CASE STUDY:
With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance.
PRESENTATION TRANSCRIPT:
2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
WEBCAST:
This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
WHITE PAPER:
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
WHITE PAPER:
Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
EGUIDE:
When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
WHITE PAPER:
Check out this resource to learn how Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS).
WHITE PAPER:
This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
PRESENTATION TRANSCRIPT:
PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
PRESENTATION TRANSCRIPT:
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.