credit card

Results 26 - 50 of 121Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Riskified     Published Date: Aug 06, 2019
In the competitive world of eCommerce, online retailers must provide an optimal customer experience or risk losing business. But many are seeing their hardearned revenue fall victim to costly credit card chargebacks.
Tags : 
    
Riskified
Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards, chargeback liability
    
Sage
Published By: Equinix     Published Date: Sep 28, 2015
This paper summarises the main observations extracted from the Interconnected Commerce: A Revolution in Value Creation whitepaper.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends
    
Equinix
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification
    
Kofax
Published By: Kofax     Published Date: Sep 08, 2011
See how some retail banks have redirected their focus to a more customer -centric approach. This whitepaper includes success stories from Banco Inversis and GMAC Commercial Mortgage Corporation (now Ally Financial) which highlight how Kofax has helped them maintain and even increase their competitive edge.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification
    
Kofax
Published By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification
    
Kofax
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: Datastax     Published Date: Mar 06, 2018
Ever since the invention of the abacus, the banking industry has been on the leading edge of technological innovation. Today more than ever, the industry relies on game-changing software to provide high-performing business-critical operations, analysis, and insights for retail banking, loans, credit cards, and more.
Tags : 
    
Datastax
Published By: Comdata     Published Date: Jul 05, 2017
With the start of the new year, it's the perfect time to evaluate whether virtual credit cards (a unique, 16-digit credit card number used for a single vendor payment, aka ePayables) are a good fit for your organization. To help, we have created this checklist.
Tags : 
    
Comdata
Published By: Comdata     Published Date: Jul 05, 2017
The CEO’s signature is on the dotted line and you’ve convinced your executive team to implement a virtual credit card program, also known as ePayables. That is something to celebrate! After all, you have taken the first step in automating your AP processes, improving your profit margin and reducing paper checks. But don’t celebrate for too long; it’s time to get started on implementing your program so you can start reaping the rewards.
Tags : 
    
Comdata
Published By: Comdata     Published Date: Jul 05, 2017
So you’re thinking about implementing a virtual credit card program (also known as ePayables or virtual payments) or changing your current provider. This is the first step to a hopefully beautiful and successful new partnership, but how do you know which provider is the best fit? While we can’t pick your provider for you, we can offer a few important points of consideration.
Tags : 
    
Comdata
Published By: Comdata     Published Date: Jul 05, 2017
If you are involved in purchasing or financial decision-making for your company, you have likely heard the excitement surrounding virtual credit cards (also known as electronic or epayables) over the last few years. The payment industry is moving increasingly towards paperless vendor payments, and it is important to understand how they can benefit your business and what to look for in a virtual payment provider as you research solutions for your business.
Tags : 
    
Comdata
Published By: SundaySky     Published Date: Mar 06, 2018
Card members at this consumer retail bank, enjoy a large variety of products and services. The bank offers standard banking transactions, credit cards, insurance, and investment products. After the 2008 financial crisis, the bank experienced a sharp decline in overall customer satisfaction, and also learned that its customers were more empowered than before. In order to adapt, the bank adopted a customer-centric approach by introducting: • A new customer motto: “Know me, value me, make it easy for me, and protect me” • A new core initiative is to always teach digital first • An understanding that customers are serviced on the digital channels they prefer to use SundaySky SmartVideo enables the bank to take a strategic approach to enhancing the customer engagement process with personalized video experiences that welcome new card members and assist them in fully understanding how to get the most out of their new product.
Tags : 
    
SundaySky
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : 
pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security
    
Solidcore
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite
Published By: BMC ASEAN     Published Date: Dec 18, 2018
DevOps is fast becoming a core competency required to gain competitive advantage. At its most basic level, DevOps is a team approach to drive agile modern application development and operations to deliver high quality critical digital business services. Cloud services are fundamentally changing the way applications are developed. The near ubiquitous, lowfriction access to cloud computing for developers, who can literally access powerful computing resources at the touch of a keystroke or swipe of a credit card, has fundamentally altered the software development lifecycle (SDLC).
Tags : 
    
BMC ASEAN
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: Cartera Commerce     Published Date: Feb 15, 2012
Want to boost sales with offers linked to shoppers' debit, credit and loyalty cards? This primer highlights the card-linked offer-how it works, projections for market growth and a merchant case study with real results.
Tags : 
cartera commerce, mall networks, cartera, catera, vesdia, vesdia, mallnetworks, merchant-funded
    
Cartera Commerce
Published By: Cartera Commerce     Published Date: Mar 21, 2012
For many local merchants, offers linked to consumer credit/debit cards let you optimize your overall marketing program. Download the eBook and understand the new way for local business to attract new customers-and keep them.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network
    
Cartera Commerce
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : 
gfi, pci dss, credit card, event log management, network vulnerability management, compliance
    
GFI Software
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
    
IBM
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.