Here's the client journey on crowdspring:
1.The client completed an interactive design brief.
- The brief is customized for each project category.
- The client specifies what they want (and don't want).
- Simple and proven process (takes just a few minutes).
FAQs

2.Our über-talented designers created dozens of unique designs.
In a typical Technical Writing project on crowdspring, many professional designers submit dozens of custom designs based on your brief.
- 220,000+ designers from 195 countries.
- The client reviews & gives feedback.
- Great collaboration tools & free focus groups.
FAQs

Have questions about custom Technical Writing?
Get a free, no obligation design consultation3.The client picked the winning design and received final files.
After collaborating with multiple designers, the client picked their favorite design, reviewed proofs, requested and received tweaks, and approved final files. The client received high resolution final design files and a signed intellectual property agreement giving the client full ownership to the design.
- Collaborate with the winning designer.
- The designer will implement final adjustments.
- The client receives full intellectual property rights.
FAQs

Our customers love us!
crowdspring is rated 0/5 from 0 customer reviews.
No reviews at the moment.
Check out all customer reviews!
Updates
Business Info
Business Name
PortalGuard
What do you do?
PortalGuard is a turn-key, private & public cloud authentication extension for virtual private networks and web-based applications. We provide organizations of various industries with identity solutions tailored to specific authentication needs.
Target Audience
What is your industry?
Software and InfoTech
Describe your audience
IT decision makers and their influencers with a particular interest in meeting and/or learning more about PCI DSS Requirement 8 (Implementation of 2 Factor Authentication)
What 3 things would you like to communicate to your audience?
Detailed insight to PCI Requirement 8 and its relationship to 2-factor authentication
Relevant usage scenarios where businesses that which did not meet this requirement experienced a data breach
Penalties for not meeting requirement 8 (sense of urgency)
How do you intend to use this technical written piece (print, web, etc.)?
We intend to use this piece as a downloadable document for our prospects or customers to access if they wish to find more information on PCI DSS Requirement 8, and how an appropriate authentication solution can help them address that requirement with little effort.
Style and Details
What are you instructing the reader about?
PCI DSS Requirement 8 - Identify and Authenticate Access to System Components
Do you have a title for this piece?
Security and Authentication - The Importance of PCI DSS Requirement 8
Do you have section titles or a table of contents?
Introduction
PCI Compliance Today
Do I need to worry about PCI?
The Truth Behind Requirement 8
Authentication Security
Password Strength
Cryptography Today
SHA, SSL and TLS
Salting and Hashing Data for Transit
Proving Identity in a Digital Space
Enforcing Password Policies and Procedures
Requirement 8.4
Two-Factor Authentication and Compliance
Requirement 8.3
Logical Security
What is it?
Why does it Matter to me?
Conclusion
PCI Compliance is a Must
Passwords, Security and Control
Why Choose 3 Solutions when 1 Will Do it All
List any information that MUST be included
A reference to the actual PCI DSS 3.1 document, which can be found publicly, here:
What character, tenor or spirit do you want to convey?
Technical Writing tone - Informative and authoritative.
What is your required length in words or pages for this written piece?
Minimum of 7 pages of intelligent, relevant information.
Do you want to include any additional info?
No, I don't.
Materials
Contract
Files
No Files Added