How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data

Share this article:
How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data
How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data
Click here to register

How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data

Merchants who accept payment cards are challenged with complying with the Payment Card Industry's Data Security Standard (PCI DSS). Because all systems that accept or use payment cards are considered in scope for PCI DSS compliance, there are very few ways to cut corners when seeking compliance. This webcast will present the concept and use of a new data security model, tokenization, which substitutes data surrogates for card numbers in systems throughout the enterprise, thus reducing scope for PCI DSS compliance and annual audits as well as lowering the risk of a data breach.

Featured speaker:
Gary Palgon, Vice President, Product Management, nuBridges

Sponsored by:

nuBridges is a leading provider of software and services to protect sensitive data at rest and in transit, and to transfer data internally or externally with end-to-end security, control and visibility. nuBridges encryption, key management, managed file transfer and B2B integration solutions are used to comply with security mandates and to digitally integrate business processes among enterprises, systems, applications and people. Over 3,000 customers depend on nuBridges secure eBusiness solutions to encrypt millions of credit cards, exchange billions of dollars in B2B transactions and enable countless business-critical file transfers, including Walmart, Amazon.com, Timberland, American Eagle Outfitters, Belk, Bon Ton, Wachovia, Sun Trust, AIG, CheckFree and Verizon. nuBridges is headquartered in Atlanta, Georgia.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Vendor Webcasts

The impact of endpoint data growth on corporate visibility & compliance

id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.

Guidance on migration to SHA-2

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates.