How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data

Share this article:
How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data
How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data
Click here to register

How to Reduce the Scope of PCI DSS Audits by Tokenizing Payment Card Data

Merchants who accept payment cards are challenged with complying with the Payment Card Industry's Data Security Standard (PCI DSS). Because all systems that accept or use payment cards are considered in scope for PCI DSS compliance, there are very few ways to cut corners when seeking compliance. This webcast will present the concept and use of a new data security model, tokenization, which substitutes data surrogates for card numbers in systems throughout the enterprise, thus reducing scope for PCI DSS compliance and annual audits as well as lowering the risk of a data breach.

Featured speaker:
Gary Palgon, Vice President, Product Management, nuBridges

Sponsored by:

nuBridges is a leading provider of software and services to protect sensitive data at rest and in transit, and to transfer data internally or externally with end-to-end security, control and visibility. nuBridges encryption, key management, managed file transfer and B2B integration solutions are used to comply with security mandates and to digitally integrate business processes among enterprises, systems, applications and people. Over 3,000 customers depend on nuBridges secure eBusiness solutions to encrypt millions of credit cards, exchange billions of dollars in B2B transactions and enable countless business-critical file transfers, including Walmart,, Timberland, American Eagle Outfitters, Belk, Bon Ton, Wachovia, Sun Trust, AIG, CheckFree and Verizon. nuBridges is headquartered in Atlanta, Georgia.
Share this article:

Sign up to our newsletters

More in Vendor Webcasts

The NIST Framework: The Public's Stake in the Cybersecurity of our Critical ...

The announcement in February 2014 by the White House of a Framework for the development of cybersecurity standards follows the announcement one year earlier by the White House of a Presidential Executive Order describing the Government's overall policy toward the cybersecurity on our nation's critical ...

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Addressing Identity and Access Management with a Unified Open source Identity and ...

Many IT organizations today are tasked to manage a complex landscape that includes a mix of SaaS applications and on-premise applications being accessed by various user populations; employees, customers, mobile workers, etc.