PCI DSS Reports

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications
sponsored by Paymetric, Inc.
WHITE PAPER: Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.
Posted: 22 Jan 2008 | Published: 01 Jan 2008

Paymetric, Inc.

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Bluelock Virtual Datacenters Instrumental in Patronpath’s PCI-DSS Compliance in the Cloud
sponsored by Bluelock
WHITE PAPER: One of the biggest challenges and concerns of businesses moving to the cloud is ensuring regulatory compliance and security. Discover how Patronpath, a company that processes and handles online credit card transactions for customers, increased scalability and decreased costs by adopting PCI-compliant cloud services.
Posted: 14 May 2012 | Published: 02 May 2012

Bluelock

eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by TechTarget ComputerWeekly.com 
EBOOK: Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

TechTarget ComputerWeekly.com 

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER: Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008

Alert Logic

Passing a PCI Audit: A Global Perspective on Security Payment Card Data
sponsored by IBM
EGUIDE: SearchSecurity.com presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

IBM

Three Steps to PCI Compliance in the Cloud
sponsored by TechTarget Security
EGUIDE: PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

TechTarget Security