-
Beyond PCI Compliance: Endpoints Secured; Millions Of Dollars In Savings
8/5/2010
Major retail grocery chain achieves PCI DSS compliance and extends the life of its retail systems, saving millions of dollars in capital expenditure costs. By Bit9, Inc.
-
Leveraging Intelligent Video In-Store For Multi-Dimensional Benefits
6/17/2010
With more and more retailers moving their networks ahead with IP-based video systems, more intelligent data is available for store use. Retailers are able to leverage shopper activity caught on camera and turn it into information used to report when shoppers arrive and depart a store. With the addition of video intelligence information tied into the point of sale (POS), retailers can now get an integrated understanding of a shopper’s behavior and see what happens between the store entrance and exit. By Brad Fick, President, Direct Source, Inc.
-
Guest Series Part 2: Leveraging Intelligent Video In-Store For Multi-Dimensional Benefits
6/17/2010
With more and more retailers moving their networks ahead with IP-based video systems, more intelligent data is available for store use. Retailers are able to leverage shopper activity caught on camera and turn it into information used to report when shoppers arrive and depart a store. With the addition of video intelligence information tied into the point of sale (POS), retailers can now get an integrated understanding of a shopper’s behavior and see what happens between the store entrance and exit. By Brad Fick, President, Direct Source, Inc.
-
Top 10 Compliance Issues For The Payment Card Industry (PCI)
6/10/2010
Many organizations are aware of the Payment Card Industry (PCI) and PCI compliance but are unsure if they’re doing everything necessary. This white paper provides an overview of PCI, along with useful information for merchants, service providers, and other organizations that must meet PCI requirements. By Coalfire Systems Inc.
-
White Paper: Top 10 Compliance Issues For The Payment Card Industry (PCI)
6/10/2010
Many organizations are aware of the Payment Card Industry (PCI) and PCI compliance but are unsure if they’re doing everything necessary. This white paper provides an overview of PCI, along with useful information for merchants, service providers, and other organizations that must meet PCI requirements. By Coalfire Systems Inc.
-
Success Story: Retail Chain Manages Liability With IP Security — High-Availability System Relies On Virtualization From Pivot3
6/7/2010
Spec’s was relying on DVRs, and a mix of analog and megapixel cameras for its surveillance, loss
prevention, and internal compliance needs, but it wanted to increase the capabilities of its system.
Spec’s preferred the detail and clarity offered by high-resolution cameras and also wanted to be able
to save recorded video for a period of two years. By Pivot3, Inc.
-
Retail Chain Manages Liability With IP Security — High-Availability System Relies On Virtualization From Pivot3
6/7/2010
Spec’s was relying on DVRs, and a mix of analog and megapixel cameras for its surveillance, loss
prevention, and internal compliance needs, but it wanted to increase the capabilities of its system.
Spec’s preferred the detail and clarity offered by high-resolution cameras and also wanted to be able
to save recorded video for a period of two years. By Pivot3, Inc.
-
Clamping Down On Crime
6/7/2010
If only all staff would use their skills to benefit the company. It is an unfortunate truth that when economic times are hard they impact both companies and staff in similar ways, but the result will often bring the two into conflict. By Andrew Blatherwick, Argility
-
Article: Clamping Down On Crime
6/7/2010
If only all staff would use their skills to benefit the company. It is an unfortunate truth that when economic times are hard they impact both companies and staff in similar ways, but the result will often bring the two into conflict. By Andrew Blatherwick, Argility
-
Fraud Network Whitepaper
6/7/2010
The ThreatMetrix Fraud Network offers companies a better way to verify new account originations,
authorize payments and transactions, and authenticate user logins in real-time.The remainder of this
document provides an overview of key components of the ThreatMetrix Fraud Network, the design
methodologies used and an overview of ThreatMetrix core technologies. By ThreatMetrix Inc.