Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization
sponsored by HyTrust
CASE STUDY:
With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage
sponsored by IBM
EGUIDE:
In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage.
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
PCI-Compliant Cloud Reference Architecture
sponsored by HyTrust
WHITE PAPER:
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
Preparing an RFI for Virtualization and the PCI Data Security Standard
sponsored by HyTrust
WHITE PAPER:
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS).
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE:
This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011
|
|
|
PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by TechTarget Security
EBOOK:
SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010
|
|
|
Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST:
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010
|
|
|
Knowledge is Power
sponsored by IBM
WHITE PAPER:
Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010
|
|
|
Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER:
Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010
|
|
|
Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE:
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010
|
|
|
Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER:
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010
|
|
|
PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE:
High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010
|
|
|
Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER:
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
Posted: 14 Apr 2010 | Published: 14 Apr 2010
|
|
|
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by TechTarget Security
EBOOK:
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010
|
|
|
Escaping PCI purgatory
sponsored by IBM
WHITE PAPER:
IBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.
Posted: 21 Sep 2009 | Published: 01 Feb 2009
|
|
|
LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009
|
|
|
Overcoming the Three Biggest PCI Challenges
sponsored by Alert Logic
PRESENTATION TRANSCRIPT:
PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
Posted: 20 Aug 2009 | Published: 19 Aug 2009
|
|
|
The Best PCI Audit of Your Life
sponsored by Lumension
WHITE PAPER:
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
Posted: 13 Aug 2009 | Published: 13 Aug 2009
|
|
|
Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM
sponsored by Red Hat and JBoss
CASE STUDY:
In 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.
Posted: 28 Jul 2009 | Published: 28 Jul 2009
|
|
|
PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER:
Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008
|
|
|
Profiting from PCI Compliance
sponsored by IBM
WHITE PAPER:
This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Posted: 13 Mar 2009 | Published: 01 Sep 2007
|
|
|
PCI DSS Success: Archiving Compliance and Increasing Web Application Security
sponsored by Citrix
WHITE PAPER:
This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
Posted: 19 Sep 2008 | Published: 18 Sep 2008
|
|
|
Cisco PCI Compliance Services
sponsored by Cisco Systems, Inc.
BROCHURE:
Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.
Posted: 08 Jul 2008 | Published: 01 Dec 2007
|
|
|
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
Customer Data Security: PCI and Beyond - Benchmark Study 2008
sponsored by Apani
WHITE PAPER:
This 2008 Customer Data Security Study reveals how quickly and how well retailers are responding to the PCI mandate and what measures retailers are taking now to minimize the risks associated with the capture, retention, and use of customer-specific data.
Posted: 18 Mar 2008 | Published: 01 Jan 2007
|
|