper services as Google and Amazon start a price war. The mainframe is still not dead yet – we look at 50 years of the IBM mainframe. And we assess the latest attempt to encourage overseas IT experts to fill the UK's skills shortages. Read the issue now. 
(EZINE) READ ABSTRACT |

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 22, 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 05, 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 01, 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

Complying with Payment Card Industry Data Security Standards Using SEA System I Solutions by Software Engineering of America, Inc.

February 2008 - (Free Research)
This document highlights how Software Engineering of America's solution for the System i help to ensure PCI Compliance. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by Bit9, Inc.

June 2009 - (Free Research)
As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance... 
(WHITE PAPER) READ ABSTRACT |

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.

October 2010 - (Free Research)
In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security. 
(WHITE PAPER) READ ABSTRACT |

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS) by IBM

July 2011 - (Free Research)
This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information. 
(WHITE PAPER) READ ABSTRACT |

Building a digital government based on user needs by ComputerWeekly.com

December 2013 - (Free Research)
Liam Maxwell the government’s first chief technology officer talks about his strategy to deliver the technology that the user needs. 
(PRESENTATION) READ ABSTRACT |

CW Special Report on CSC by ComputerWeekly.com

April 2013 - (Free Research)
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Customer Data Security: PCI and Beyond - Benchmark Study 2008 by Apani

March 2008 - (Free Research)
This 2008 Customer Data Security Study reveals how quickly and how well retailers are responding to the PCI mandate and what measures retailers are taking now to minimize the risks associated with the capture, retention, and use of customer-specific data. 
(WHITE PAPER) READ ABSTRACT |

The Seattle Times Meets with Imprivata OneSign™ Deadlines and Security Needs by Imprivata

January 2008 - (Free Research)
With OneSign up and running, The Seattle Times saw an immediate improvement in its security policy enforcement. 
(CASE STUDY) READ ABSTRACT |

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks by Lumension

December 2013 - (Free Research)
This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs. 
(WHITE PAPER) READ ABSTRACT |

SC Magazine Security Brief: Server Side Risk by Lumension

April 2014 - (Free Research)
This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks. 
(WHITE PAPER) READ ABSTRACT |

The 5 Key Tactics for Dealing with Advanced Persistent Threats by Lumension

December 2013 - (Free Research)
This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks. 
(WHITE PAPER) READ ABSTRACT |

What Businesses Need to Know About Cyber Security by Lumension

April 2014 - (Free Research)
Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world. 
(WEBCAST) READ ABSTRACT |

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus by Lumension

April 2014 - (Free Research)
Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks. 
(WHITE PAPER) READ ABSTRACT |

Third Party Applications: A Chink in Your Armour by Lumension

April 2014 - (Free Research)
This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management. 
(WEBCAST) READ ABSTRACT |

Is Your AV Keeping Up? by Lumension

April 2014 - (Free Research)
This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system. 
(WEBCAST) READ ABSTRACT |

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them by Lumension

April 2014 - (Free Research)
This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them. 
(WEBCAST) READ ABSTRACT |

Endpoint Security Compliance: Top 19 Questions Auditors Ask by Lumension

April 2014 - (Free Research)
This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time. 
(WEBCAST) READ ABSTRACT |

Hitachi Unified Storage VM All Flash System: Comparative Guide by Hitachi Data Systems

January 2014 - (Free Research)
This white paper provides an in-depth comparative guide to 9 different all-flash storage models as they are compared between 25 features. 
(WHITE PAPER) READ ABSTRACT |

The 2014 Endpoint Security Buyers Guide by Lumension

August 2013 - (Free Research)
This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts