pci

Results 51 - 75 of 282Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: Intel     Published Date: Aug 24, 2017
Debido a los cambios tecnológicos que se están dando en las organizaciones, estas dependerán cada vez más de plataformas digitales para proveer sus productos y servicios. Más de la mitad de las empresas con las que hablamos, dijeron que incrementarían sus gastos en su principal hosting, y en su CSP (Proveedor de Servicio de Nube) para el 2017, y los planes por Q para alojamiento así como CSP demuestran que los gastos irán incrementando persistentemente. Al suscribirte, estás confirmando que eres mayor de 18 años, y que estás de acuerdo con que Intel te contacte a través de emails relacionados a marketing o por teléfono con información sobre productos de Intel, eventos y actualizaciones. Puedes cancelar tu suscripción cuando quieras. Las páginas web de Intel están sujetas a nuestro aviso de privacidad y Términos y Usos.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 05, 2017
Intel® Xeon® y Microsoft® Azure™, apoyando el crecimiento de la CRE. Las atribuciones de la CRE se han triplicado tras la aprobación de La Reforma Energética en 2013, por ende la CRE se enfrentó a nuevos retos que implicaron una profunda y rápida reestructuración en la forma de trabajo. La creación de la Oficialía de Partes Electrónica (OPE) y la decisión de utilizar una nube híbrida para hacer llegar estos servicios directamente a los permisionarios fueron factores determinantes para lograr alcanzar las metas. Al suscribirte, estás confirmando que eres mayor de 18 años, y que estás de acuerdo con que Intel te contacte a través de emails relacionados a marketing o por teléfono con información sobre productos de Intel, eventos y actualizaciones. Puedes cancelar tu suscripción cuando quieras. Las páginas web de Intel están sujetas a nuestro aviso de privacidad y Términos y Usos.
Tags : 
    
Intel
Published By: Infinidat EMEA     Published Date: May 15, 2019
La disrupción digital, la inestabilidad económica, las convulsiones políticas y la escasez de talentos han sido señalados en algún momento de los dos últimos años como los culpables del fracaso empresarial o, al menos, de la pérdida de rentabilidad y ganancias.
Tags : 
    
Infinidat EMEA
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: Equinix EMEA     Published Date: May 17, 2019
A nivel mundial, los pagos se están volviendo digitales, ya sea en su conversión de dinero en efectivo a tarjetas, códigos QR en el punto de venta (POS), compras desde tiendas físicas a tiendas on line con formas de pago electrónicas o pagos realizados a través de una aplicación. Este fenómeno no es nuevo, y parece estar acelerándose. Esta velocidad de adopción se debe a múltiples factores, incluida una gran cantidad de nuevos métodos de pago electrónicos, muchos de los cuales se superponen a los métodos de pago existentes, enfocados en la conveniencia, la velocidad y la experiencia general del consumidor.
Tags : 
    
Equinix EMEA
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: IFS     Published Date: Aug 10, 2011
How Engineer, Procure, Construct, Install (EPCI, EPC) can identify technology designed to manage risk across design, fabrication and construction activities.
Tags : 
ifs, erp, epci, contracting business, epc, enterprise resource planning, engineer procure construct install, enterprise application
    
IFS
Published By: HGST     Published Date: Feb 05, 2015
Database users are increasingly interested in using Flash-based solid-state drives (SSDs) to speed up application performance. For many database administrators (DBAs), increased database performance directly impacts their user experience and bottom lines. Accelerating a single MySQL instance may allow DBAs to avoid painful sharding exercises, with all their attendant administration, application changes, and high capital and ongoing costs. With the wide range of SSDs available today, choosing any one can be difficult. This paper aims to answer the question, “Is it better to use slower SATA SSDs in RAID or a faster PCIe SSD to scale up MySQL database performance?"
Tags : 
solid-state storage, flash-based, database administrators, mysql, application changes, database users
    
HGST
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid state storage is increasingly deployed in all sizes of datacenters, from the small and medium business to the large enterprise. It comes in many forms including hybrid arrays, direct attached drives, PCIe flash and accelerators that fit somewhere in between servers and storage. With the price of flash continuing to drop, hybrid storage is becoming more compelling to the small and medium business for critical computing applications such as databases and day-to-day operational computing.
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Oct 17, 2016
Download and read this detailed “Redbook” from IBM to learn more about the capabilities and benefits you can realize from using IBM Predictive Customer Intelligence (PCI). You’ll learn how to use this sophisticated solution to enhance your customer relationships across all your channels and touch points.
Tags : 
ibm, commerce, analytics, ibm predictive customer intelligence, predictive intelligence, knowledge management, enterprise applications
    
IBM
Published By: Micron     Published Date: Jan 12, 2017
Micron’s 9100MAX delivers on the NVMe promise with 69% better throughput and transaction rates plus much lower latency in PostgreSQL OLTP. Download this technical marketing brief to learn more.
Tags : 
    
Micron
Published By: IBM     Published Date: Feb 27, 2017
Download and read this detailed “Redbook” from IBM to learn more about the capabilities and benefits you can realize from using IBM Predictive Customer Intelligence (PCI). You’ll learn how to use this sophisticated solution to enhance your customer relationships across all your channels and touch points.
Tags : 
ibm, predictive customer intelligence, pci, customer relationships, channel integration
    
IBM
Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic
Published By: BMC ESM     Published Date: Sep 15, 2009
Many CIOs are looking to implement the power of Cloud computing, but they don't know where to begin. How do you take full advantage of this technology and implement the correct strategy for your environment? What services should you offer via the Cloud? Read the paper, "Cloud Computing In Perspective," by BMC Software Chief Technology Officer Kia Behnia.
Tags : 
bmc esm, cio, cloud computing in perspective, itil, cloud computing environments, public, private, hybrid, hipaa, payment card industry, pci, business service management
    
BMC ESM
Published By: NetIQ     Published Date: Oct 25, 2012
An organization that excels at automating, standardizing and monitoring its systems and access controls can comply not only with PCI DSS, but with many other state and federal regulations that have similar mandates. Download this paper to learn more.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
This paper discusses the importance of file integrity monitoring, which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches.
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance, security, business technology
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security, business technology
    
NetIQ
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad, gestión de ti, next generation firewall, networking, security
    
McAfee
Published By: AlienVault     Published Date: Aug 14, 2015
Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
We'll cover: Common PCI DSS compliance challenges Questions to ask as you plan and prepare Core capabilities needed to demonstrate compliance How AlienVault Unified Security Management simplifies compliance and threat detection
Tags : 
    
AlienVault
Published By: SAP SME     Published Date: Aug 13, 2015
5 ejemplos de empresas exitosas alrededor del mundo que lo inspirarán para transformar la experiencia de su cliente, e incrementar sus ingresos: • 21Diamonds, maximiza las ventas de joyas personalizadas • Smith aumenta la ventas on-line • Galerías Lafayette brinda una excepcional experiencia de compra onmincanal • Grupo Leather&Schuh lleva la experiencia de cliente a un nuevo nivel • Entertainer sube los niveles de reputación de la marca y las ventas on-line
Tags : 
b2c, negocio a consumidor, plataforma digital, comercio electrónico, e-commerce, proyecto de comercio electrónico, omnicanalidad, iniciativa de comercio, sistema de comercio, plataforma de comercio, tienda virtual, tienda en línea, plataforma digital, experiencia de cliente, customer engagement, experiencia del consumidor
    
SAP SME
Published By: Forcepoint     Published Date: May 03, 2016
Todos nuestros productos están disponibles para una demostración personalizada. Por favor complete el formulario de la derecha. Algunos de nuestros productos —que se enlistan a continuación— también están disponibles para evaluaciones gratuitas (en inglés) para que pueda probarlos en su propio entorno de TI. De cualquiera de estas dos opciones, un representante de Forcepoint™ trabajará con usted para asegurarse de que esté evaluando exactamente el producto adecuado con las opciones adecuadas para usted. Para evaluaciones gratuitas, escoja el paquete de evaluación correspondiente abajo y complete el registro. Recibirá un mensaje de correo electrónico que lo guiará para configurar y administrar su evaluación. El soporte del producto estará disponible durante el tiempo que dure la evaluación del producto. Visite nuestra sección de soporte si tiene alguna pregunta.
Tags : 
    
Forcepoint
Published By: IBM APAC     Published Date: Oct 16, 2018
Modern AI, HPC and analytics workloads are driving an ever-growing set of data intensive challenges that can only be met with accelerated infrastructure. Designed for the AI era and architected for the modern analytics and AI workloads, Power Systems AC922 delivers unprecedented speed for the AI Era like up to 5.6 times as much bandwidth, which results from The only architecture enabling NVLink between CPUs and GPUs a variety of next-generation I/O architectures: PCIe gen4, CAPI 2.0, OpenCAPI and NVLINK. Proven simplified deep-learning deployment and AI performance
Tags : 
    
IBM APAC
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security, database security, solidcore, solid core, security
    
Solidcore
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.