Skip to main content
 

tokenization

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat     Published Date: Feb 09, 2016
This Blue Coat white paper details potential issues to consider before using cloud services; and how encryption and tokenization can enable you to safely adopt the cloud while adhering to appropriate guidelines.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
Donít let SaaS data security concerns stop you from migrating to the cloud. Learn how encryption and tokenization satisfy legal requirements and industry mandates for protecting sensitive data in SaaS cloud applications.
Tags : 
    
Blue Coat
Published By: CyberSource     Published Date: Sep 26, 2017
Learn about the top mobile trends impacting merchants today. From the increasing need for speed, to the spread of mobile payments and tokenization, this report will help you understand how to better satisfy your customers.
Tags : 
    
CyberSource
Published By: SafeNet     Published Date: Jul 13, 2010
To add extra protection for confidential data while reducing the time and cost for achieving regulatory compliance, many organizations will benefit from integrating tokenization into their SafeNet solution.
Tags : 
safenet, tokenization, data protection, regulatory compliance, application integration, encryption, audit
    
SafeNet
Published By: SafeNet     Published Date: Sep 15, 2010
This paper offers a detailed look at tokenization and offers practical guidelines for helping organizations successfully employ tokenization so they can maximize the potential benefits.
Tags : 
safenet pci, pci compliance, tokenization, encryption, data masking
    
SafeNet
Published By: CyberSource     Published Date: Apr 25, 2018
Learn about the top mobile trends impacting merchants today. From the increasing need for speed, to the spread of mobile payments and tokenization, this report will help you understand how to better satisfy your customers.
Tags : 
    
CyberSource
Published By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : 
erp, pci, pci compliance, erp, pci, ompliance, sap, sap, encryption, credit cards, tokens, tokenization, token, credit card, payment card, payment cards, regulation, regulatory, paymetric, paymetrics
    
Paymetric
Published By: Akamai     Published Date: Jul 01, 2011
Learn Why Protecting Your Online Channels and Applications is Critical.
Tags : 
akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall, siteshield, gtm, dns, edns, edge tokenization
    
Akamai
Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture, 2.0
    
Akamai
Published By: Akamai     Published Date: Mar 14, 2011
Imagine: "We've been breached." A stomach dropping statement whether you're hearing the words or speaking them.
Tags : 
akamai
    
Akamai
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : 
liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens, taas, direct marketer, cissp, credit card transactions
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails, database, backup storage
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Tune in to this Tokenization webcast where we'll discuss the business drivers behind tokenization, exactly what 'tokenization' is, some best practices for a successful implementation, and lastly, a customer example of tokenization used to reduce the PCI DSS audit scope.
Tags : 
liaison, nubridges, tokenization implementation, pci dss audit scope, gary palgon, brian grafsgaard, data protection
    
Liaison Technologies
Search      

Add Research

Get your company's research in the hands of targeted business professionals.