"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

pci compliance

Results 26 - 50 of 154Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
HP - Enterprise
Published By: LogRhythm     Published Date: Jan 24, 2013
Coalfire's assessment of LogRhythm's SIEM 2.0 solution validates the ability to meet specific PCI controls augment others. LogRhythm's technology encompasses key control areas for PCI compliance.
Tags : 
siem solution, logrhythm, solution, siem solution, pci controls, augment, pci compliance, it management
Published By: Firehost     Published Date: Jan 07, 2015
This Webinar covers all of the details you will need to know about PCI DSS 3.0.
Tags : 
pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, application security, security management
Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : 
pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management
Published By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
Published By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, security management
TriGeo Network Security
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control
Published By: CDW     Published Date: Nov 13, 2012
The standard can help organizations improve handling of personally identifiable information.
Tags : 
cdw, pci, dss, compliance, cybersecurity attack, hacker attacks, verizon, pos
Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, application security
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases, encryption, security management
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
Viavi Solutions
Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
Published By: SafeNet     Published Date: Sep 15, 2010
This paper offers a detailed look at tokenization and offers practical guidelines for helping organizations successfully employ tokenization so they can maximize the potential benefits.
Tags : 
safenet pci, pci compliance, tokenization, encryption, data masking
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks
WatchGuard Technologies
Published By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : 
database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection
Published By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
Published By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : 
netiq, roi, pci dss, compliance, security management
Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : 
gfi, pci dss, credit card, event log management, network vulnerability management, compliance
GFI Software
Published By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : 
ibm, pci dss, compliance, security, software compliance, sarbanes oxley compliance
Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management
Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data, security management
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
Secure Computing
Start   Previous    1 2 3 4 5 6 7    Next    End

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory