REGISTER

HISPI

Recorded: February 1 | 2012    View       

Cloud Computing has been hailed as the long sought after answer of low cost computing , where users can remotely store their data into the cloud and enjoy the on-demand high quality applications and services from a shared platform of computing resources. By outsourcing their data storage, users can be relieved from the burden of local data storage and maintenance, in some cases eliminating IT departments all together.

CHASE Paymentech

Recorded: October 13 | 2011    View Webcast

The Payment Card Industry Data Security Standard (PCI DSS) provides data protection requirements for organizations that process card payments. These requirements have even been adopted as law by some US states (e.g., Minnesota, Nevada, Washington). While organizations that fully comply with PCI DSS are considered compliant credit-card processors, compliance and security are not one in the same.

Brainloop

Recorded: with Gartner | 2011    View Webinar

When companies share sensitive documents with partners outside the corporate network, security, compliance and collaboration are often seen as a tradeoff. You can lock information down behind the firewall with strict policies and centralized control, but without collaboration. Or you can use a collaboration portal, but at the expense of security and the ability to enforce corporate confidentiality policies.

PCI Compliance Guidelines

Recorded: 2011    Listen Now

Annual costs of data management are soaring. So how can your business stay ahead of the curve to achieve and maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS) and still deal with potentially millions of points of vulnerability?

Panel Discussion

Recorded: September 14 | 2011    View Webinar

This event will discuss an overall payment security landscape, the costs associated with managing payment data, and the benefits of Tokenization. Attendees will learn how payment security solutions, such as encryption and tokenization can go beyond complying with PCI–DSS requirements and reduce the scope of PCI, while keeping data safe and alleviating the overall impact on your business.

www.agiliance.com

Recorded: June 30 | 2011    View Webinar

In this session we will provide a detailed analysis on how PCI DSS 2.0 impacts your IT operations (e.g., network engineering, server management, and applications development); intended for technical audience.

ca

Presenter: Tim Dunn, Vice President of Strategy, CA Technologies Security Europe

Traditional Identity and Access Management (IAM) platforms were built with one primary scenario in mind, to run on an enterprise's premises for their tightly scoped user community. The business and technology world has moved on, businesses want to be more innovative and agile. Gaining a competitive edge means exploiting technologies such as cloud, virtualisation, worker mobility enablement, personal device adoption, and business collaboration tools. IAM has become pivotal in enabling business innovation.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *

Banner

MetricStream TPRM

Banner

Banner

Banner

CyberBanner

MetricStream TPRM

CyberBanner

Go to top