credit data

Results 1 - 25 of 77Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 21, 2017
A few years ago, the fourth largest credit union in Illinois embarked on a marketing makeover. In just one year, Baxter Credit Union (BCU) upgraded its outdated campaign management system and harnessed its scattered member data, creating more meaningful customer experiences and increasing profitability.
Tags : 
    
Adobe
Published By: AdRoll     Published Date: Jul 11, 2017
Nothing is more top of mind for marketers than attribution. Its a complex topic, and there are lots of questions. Should you measure only the first click, or the last click? Should you also measure views? Should you combine view measurement with click measurement? How long should you wait to give credit to user activity? In this whitepaper, we examine the history of attribution models and dive deep into AdRoll platform data, third-party research, and advertiser survey data to make the case for marketers to adopt a blended attribution model, one that combines both ad views and clicks. Attribution is critical to marketing success because nothing has a bigger influence on evaluating results than how you measure the impact of your advertising. And in the digital paradigm, almost everything is measurable. When we surveyed our customers, we heard this point loud and clear. Of the 1,050 marketers we spoke to in our 2016 State of the Industry Report, 84% believe attribution is critical or ver
Tags : 
attribution, adroll, performance marketing, advertising
    
AdRoll
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing, customer relationship management, enterprise software, sales & marketing software
    
Akamai
Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture, 2.0, encryption, network security appliance, ebusiness, eprocurement
    
Akamai
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. Thats why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Published By: Alert Logic     Published Date: Jun 12, 2014
Alert logics cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logics solutions and the unique benefits offered.
Tags : 
pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: Common types of POS malware and how they work How attackers exfiltrate data from POS systems once they gain access POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelites Vice President of Information Technology, is responsible for overseeing all aspects of the companys IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV. Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage.Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance at two previous companies, he was confident CylancePROTECT could significantly improve Safelites endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Childrens CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security teams existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: Box     Published Date: Jan 16, 2015
BridgePay Network Solutions is a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Founded in 2011, BridgePay is a transaction gateway company that offers a full suite of payment products that enhance the security and performance of point-of-sale data as it races between merchants and banks.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
Box
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro
Published By: Darktrace     Published Date: Jun 17, 2019
The self-learning capability of Darktraces Enterprise Immune System allows TruWest to stay ahead of todays sophisticated attackers, affording the credit union and its clients confidence in the integrity of their data and in the security of their assets. And with Darktraces coverage of Office 365, TruWests entire digital environment is protected by world-leading cyber AI.
Tags : 
    
Darktrace
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
Whether and organization or an individual, identity theft spells a long, expensive, and complex recovery process. However, online identity theft can be prevented with encryption software and advanced password protection.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, data security, security
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether were talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
The modern credit department is playing an expanded role in supporting sales and driving business growth. Traditionally, credit departments have focused on identifying potentially poor customers, thereby reducing losses and mitigating risks. Although this remains a critical function, credit departments also possess a wealth of data that can be mined to identify new business opportunities. With the help of new technologies, credit can work with sales departments by tapping into customer data and sharing insights for increasing sales. Download this white paper to learn more!
Tags : 
    
Dun & Bradstreet
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.