credit card

Results 26 - 50 of 124Sort Results By: Published Date | Title | Company Name
Published By: Wasabi     Published Date: Oct 24, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
    
Wasabi
Published By: Wasabi     Published Date: Oct 23, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
wasabi, cloud storage, data storage, storage solutions
    
Wasabi
Published By: Wasabi     Published Date: Oct 20, 2017
For the past several years cloud storage has been dominated by three main players, Amazon, Google and Microsoft, offering relatively comparable services and solutions. Armed with revolutionary technology and an egalitarian philosophy, Wasabi is transforming what cloud storage can be and do. In this white paper we focus on cloud storage pricing comparing the economics of Wasabi versus the leading cloud storage options. Free trial with no credit card required offer available as well.
Tags : 
cloud storage, wasabi, cloud computing, storage, data protection
    
Wasabi
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
Published By: Dell EMC     Published Date: Aug 17, 2017
In a market where compute and storage resources can be bought on demand with a credit card, vendors of on-premises hardware are seeking to tip the scales in their favor with ‘cloud-like’ pricing models that eliminate the need to commit capital to new platforms. At Dell EMC World in May, Dell Financial Services (DFS) rolled out Cloud Flex for HCI (hyperconverged infrastructure), part of the company’s push to evangelize the start-small-and-scale-up virtues of HCI technology. Cloud Flex lets customers acquire equipment on an all-opex basis, with no up-front product cost, steady monthly payments that reduce by up to 30% annually, and the ability to turn in equipment any time after 12 months without penalty. It’s part of a series of moves by Dell EMC meant to ease the financial risk of sticking with on-premises infrastructure in a cloud-enabled world
Tags : 
storage resources, hyperconverged appliance, hyperconverged infrastructure, cloud, cloud pricing model
    
Dell EMC
Published By: Comdata     Published Date: Jul 05, 2017
With the start of the new year, it's the perfect time to evaluate whether virtual credit cards (a unique, 16-digit credit card number used for a single vendor payment, aka ePayables) are a good fit for your organization. To help, we have created this checklist.
Tags : 
    
Comdata
Published By: Comdata     Published Date: Jul 05, 2017
The CEO’s signature is on the dotted line and you’ve convinced your executive team to implement a virtual credit card program, also known as ePayables. That is something to celebrate! After all, you have taken the first step in automating your AP processes, improving your profit margin and reducing paper checks. But don’t celebrate for too long; it’s time to get started on implementing your program so you can start reaping the rewards.
Tags : 
    
Comdata
Published By: Comdata     Published Date: Jul 05, 2017
So you’re thinking about implementing a virtual credit card program (also known as ePayables or virtual payments) or changing your current provider. This is the first step to a hopefully beautiful and successful new partnership, but how do you know which provider is the best fit? While we can’t pick your provider for you, we can offer a few important points of consideration.
Tags : 
    
Comdata
Published By: Comdata     Published Date: Jul 05, 2017
If you are involved in purchasing or financial decision-making for your company, you have likely heard the excitement surrounding virtual credit cards (also known as electronic or epayables) over the last few years. The payment industry is moving increasingly towards paperless vendor payments, and it is important to understand how they can benefit your business and what to look for in a virtual payment provider as you research solutions for your business.
Tags : 
    
Comdata
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: CradlePoint     Published Date: May 17, 2016
This global corporation of quick service restaurants has about 17,500 locations serving millions of customers each day with concepts including popular pizza, chicken, and Tex-Mex chains. Most of the restaurants are on a wired network with Cisco routers, the main function of which is to process credit card purchases. With so many transactions taking place every day, the corporation decided to invest in a wireless failover system to guarantee uninterrupted connection. After careful consideration, the corporation chose Cradlepoint to provide “four-nines” (99.99% or better) connectivity via 3G/4G/LTE or wireless backup. - See more at: https://cradlepoint.com/success_stories/quick-service-restaurant-chain#sthash.ODr3J5uT.dpuf
Tags : 
    
CradlePoint
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: Zooz Payments     Published Date: Feb 11, 2016
This comprehensive eBook reviews the merchant’s top considerations before implementing a payments system.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems
    
Zooz Payments
Published By: Zooz Payments     Published Date: Feb 11, 2016
This white paper will describe the main problems merchants face when it comes to customer conversions and payment acceptance, and suggest solutions that will enable you to increase your conversion rate.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems
    
Zooz Payments
Published By: Zooz Payments     Published Date: Nov 27, 2015
This ebook explores the connectivity and integration costs of managing a wide range of preferred payment methods and guides you through the hidden consumer costs and foreign exchange fees.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems
    
Zooz Payments
Published By: Zooz Payments     Published Date: Nov 27, 2015
Learn how international online shoppers prefer to complete their purchases. Understand how to offer the most compelling payment method to the largest international markets.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems
    
Zooz Payments
Published By: Equinix     Published Date: Sep 28, 2015
Interconnected Commerce: A Revolution in Value Creation, commissioned by Equinix and produced by Aite Group, discusses the state of the global payments ecosystem and its evolution into a core component of commerce enablement.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends
    
Equinix
Published By: Equinix     Published Date: Sep 28, 2015
This paper summarises the main observations extracted from the Interconnected Commerce: A Revolution in Value Creation whitepaper.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends
    
Equinix
Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards, chargeback liability
    
Sage
Published By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : 
point of sale, security for your retail shop, ipad pos, pos security
    
Revel Systems
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.