Remove Authentication Remove Data Center Remove Database Administration Remove Firewall
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available. Some of them not only can provide strong authentication, but also have the ability to be used as a secret repository.

Financial 104