How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data

Share this article:
How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data
How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data
Click here to register

How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data

Merchants who accept payment cards are challenged with complying with the Payment Card Industry's Data Security Standard (PCI DSS). Because all systems that accept or use payment cards are considered in scope for PCI DSS compliance, there are very few ways to cut corners when seeking compliance. This webcast will present the concept and use of a new data security model, tokenization, which substitutes data surrogates for card numbers in systems throughout the enterprise, thus reducing scope for PCI DSS compliance and annual audits as well as lowering the risk of a data breach.

Featured speaker:
Gary Palgon, Vice President, Product Management, nuBridges

Sponsored by:

nuBridges is a leading provider of software and services to protect sensitive data at rest and in transit, and to transfer data internally or externally with end-to-end security, control and visibility. nuBridges encryption, key management, managed file transfer and B2B integration solutions are used to comply with security mandates and to digitally integrate business processes among enterprises, systems, applications and people. Over 3,000 customers depend on nuBridges secure eBusiness solutions to encrypt millions of credit cards, exchange billions of dollars in B2B transactions and enable countless business-critical file transfers, including Walmart, Amazon.com, Timberland, American Eagle Outfitters, Belk, Bon Ton, Wachovia, Sun Trust, AIG, CheckFree and Verizon. nuBridges is headquartered in Atlanta, Georgia.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Vendor Webcasts

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Top four recommendations to enhance your data security strategy

As the volumes of data in organizations continue to surge, being able to effectively protect sensitive information is becoming increasingly difficult.

Tapping global threat intelligence to secure enterprise networks

On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector