Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

pci

Results 1 - 25 of 264Sort Results By: Published Date | Title | Company Name
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Zendesk     Published Date: Dec 10, 2018
Sus clientes tienen más conocimientos técnicos que nunca y han descubierto que prefieren resolver los problemas y dudas por sí mismos. Estudios realizados por ICMI durante años han confirmado que los clientes prefieren resolver los problemas por sus propios medios y en sus canales preferidos . Además, solo buscan una interacción directa cuando han agotado infructuosamente las opciones de autoservicio. Esta opinión está respaldada por los datos de American Express, según los cuales un 48 % de los clientes prefiere hablar con un representante de servicio de atención al cliente cuando tiene que resolver problemas complicados, pero solamente un 16 % escoge el mismo método de contacto para los asuntos más simples . Este documento tiene un objetivo sencillo: queremos ayudarle a generar un portal unificado que incluya su base de conocimientos, su comunidad y sus clientes. Todo esto se puede hacer con un Centro de Ayuda como Zendesk Guide.
Tags : 
    
Zendesk
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
¿Está usted planificando en forma activa para la revolución digital de RR. HH.? La revolución digital de RR.HH. ha llegado y está avanzando a gran velocidad, y las organizaciones están buscando formas nuevas, efectivas y productivas de cumplir con las crecientes exigencias del negocio: agilidad, acceso global 24x7, velocidad y precisión. Las organizaciones líderes saben que necesitan generar disrupción o verse afectados por ella, por lo tanto han comenzado a crear entornos de trabajo completamente nuevos a los que llamamos la revolución digital en el trabajo. Está cambiando la forma en que pensamos y nos relacionamos con el trabajo cotidiano.
Tags : 
    
SAP SuccessFactors
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: Ability Commerce     Published Date: May 18, 2009
The Pro's and Con's of Frequency for online retailers. There is a happy medium for the frequency of an email newsletter or special promotions. The more you mail in the short term, the more revenue you will see, but what are the long term effects?
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Ability Commerce     Published Date: May 18, 2009
As direct marketers, you know "the devil is in the details." Being able to drill-down on results is important to determine future strategies. It takes discipline and the application of direct marketing tenets. But you can fine-tune your results, target better and reap the rewards.
Tags : 
ability commerce, seo, email frequency, metrics, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Ability Commerce     Published Date: May 18, 2009
Reggie Brady shares some of her favorite e-mails and explain why they're tops in her book. As you read them, think about how you might incorporate these tactics in your own e-mail programs.
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Ability Commerce     Published Date: May 18, 2009
It always surprises me that as eCommerce marketers we give lip service to the importance of testing, buy many of us don't take the time to fine-tune our email programs. If you are able to identify a few elements through testing that resonate with your customers and then employ those insights in your ongoing program, the improvements may be sustainable over time.
Tags : 
ability commerce, seo, email frequency, email test, lead generation, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Megaplan IT     Published Date: Jul 16, 2012
An in-depth overview of techniques your company can employ to reduce the scope of your cardholder environment and lower costs associated with PCI DSS Compliance.
Tags : 
    
Megaplan IT
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
Choosing the right server means deciding on the right balance of I/O and computer power for your workloads. When you need a tremendous amount of raw I/O power, you may want to consider a configuration with NVMe PCIe solid-state drives (SSDs). These SSDs connect directly to the processors, bringing storage close to computer and providing fast performance. The Intel® Xeon® Scalable processor-powered Dell EMC PowerEdge™ R740xd has the compute and I/O scalability to handle four, eight, or twelve NVMe PCIe SSDs. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
IDC, la agencia de inteligencia de mercados de TI, realizó un estudio global entre más de 3500 líderes de TI de todo el mundo y descubrió que empresas de todos los niveles están planteándose modelos de PC Lifecycle as a Service para reducir costes, acortar los ciclos de renovación y adquirir mejores equipos para sus empleados. Dell PC as a Service (PCaaS) combina hardware, software, servicios durante el ciclo de vida y financiación en una única solución todo en uno, a un único precio predecible por puesto al mes, proporcionada por Dell Financial Services. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Gate2Shop     Published Date: Jan 28, 2011
Due to the constantly changing global online payment landscape, online businesses of all sizes need payment solutions that can be easily adapted to their needs. E-commerce providers must take a step ahead and continue to add more innovative features to the continuously growing portfolio of e-commerce solutions. Are you making it easy for your customer to purchase?
Tags : 
gate2shop, ecommerce service provider, online payment, e-commerce solution, compliance, pci, data security standard of visa
    
Gate2Shop
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: SAP SME     Published Date: Apr 10, 2018
La industria de manufactura discreta es un facilitador clave de éxito en otras industrias, es por eso que necesitan reconocer y adoptar nuevas prioridades estratégicas para triunfar. Obtener una ventaja digital requiere la adopción de nuevas tecnologías, el aprovechamiento de los datos y la optimización de los procesos de negocio necesarios para impulsar la innovación y el valor central del negocio. Nuevas tecnologías como IoT e Inteligencia Artificial pueden ayudar a aprovechar la gran cantidad de datos que generan las empresas de fabricación y convertirlos en impulsores de éxito.
Tags : 
    
SAP SME
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IDC, la agencia de inteligencia de mercados de TI, realizó un estudio global entre más de 3500 líderes de TI de todo el mundo y descubrió que empresas de todos los niveles están planteándose modelos de PC Lifecycle as a Service para reducir costes, acortar los ciclos de renovación y adquirir mejores equipos para sus empleados. Dell PC as a Service (PCaaS) combina hardware, software, servicios durante el ciclo de vida y financiación en una única solución todo en uno, a un único precio predecible por puesto al mes, proporcionada por Dell Financial Services. Obtenga más información sobre las soluciones Dell con tecnología Intel®
Tags : 
estudio, idc, service, experimentado, adopcion, dell
    
Dell PC Lifecycle
Published By: Allscripts     Published Date: Oct 14, 2015
Download this Chronic Care Management Infographic to see the current state of patients with chronic conditions, the healthcare they are receiving, and healthcare spending.
Tags : 
chronic care management, chronic conditions, healthcare spending, comprehensive primary care initiative, cpci
    
Allscripts
Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
De un solo vistazo Gracias al nuevo software CA Project & Portfolio Management (CA PPM) 15.3, podrá adaptar proyectos a cualquier unidad de negocio con la facilidad que ofrece la acción de arrastrar y soltar. A partir de ahora, los trabajadores no pasarán días preparando proyectos, les bastará con solo unos minutos, ya se trate de un flujo de trabajo complejo para el departamento de recursos humanos o de una gestión de tareas sencilla para el departamento de ventas. Agregue la opción de colaborar en la propia aplicación para eliminar reuniones redundantes, una cuadrícula conocida, ya que se parece a la de Microsoft Excel®, para gestionar presupuestos y una conexión nueva para herramientas de inteligencia empresarial (BI) de terceros para encontrar respuestas, y contará con la aplicación de gestión de carteras de proyectos más moderna del mercado en la actualidad.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Las modernas soluciones, como CA Project & Portfolio Management (CA PPM), siguen superando el listón de las herramientas de gestión de la demanda de TI de última generación y proporcionan continuamente nuevas funciones que aligeran la carga del PMO, el gestor financiero, el gestor de recursos y el gestor de productos. En los últimos años, los nuevos distribuidores que buscan aprovechar el gran mercado, cada vez más influyente, de gestión de proyectos y carteras (PPM) han desarrollado módulos que “encajan” en las plataformas SaaS. Estos distribuidores declaran que sus herramientas son fáciles de instalar, de gestionar y permiten ahorrar costes al cliente. Increíble, pero cierto. Y es así para la mayoría de las organizaciones.
Tags : 
    
CA Technologies EMEA
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search