PCI Compliance Reports

E-Guide: Shortcut guide to Web application firewall deployment
sponsored by TechTarget Security
EGUIDE: Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

TechTarget Security

Escaping PCI purgatory
sponsored by IBM
WHITE PAPER: IBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more.
Posted: 21 Sep 2009 | Published: 01 Feb 2009

IBM

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Red Hat and JBoss

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine

PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE: High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010

IBM

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine