pci

Results 201 - 225 of 277Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: Appcito     Published Date: Apr 09, 2015
Traditionally, rollout of a new software version has been a critical and painful process. In the past, new versions were implemented along with a maintenance period (i.e., service downtime), resulting in loss of business for that period. This downtime was generally acceptable when there were only a few releases a year. But now—in a more fast-paced world of hosted software-as-aservice (SaaS) solutions, increased responsiveness and daily or even more frequent releases—down times are no longer acceptable or a?ordable. Continuous Delivery is a practice used in the software industry to automate and improve the process of software delivery. It is all about adopting practices to release high-quality software fast through automation of the build, test and deployment processes.
Tags : 
saas solutions, responsiveness, cloud delivery, continuous delivery, high-quality software, deployment processes, continuous deployment, cloud applications, cloud application delivery, knowledge management, business technology
    
Appcito
Published By: Appcito     Published Date: Apr 09, 2015
Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.
Tags : 
cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws, visibility, networking, business technology
    
Appcito
Published By: Appcito     Published Date: Apr 09, 2015
Appcito CAFE (Cloud Application Front End) is an easy-to-deploy, uni?ed and cloud-native service enabling cloud application teams to select and deploy enterprise-grade L4 to L7 application network services. The multi-cloud CAFE service is available for the OpenStack open-source cloud computing software platform. OpenStack is a multivendor ecosystem used to deploy Infrastructure-as-a-Service (IaaS) solutions. It allows users to bring compute, storage, and networking resources into private and public clouds through a set of open APIs.
Tags : 
openstack, cloud applications, load balancing, application security, cloud application delivery, enterprise applications, business technology
    
Appcito
Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services, enterprise applications
    
Appcito
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, business technology
    
Rapid7
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
    
Q1 Labs
Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers
    
Viavi Solutions
Published By: EarthLink Business     Published Date: May 15, 2014
This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).
Tags : 
earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
EarthLink Business
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
Demonstrating compliance with PCI DSS is far from a trivial exercise. Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : 
compliance, pci, dss, technical, security, challenges, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : 
operations, structure, compliance, security, management, data
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Simplifying PCI DSS Compliance.
Tags : 
compliance, data, security, structure, management
    
AlienVault
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: Oracle Corp.     Published Date: Jan 16, 2013
Implementing Oracle Exalogic in a Payment Card Environment
Tags : 
oracle, pci compliance, oracle exalogic, business technology
    
Oracle Corp.
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Network performance Monitoring and diagnostics (NPMD) solutions are designed to capture and in many cases store network conversations in order to manage and troubleshoot IT service issues. Therefore, your NPMD solution must be viewed as an integral part of PCI DSS compliance efforts and never compromise these initiatives. This white paper goes through the best offerings that can strengthen these efforts.
Tags : 
    
Viavi Solutions
Published By: Symantec     Published Date: Nov 30, 2015
El año pasado, un 7% de los españoles1 realizaron sus compras navideñas por Internet, así que es evidente que los vendedores tienen que poner a punto la maquinaria del comercio electrónico. Entre las compras en línea, la opción de reserva por Internet y recogida en tienda y las cartas a los Reyes, estas navidades se disparará el volumen de datos y de ventas. Así que tendrá que garantizar la seguridad de los clientes que visitan su sitio web si no quiere recibir carbón
Tags : 
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Common PCI DSS compliance challenges Questions to ask as you plan and prepare Core capabilities needed to demonstrate compliance How to simplify compliance with a unified approach to security
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications, storage
    
NEC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.