PCI Compliance

Results 1 - 25 of 130Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Jan 26, 2018
Read this AIIM white paper to learn how to tackle future information privacy and security concerns of new and future technologies such as IoT and machine learning, and prepare for the GDPR.
Tags : opentext, compliance, gdpr, gdpr compliance, information privacy, data protection, privacy, identity management, policy based management, security policies, pci compliance
     OpenText
By: Informatica     Published Date: Aug 21, 2017
Download this white paper today to understand How patients are stepping up and using data to disrupt the traditional doctor-patient relationships.
Tags : informatica, data management, cloud data management, collaboration, analytics, digital healthcare, mobile data systems, data protection, document management, information management, records management, pci compliance
     Informatica
By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : fortrust, compliance, pci compliance, hipaa, hipaa compliance, database development, data deduplication
     FORTRUST
By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : fortrust, compliance, pci compliance, hipaa, infrastructure, backup and recovery, hipaa compliance
     FORTRUST
By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards, network management, network performance management, internet security, intrusion detection, intrusion prevention, network security appliance, security management, pci compliance, vulnerability management
     BitSight Technologies
By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches, compliance, identity management, intrusion detection, intrusion prevention, security management, pci compliance
     IBM
By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance, share corporate content, sync, enterprise security, acronis access advanced solution, access control, application security, mobile computing, mobile data systems, pci compliance
     Acronis EMEA
By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance, security policies, pci compliance, vulnerability management
     IBM
By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection
     Thawte
By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
     Citrix
By: EarthLink Business     Published Date: May 15, 2014
This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).
Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink, network security, remote access, compliance, mobile workers, wireless phones, wireless security, workforce management, data protection, collaboration, messaging, secure content management, pci compliance
     EarthLink Business
By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : security compliance, users access management, it management compliance, security management, pci compliance
     NETIQ
By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, authentication, business continuity, compliance, hacker detection, identity management, web service security
     Rapid7
By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware, anti virus, application security, authentication, encryption, high availability, internet security, intrusion detection, intrusion prevention, security management, pci compliance, vulnerability management
     EMC
By: FireEye     Published Date: Mar 19, 2013
You have to do FISMA. You must defend against Cyber Threats.
Tags : fireeye, ciso, cyber security, fisma, cyber attacks, cyber exploits, anti spam, anti spyware, anti virus, application security, pci compliance
     FireEye
By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba, sox, cobit, iso, hipaa, fisma, database activity monitoring, database vulnerability manage, database activity monitoring, anti spyware, anti virus, auditing, compliance
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, email security, encryption, hacker detection, identity management, internet security
     McAfee
By: Qualys     Published Date: Nov 16, 2012
Get the facts on PCI Compliance and learn how to comply with the PCI data security standard.
Tags : pci compliance
     Qualys
By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : database, security, mcafee, data breach, compliance, ipsec, password management, database security, pci compliance
     McAfee
By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
     Symantec
By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
     Symantec
By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
     Symantec
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.