PCI Compliance White Papers

Results 1 - 25 of 120Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: APaySys     Published Date: May 01, 2014

Find out the 5 Easy Steps to PCI Compliance by downloading this white paper now.

Tags : apaysys, pci compliance, compliance, merchants, online business, ebusiness, credit cards, paypal
    
By: Bit9     Published Date: Apr 23, 2014

Download this white paper to learn the 9 strategies to think about when looking to take control of the security of your systems AND more easily maintain PCI compliance.

Tags : bit9, compliance, pci compliance, security, retail system, security solutions, validation, payment card security
    
By: Bit9     Published Date: Apr 23, 2014

This white paper explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : bit9, security, compliance, security solutions, visibility, detection, threat protection, cyber security
    
By: Bit9     Published Date: Apr 23, 2014

Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance.

Tags : bit9, security, compliance, data breach, cyber attack, threat protection, pci compliance, payment card industry
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: NETIQ     Published Date: Dec 03, 2013

A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.

Tags : security compliance, users access management, it management compliance, security management, pci compliance
    
By: Rapid7     Published Date: Jul 24, 2013

The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.

Tags : rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing
    
By: EMC     Published Date: Apr 18, 2013

The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware
    
By: FireEye     Published Date: Mar 19, 2013

You have to do FISMA. You must defend against Cyber Threats.

Tags : fireeye, ciso, cyber security, fisma, cyber attacks, cyber exploits, anti spam, anti spyware
    
By: McAfee     Published Date: Mar 08, 2013

McAfee Virtual Patching for Databases makes perfect sense for closing the window of risk, while saving dollars and minimizing business disruption.

Tags : database security, database patching, database compliance, database security patches, virtual patching, hipaa, pci dss, anti spyware
    
By: McAfee     Published Date: Mar 07, 2013

McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.

Tags : securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
By: McAfee     Published Date: Feb 06, 2013

This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
By: Qualys     Published Date: Nov 16, 2012

Get the facts on PCI Compliance and learn how to comply with the PCI data security standard.

Tags : pci compliance
    
By: McAfee     Published Date: Nov 14, 2012

Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.

Tags : database, security, mcafee, data breach, compliance, ipsec, password management, database security
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Cisco     Published Date: Jan 20, 2012

Discover how Virtual Radiologic uses Cisco Borderless Networks to secure electronic patient information transmitted between hospitals and doctors

Tags : cisco, radiology, healthcare, hospitals, sercure, information, virtual, borderless networks
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: NetIQ     Published Date: Dec 08, 2011

"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:

Tags : security, breach, management, security management, event, infrastructure, threat, threat detection
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
By: ScriptLogic     Published Date: Nov 14, 2011

This whitepaper discusses the challenges of native tools and the 7 key capabilities that you need so that you can effectively audit Active Directory.

Tags : active directory, auditing, native tools, centralized, data, secure, database, compliance
    
Start   Previous   1 2 3 4 5    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.