Achieving and maintaining PCI compliance and security with Dell solutions. Dell solutions overview

Size: px
Start display at page:

Download "Achieving and maintaining PCI compliance and security with Dell solutions. Dell solutions overview"

Transcription

1 Achieving and maintaining PCI compliance and security with Dell solutions Dell solutions overview

2 Table of Contents 1.0 Executive summary PCI requirements and corresponding Dell solutions... 3 Summary

3 1.0 Executive summary Due to the complexity of the Payment Card Industry Data Security Standards (PCI DSS), no single security product can guarantee compliance. PCI compliance demands an orchestrated number of products, policies, procedures and people to work together harmoniously. Dell s solutions are specifically designed to meet and exceed the security requirements for merchants and service providers who must securely process, store and transmit cardholder data. Dell helps merchants of all types and sizes meet and maintain PCI compliance requirements with a combination of hardware, software, and services. Our solutions include network security, secure wireless, endpoint protection, and systems management, as well as data protection and encryption. Point solutions, such as security appliances and software, are only one aspect of compliance. Dell also offers managed security services that provide 24/7 monitoring and response capability through Dell SecureWorks, a PCI Qualified Security Assessor (QSA) and Approved Scanning Vendor (ASV). From firewalls and anti-virus solutions, to managed security services, consulting, and system management appliances, Dell can help you address the challenges of PCI compliance more confidently and effectively. 2.0 PCI compliance requirements and Dell solutions The following chart provides an overview of the products and services that are part of Dell s PCI compliance portfolio of products and services. We have implemented these solutions for thousands of companies. This deep experience means you can work with your Dell sales team to identify the products and services from our broad portfolio that best meet your requirements, and leverage their understanding of your business. We streamline this process and do our best to make this complex and important initiative one that you can more easily manage, and to give you the results you need to be successful. Build and maintain a secure network 1. Install and maintain a Security and risk consulting firewall configuration to Managed firewall protect cardholder data. Security log monitoring SIEM on-demand Network security End point protection End point configuration management This requirement mandates the need to implement a sound firewall infrastructure to protect cardholder data from external access. Security and risk consulting Dell SecureWorks Security and Risk Consulting helps merchants assess their current firewall and network architecture; identify gaps; recommend solutions to fill these gaps; and implement any needed changes. Managed Firewall services remove the burden of firewall management with a 24x7x365 team of experts who can audit policies to ensure they align with PCI requirements, perform ongoing rule-set changes, and monitor these devices for any signs of attack. Security Log Monitoring services provide real-time monitoring for known and unknown threats across firewall infrastructure, while Security Information Management (SIEM) services enable internal monitoring. Robust reporting is available through our Web-based portal, enabling merchants to easily demonstrate compliance. 3

4 Network security All Dell SonicWALL firewall appliances include a stateful firewall and a patented Reassembly-Free Deep Packet Inspection (RFDPI) 1 technology that can detect, segment and secure cardholder traffic in without compromising performance. The Dell SonicWALL solution maintains zone control and segregates customer, employee and credit card data traversing across the network. Components that store cardholder data, such as POS systems and databases, can be properly segmented into separate and distinct zones with controlled access by wired or wireless clients that are owned by the business, and most certainly never by guest wireless access accounts. Dell SonicWALL E-Class Secure Remote Access (SRA) End Point Control (EPC ) uniquely identifies Windows -based endpoints to tie them to authorized users, and checks for essential components such as anti-virus, anti-spyware and personal firewall software before allowing Windows-based devices to connect to the network. Dell SonicWALL Aventail Advanced End Point Control (EPC ) includes an advanced interrogator list that includes all supported anti-virus, personal firewall and anti-spyware solutions from vendors like McAfee, Symantec, Computer Associates, Sophos, Kaspersky Lab and many more. It also integrates technology from OPSWAT to create a virtual Windows session that runs on top of the actual desktop. With centralized management via the Dell SecureWorks Global Management System (GMS), administrators can centrally define and view their policies across thousands of devices, all from a single interface. End point protection Working in conjunction with Dell SonicWALL firewalls, the Dell SonicWALL Enforced Client Anti-Virus and Anti-Spyware service automatically enforces anti-virus and anti-spyware policies on every client, reducing administrative overhead. It combines client-based scanning and remediation capabilities with centralized management and reporting capabilities. When a non-compliant end-point within the network tries to connect to the Internet, the firewall will direct the user to a web page to install the latest Dell SonicWALL Enforced Client Anti- Virus and Anti-Spyware software. The solution automatically delivers updated security definitions to the end point as soon as they become available to protect against today s rapidly-evolving threats. Because enforcement is automatic, administration time and costs are minimized. Dell PowerConnect W-series products enable merchants to easily update firewall configurations and other settings to meet PCI requirements. The Dell SonicWALL Clean Wireless solution makes deploying wireless WLANs secure, simple and cost-effective with the first total 1 Dell SonicWALL employs the services of an independent PCI Qualified Security Assessor (QSA) to review Dell SonicWALL security platforms. This review initiative provides assurance that Dell SonicWALL solutions can satisfy PCI criteria when configured and implemented in accordance with the PCI DSS standard. 4

5 security solution to integrate universal a/b/g/n wireless with an enterprise-class firewall/vpn gateway. Whether you are adding wireless into an existing network infrastructure or deploying a wireless network from the ground up, the extensible Dell SonicWALL Clean Wireless solution scales to virtually any network deployment. By combining advanced security features such as WiFiSec, Virtual APs (VAP), and wireless intrusion detection services (WIDS) with support for industry standards including IPSec, WPA, and i, Dell SonicWALL protects your wireless network from malicious attacks. Centralized management of your globally distributed wired and wireless networks is easy using the award-winning Dell SonicWALL Global Management System solution. End point configuration management The Dell KACE K1000 Management Appliance provides several easyto-use ways to enforce PC configurations for improved security, and includes several pre-built policies. Administrators can enforce firewall configurations by controlling users firewall settings including logging and allowing TCP traffic on ports required to enable remote administration tools. It allows enforcing browser security settings thereby controlling users' preferences including home page, privacy and security policies. IT administrators can also disallow the running of specific programs and implement quarantine policies for compromised devices. This enables administrators to sever communications between a computer and all other systems when a network security risk has been identified. Build and maintain a secure network 2. Do not use vendor Vulnerability assessments supplied defaults for Vulnerability scanning system passwords and Network security other security parameters. Data protection This requirement dictates that organizations must use sound password policies, such as not using default vendor passwords, and secure wireless and infrastructure configuration standards. Dell SecureWorks offers Vulnerability Assessments to identify any weaknesses in configuration practices including weak passwords, unnecessary services and rogue web servers. Dell SecureWorks consultants can also help merchants develop a secure configuration standard for all critical systems based on industry best practices. Additionally, Dell SecureWorks Vulnerability Scanning service can perform ongoing internal and external scans to ensure infrastructure remains secure. On-demand vulnerability reports can be generated via our customer portal. Network security All Dell SonicWALL firewall appliances require the administrator to change the default passwords upon the initial bootup. A password warehouse can be managed and controlled locally on the appliance or centrally through Dell SonicWALL GMS, which can propagate all 5

6 settings down to remote devices. All passwords, pre-shared secret keys for VPNs and polices are encrypted during transmission and in local storage. Administrators can also mandate automated passwords checks for weak and generic passwords. Console access can be restricted to only centralized management or HTTPS management for all security parameters. Appliances encrypt all non-console administration for all communications between managed appliances, as well as to GMS, using strong cipher VPNs or HTTPS. Every Dell SonicWALL firewall appliance is a hardened security device that is purpose-built for network security. Furthermore, Dell SonicWALL solutions ensure only specific services (DNS, web, etc.) are allowed to access trusted servers, thus restricting unnecessary services that can have access to systems in the cardholder data environment. The Dell PowerConnect W-Series wireless product line offers enterprise network connectivity and the ability to custom configure WLAN deployments. Merchants can easily configure encryption settings, passwords, and community strings to meet PCI requirements. Data protection Dell Data Protection and Encryption supports SSL for all non-console administrative access, effectively meeting PCI requirements. Protect cardholder data 3. Protect stored cardholder data. Security and risk consulting Managed intrusion prevention and detection Data protection This requirement mandates rendering stored cardholder data unreadable, if possible, or implementing other compensating controls, such as preventing Web application attacks, as outlined in Appendix B of the PCI DSS. Dell SecureWorks can help classify assets and the data residing in them, and help formulate a data protection strategy appropriate to your infrastructure. Our Managed Intrusion Prevention and Detection service provides prevention and detection controls to protect any data that cannot be encrypted. This service can include implementation of commercial IPS/IDS technology or can be bundled with our award-winning isensor IPS technology to deliver superior, cost-effective protection. Once implemented, trained security analysts manage these devices, including ongoing tuning, and monitor them to identify and respond to any threats. The Dell SecureWorks customer portal provides real-time visibility into intrusion prevention and detection, including any alerts and remediation efforts, while delivering on-demand reports to demonstrate PCI compliance. 6

7 Network security While Dell storage solutions address the issue of protecting stored cardholder data, Dell SonicWALL firmware allows the administrator to identify cardholder data in transit through the use of real-time regular expression (regex) matching mapped to Primary Account Numbers (PAN). Regex minimizes the oversights and limitations of legacy systems that are not prepared to handle the deluge of cardholder that cleverly slips through internal and external storage checks. Since Dell PowerConnect W-series products are not designed to store cardholder data, this requirement does not apply directly to W-series products that are included in deployments that need to meet PCI compliance. However, ensuring that security and encryption parameters for the transmissions are appropriately set helps protect data in motion. Data protection Dell Data Protection and Encryption, or DDP E, uses strong cryptography with associated key management processes and procedures on every device on which our solutions are installed. DDP E provides all the implementation/configuration features necessary to allow customers to meet these requirements. In addition, all DDP E storage of encryption material is secured and only authorized users and system resources are allowed access. Dell also provides all the implementation/configuration features necessary (including documentation where appropriate) to allow customers to meet PCI requirements. Protect cardholder data 4. Encrypt transmission of cardholder data across open, public networks. Security and risk consulting Managed firewall encryption End point protection This requirement calls for all cardholder data to be encrypted during transmission over public or untrusted networks. Dell SecureWorks helps meet this requirement by assessing current infrastructure to ensure all VPNs and wireless networks are configured properly to encrypt sensitive data, as well as identify any gaps in data transmission flows that may leave sensitive information unencrypted. Our Managed Firewall service removes the burden of site-to-site VPN management by providing a team of security professionals to administer these devices. Our analysts will also monitor your VPNs for any signs of malicious activity, enabling you to respond quickly to threats. The Dell SecureWorks customer portal provides real-time visibility and ondemand reporting to demonstrate PCI compliance. Dell SecureWorks Encryption service helps ensure all cardholder data is transmitted via encrypted . The solution is easy-to-use and 7

8 requires very little end-user training, making compliance with this requirement relatively painless. Network security Dell SonicWALL s Clean VPN approach integrates a layer of intelligent remote access technology using a Secure Sockets Layer virtual private network (SSL VPN) to secure users and devices beyond the perimeter. In combination with Dell SonicWALL s Next-Generation Firewall traffic can be secured and cleaned before it enters the merchant network. Dell SonicWALL Next-Generation Firewall appliances support SSL and IPSec-encrypted communication protocols across x, 2G, 3G and 4G data networks. In addition, Dell SonicWALL Secure Remote Access solutions provide strong encryption for data during transmission over open networks using SSL and TLS encryption protocols. Both products support the MD5 and SHA-1 protocols to ensure the integrity of secure transmissions involving cardholder data for wireless, and wired end points. End point protection With Worry-Free, outbound can be scanned and analyzed to identify and block sensitive information. This could be information like credit cards, social security numbers, member ID, or other specific words setup by the organization. Dell PowerConnect W-series products include strong encryption and security features that can be easily configured in accordance with PCI requirement levels. WPA/WPA2/AES/802.1X features are also provided. Further, PowerConnect W-series offers advanced cryptography features aligned with the high security requirements of FIPS and Suite-B wireless deployments. Dell SonicWALL firewalls with integrated wireless (or used in conjunction with Dell SonicWALL SonicPoint wireless access points) create a Clean Wireless environment, which can layer IPSec over WLAN encryption and enable the regular rotation of WPA/WPA2/TKIP/AES keys. This affords greater protection than required by PCI DSS 2.0 without degradation to performance. Furthermore, encrypted traffic is supplemented with Dell SonicWALL s protection services including IPS/IDS, anti-virus, anti-spyware and URL filtering. With the addition of policy-based routing and Reassembly-Free Deep Packet Inspection, administrators can create policies that never allow unprotected PANs to be sent over a public network, regardless of the application (e.g., , IM, social media, etc.). 8

9 Maintain a vulnerability management program 5. Use and regularly Managed intrusion prevention and detection update anti-virus Security log monitoring software or programs. SIEM on-demand Software distribution and patch management This requirement mandates the use of anti-malware solutions to prevent all known types of malicious software from impacting your critical systems. Dell SecureWorks Network Intrusion Prevention and Detection service with our isensor IPS appliance can provide an additional layer of defense against multiple types of attacks. The isensor includes advanced analysis and blocking techniques to protect against threats. Dell security experts can provide full life-cycle management for isensor appliances, from implementation to proactive administration and tuning, including monitoring, configuration, access management, backups, updates, patches, hardware expansion and replacement, and daily audits of existing signatures. If your organization has already invested in Network IPS/IDS equipment, Dell SecureWorks can deliver monitoring services in a co-managed fashion. Dell SecureWorks Security Log Monitoring service provides a team of experts to monitor your infrastructure to identify attacks before damage is done. If you prefer to monitor this activity in-house, Dell SecureWorks SIEM On-Demand service provides the same event aggregation and correlation technology used by our experts as a service, so you can analyze any threats that may occur. Both services provide real-time security visibility and on-demand reports to demonstrate PCI compliance via our customer portal. Network security Dell SonicWALL Next-Generation Firewalls provide an innovative multilayered anti-malware strategy consisting of a proprietary Reassembly- Free Deep Packet Inspection along with anti-malware solution at the gateway and enforced anti-virus solution at the endpoints. When a noncompliant end-point within the network tries to connect to the Internet, the firewall will direct the user to a web page to install the latest Dell SonicWALL Enforced Client Anti-Virus and Anti-Spyware software. The solution automatically delivers updated security definitions to the endpoint as soon as they become available to protect against today s rapidly-evolving threats. Because enforcement is automatic, administration time and costs are minimized. With a continuously updated server and desktop anti-virus technology, administrators can deploy the right solution for their cardholder environment. Client software can be easily deployed on POS machines, retail backoffice servers, workstations, laptops and desktops; all of this can be automated and enforced with Dell SonicWALL firewalls and centrally managed by the Dell SonicWALL Global Management System (GMS). In addition to firewall and endpoint enforcement, the Dell SonicWALL GRID Network collaboratively gathers, analyzes and vets cross-vector 9

10 threat information from millions of business-oriented sources around the world. Reputation-based threat protection information is then distributed securely, anonymously and in real-time to improve the overall effectiveness of Dell SonicWALL security solutions. Due to the distributed nature of this network and the use of multiple different data sources, the evaluation from one contributor can be vetted against multiple other contributors, allowing the GRID Network s collaborative filtering process to be highly accurate and fully self-correcting. Consequently, businesses that deploy solutions that communicate to the collective backend of the GRID Network are afforded the most up-todate malware signature files. Software distribution and patch management Dell KACE enables organizations to assess, schedule and administer patches and verify status without much of the complexity and cost of traditional solutions. Dell KACE products support large patch repositories including those for Microsoft Windows and Apple Mac OS operating systems, as well as applications from a wide range of vendors including Microsoft, Apple, Adobe, Symantec and Mozilla. The Dell KACE family also supports distribution, installation, and management of security measures such as anti-virus, through remote administration, software distribution and installation capabilities for virtually any application, service pack, update or hotfix. The ease of deployment and use of Dell KACE systems management appliances simplifies these tasks for IT administrators, easing the assurance of compliance and reducing its costs. Maintain a vulnerability management program 6. Develop and maintain Security and risk consulting secure systems and Vulnerability scanning applications. Counter threat unit intelligence Patch management WAF (Web Application Firewall) This requirement mandates the need to ensure that your environment maintains current patch levels, you adhere to secure coding practices and that all Web applications undergo periodic Web application assessments. Dell SecureWorks can conduct periodic vulnerability assessments to ensure the security of environment, perform Web application testing to identify any areas of concern across Web-facing infrastructure, including vulnerabilities that may lead to cross-site scripting attacks, buffer overflows, etc., and align application development with secure coding best practices. Dell SecureWorks Vulnerability Scanning service provides the ability to conduct periodic infrastructure scans to identify any potential vulnerabilities or out-of-date systems. Recurring PCI Compliance Scans and Web Application Scans can be scheduled through the Dell SecureWorks customer portal, or are available any time on demand. 10

11 Dell SecureWorks Counter Threat Unit Intelligence Services provide vulnerability and threat alerts tailored to your environment, and alerts you to any new patches relevant to your systems. Both the Scanning and Intelligence services provide access to the Dell SecureWorks customer portal to generate on-demand reports to demonstrate PCI compliance. Network security The Dell SonicWALL Web Application Firewall (WAF) Service on the Secure Remote Access Series offers a complete, affordable, out-of-box compliance solution for businesses that is easy to manage and deploy, while protecting web applications against threats and attacks. It leverages an existing infrastructure as a licensable add-on module to the Dell SonicWALL Secure Remote Access platform. Utilizing a dynamically updated signature database to detect and protect against sophisticated web-based attacks, the Dell SonicWALL WAF Service applies reverse proxy analysis of Layer 7 traffic against known signatures, denies access upon detecting Web application malware, and redirects users to an explanatory error page. Additionally, the WAF Service is capable of using custom rules to protect against day-zero vulnerabilities. Acceleration features, including content caching, compression and connection multiplexing, improve the performance of protected websites, significantly reducing transactional costs. Dell SonicWALL WAF also protects against Open Web Application Security Project (OWASP) Top 10 Vulnerabilities. For instance, HTTPS inspection can block attacks embedded into SSLencrypted packets. The WAF Service can protect against sophisticated attacks such as Cross-site Request Forgery (CSRF). Information disclosure protection can block access to websites containing administrator-defined keywords or phrases, and cardholder data, PAN and SSN protection can help in web-based Data Leak Protection (DLP) by preventing leakage of user sensitive information. Dell SonicWALL GMS can ensure that all appliances get the latest firmware and configuration changes mandated by PCI DSS. Appliances can receive security signature updates by GMS or through the cloud without any human intervention. This ensures that all system components are always protected and up-to-date. Regular releases of Dell PowerConnect W-series software versions are made available to all customers to help ensure compliance, along with Security Advisories as appropriate. Dell PowerConnect W-series AirWave management software provides broad reporting capabilities for PCI compliance factors that help identify potential problems. Patch management and end point protection The Dell KACE K1000 Management Appliance patch management solution provides comprehensive and reliable patching that is also easy-to-use and affordable. The KACE patching feature is powered by Lumension, the industry's leading patch management solution. The appliance provides one of the largest patch repositories including patches for Windows and Mac operating systems, as well as a wide range of applications from vendors including Microsoft, Apple, Adobe, Symantec and Mozilla. It also utilizes Lumension s Digital Fingerprint Technology to accurately and reliably assess and remediate vulnerabilities. All of these capabilities are managed through an intuitive 11

12 Web-based management console, where administrators can control scanning and distribution schedules to minimize business disruptions. The Dell KACE K1000 Management Appliance also provides users with the ability to uncover and remediate problems quickly, by helping them identify vulnerabilities across all end nodes, and enforce compliance with company policies across all desktops, laptops and servers. It reduces the risk of malware, spyware, and viruses, and eliminates vulnerabilities. This reduces user down time due to infection or other security breaches, and in those instances when problems cannot automatically be fixed, allows systems to be quarantined to prevent them from infecting the rest of the network. Implement strong access control measures 7. Restrict access to Security and risk consulting cardholder data by Security log monitoring business need to know. SIEM on-demand This requirement mandates the need for organizations to implement proper identity and access management across systems that house cardholder information. Dell SecureWorks Security Log Monitoring service provides real-time monitoring of these systems by security experts to ensure only authorized personnel gain access. Dell SecureWorks SIEM On-Demand delivers the technology to monitor these systems as a service, should you choose to keep this function in-house. Both services provide access to the Dell SecureWorks customer portal for real-time visibility into activity on the systems housing cardholder information and on-demand reporting to demonstrate PCI compliance. Network security Access control is an essential element of all Dell SonicWALL security solutions. Dell SonicWALL Firewall appliances natively allow for the creation of granular access, authorization rules and enforcement at the perimeter, as well as internal and remote networks. With the addition of GMS, administrators can restrict access to a global network of appliances that protect cardholder data by defining what resources an individual, group, or department is authorized to view. Dell PowerConnect W-series enables you to quickly implement best practices for passwords and administrative access for any configurations you deploy. 12

13 Implement strong access control measures 8. Assign a unique ID to Security and risk consulting each person with Security log monitoring computer access. SIEM on-demand Data protection This requirement mandates the need to ensure that actions taken by known and authorized individuals with computer access can be monitored and traced. Dell SecureWorks can help develop and implement proper policies and procedures for assigning unique IDs and authentication measures. Dell SecureWorks Security Log Monitoring service can provide real-time monitoring of access to systems in your environment. Our SIEM On- Demand delivers the technology you need to monitor access to these systems as a service, should you choose to keep this function in-house. Customers enjoy access to the Dell SecureWorks customer portal for real-time visibility into the cardholder data environment, as well as ondemand reporting. Network security Authentication is an essential part of all Dell SonicWALL solutions. Dell SonicWALL firewall appliances support multiple third-party database authentication, including XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services, Citrix as well as an internal user database native to the appliance. Several two-factor authentication mechanisms are available for administrators who require access to the cardholder network. Tokens, digital certificates and Single-Sign-on (SSO) are all support across all Dell SonicWALL appliances. An integrated X.509 digital certificate is provided to aid both user and entity authentication, thus allowing for strong authentication without the use of a certificate authority. A local database can be used for user authentication for those administrators who do not wish to deploy digital certificates. In addition, Dell SonicWALL is compatible with trusted PKI vendors such as Baltimore and Entrust. For business running distributed networks, GMS allows for granular control of users who have access to read and write capabilities across a predefined group of appliances. Dell PowerConnect W-series products enable you to easily configure access rights to meet PCI requirements. Data protection Dell Data Protection and Encryption provides the implementation and configuration features necessary (including documentation where appropriate) to allow customers to meet these requirements. DDP E supports the necessary third-party components required (in order to meet sections 8.2, 8.3). 13

14 Implement strong access control measures 9. Restrict physical access to cardholder data Security and risk consulting End point protection This requirement dictates that organizations implement appropriate physical security controls to limit access to critical systems, ensure proper visitor handling procedures and that organizations have proper procedures when moving or destroying physical media where cardholder information is stored. Dell SecureWorks Security and Risk Consulting can help you address this requirement by working with your team to identify areas where physical security controls must be implemented and testing controls to ensure compliance through social engineering and other tactics. Our Security and Risk Consulting team can also help you develop physical data handling and destruction procedures that align with industry best practices, such as those from the Department of Defense. Regularly monitor and test networks 10. Track and monitor all access to network resources and cardholder data. Security log monitoring SIEM on-demand This requirement calls for companies to implement logging mechanisms across all network, security and server infrastructure that houses or handles cardholder information, and monitor the logs for any violations. Dell SecureWorks Security Log Monitoring service provides real-time log aggregation, correlation and analysis across any security device or critical information asset. All logs and alerts are monitored by security experts 24x7x365, in real-time, to identify known and unknown threats, or unusual user behavior. Any malicious activitythat is identified is immediately addressed. Our SIEM On-Demand provides your team with the same aggregation and correlation technology used by our analysts, as a service, to enable you to monitor your environment in-house. With both services, log information is stored indefinitely with the previous two years accessible via the Dell SecureWorks customer portal, which also provides real-time security visibility and on-demand reports to demonstrate PCI compliance. Network security Dell SonicWALL GMS offers centralized real-time monitoring, and comprehensive policy and compliance reporting for Dell SonicWALL solutions. Dell SonicWALL Application Traffic Analytics solutions offer deeper insight into suspicious network activity and automated alerts. Dell s W-series AirWave management software can provide audits and 14

15 reporting on many PCI compliance factors. Clean Wireless Solutions from Dell SonicWALL support industry standards, such as Wi-Fi Protected Access (WPA), and WPA2, as well as integrated radio frequency (RF) scanning and monitoring capabilities. Support for industry standards enables administrators to secure sensitive cardholder information in both wired and wireless network environments, and protect wireless networks and mobile applications from unauthorized use or attack. Dell SonicWALL appliances and access points can also identify and prevent rogue access points (RAP) and unmonitored networks from gaining access to cardholder networks. In addition, both Dell SonicWALL Next-Generation Firewalls and GMS synchronize in helping businesses monitor activity and proactively protect against future probes, attacks and RAPs. alerts can be sent to a defined group of security responders. Logs can be stored locally or redirected to a GMS. By utilizing GMS, a business can have a centralized location for security events and logs across thousands of appliances, thus providing a single point to conduct network forensics. Such logs and reports are commonly utilized by QSAs and remediation teams. Audit and reporting Dell KACE systems management appliances support PCI requirements for logging, alerting and audit-worthy reporting. Dell KACE monitoring capabilities keep administrators up-to-date on their current security posture in line with PCI requirements for maintaining security systems and applications, enabling more timely response and preemptive actions when indicated. Metrics provide trending and other information that help direct resources where needed to maintain the compliance posture, while reporting capabilities support the documentation mandated by 10 and elsewhere within the PCI DSS. Protect cardholder data 11. Regularly test security systems and processes. Security and risk consulting Vulnerability scanning Managed intrusion prevention and detection Managed host intrusion prevention Security log monitoring SIEM on-demand This requirement mandates that organizations periodically test their systems and protect them through vulnerability scans, penetration testing, intrusion prevention and detection, and file integrity software. Dell SecureWorks can provide vulnerability assessments and penetration testing. Dell SecureWorks is an Approved Scanning Vendor (ASV), and our Vulnerability Scanning service can be utilized to comply with the quarterly external scan that is required for PCI compliance. Our Managed Intrusion Prevention and Detection service provides the prevention/detection controls identified in this requirement. This 15

16 service provides implementation of a commercial IPS/IDS technology or can be bundled with our award winning isensor IPS technology to deliver superior protection cost-effectively. Once implemented, our experts will manage these devices, including ongoing tuning, and monitor them to identify and respond to any threats. Dell SecureWorks Managed Host Intrusion Prevention service provides you with the technology and a team of experts to manage and monitor this infrastructure in order to keep it operating at peak performance. Dell SecureWorks Security Log Monitoring service provides real-time monitoring across your systems by true security experts to respond to any security events occurring. Dell SecureWorks SIEM On-Demand service delivers the technology you need to monitor these systems as a service, should you choose to keep this function in-house. Our scanning, Managed IPS/IDS, Log Monitoring and SIEM On-Demand services provide access to the Dell SecureWorks customer portal for real-time visibility into activity on the systems housing cardholder information and on-demand reporting to demonstrate PCI compliance. Network security Unauthorized access points can allow outside attackers to steal bandwidth, infiltrate point-of-sale networks or steal and destroy confidential data. To prevent the installation of RAPs, Dell SonicWALL s wireless IPS can monitor radio spectrum for unauthorized access points. Once an RAP is identified, it can be quarantined and investigated before network access is granted. Although scans must be performed on a 90-day interval, RAP detection can be administered daily across multiple spectrum bands and reported in GMS. Dell s W-series products have the features to quickly detect failing and missing access points. Our W-series AirWave management system has multi-vendor support, and can efficiently manage/monitor Dell or other vendors wired and wireless networking products that may be included in the deployment. Dell PowerConnect W-series provides industry leading Wireless Intrusion Detection and Prevention measures. Wireless Intrusion Detection features should be enabled and utilized to help meet PCI compliance. Vulnerability scanning The Dell KACE K1000 Management Appliance equips organizations to face security audits by allowing enforcement of security policies through OVAL-Based Security and SCAP Scanning The K1000 supports OVAL-based vulnerability scanning of all managed Windows systems. OVAL promotes open, publicly available security content and standardization of its transfer across security tools and services. This includes setting the testing schedule (Security/OVAL Tab), and results reporting. More than 1,700 pre-defined tests are included, and new tests are added as they are defined and published. The K1000 features a National Institute of Standards and Technology (NIST) certified FDCC scanner as part of the Security Content 16

17 Automation Protocol (SCAP) configuration Scanner, for use in configuration assessment and reporting. The SCAP scanner is integrated into the Appliance and provides easy to use automated scan scheduling and detailed reporting that enable IT managers to manage common endpoint configurations and confirm organizational compliance requirements such as the Federal Desktop Core Configuration (FDCC) standard. Maintain an information security policy 12. Maintain a policy that addresses information security for employees and contractors. Security and risk consulting Security log monitoring This requirement dictates that organizations must create an information security policy that is kept up to date and addresses all the security requirements in the PCI DSS, as well as operational security, system usage, security management, security awareness and incident response. Dell SecureWorks Security and Risk Consulting team can work with your team to create a robust, effective information security policy that addresses all the requirements of this section and the PCI DSS as a whole. Additionally, our Security Log Monitoring Service can provide you with the incident response plan and experts necessary to conduct effective response to stop threats before damage is done. With this service, you will be able to utilize the Dell SecureWorks customer portal to gain real-time security visibility and on-demand reporting to demonstrate PCI compliance. Summary Dell can help you strengthen your company s overall security posture and help satisfy PCI compliance requirements efficiently and cost-effectively. Most common configurations using Dell solutions are backed and approved by an independent PCI Qualified Security Assessor (QSA), ensuring their capacity to serve as technological control components for any merchant or service provider striving to achieve PCI compliance. 2 We have helped companies in a wide variety of industries, government organizations, and companies of all sizes to implement security and PCI compliance initiatives. This deep experience means you can work with your Dell sales team to identify the products and services from our broad portfolio that best meet your requirements and leverage their understanding of your business. We streamline this process and do our best to make this complex and important initiative one that you can more easily manage, and giving you the results you need to be successful. 2 Dell SonicWALL employs the services of an independent PCI Qualified Security Assessor (QSA) to review Dell SonicWALL security platforms. This review initiative provides assurance that Dell SonicWALL solutions can satisfy PCI criteria when configured and implemented in accordance with the PCI DSS standard. 17

18 About Dell Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Dell KACE Dell KACE Appliances provide easy-to-use, comprehensive and affordable end-to-end systems management utilizing an appliance-based architecture. They deliver a complete, pre-integrated bundle of operating environment and application software via a dedicated server appliance, which can be plugged into an existing network and immediately begin functioning Dell SecureWorks Dell SecureWorks is recognized as an industry leader, providing world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs. Dell SecureWorks offers a full suite of PCI Security consulting and remediation solutions to help organizations address the demands and challenges of PCI compliance. Dell SecureWorks is also an Approved Scanning Vendor (ASV) and Qualified Security Assessor (QSA). Dell SonicWALL Dell SonicWALL provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Securing any organization with multi-threat scanning based on global input at wire speed, Dell SonicWALL is recognized as an industry leader by Gartner and NSS Labs. For additional information on Dell PCI Compliance solutions, please refer to our brochure, Understanding and Meeting the PCI DSS Compliance Standards You can also call , or visit us at THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. Availability varies by country. Copyright 2012 Dell Inc. All rights reserved. Dell, Dell KACE, Dell SecureWorks, Dell SonicWALL and the Dell SecureWorks logos are registered trademarks or service marks of Dell Inc. in the United States and in other countries. All other products and services mentioned are trademarks of their respective companies. This document is for illustration or marketing purposes only and is not intended to modify or supplement any Dell specifications or warranties relating to these products or services. November

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Clean VPN Approach to Secure Remote Access for the SMB

Clean VPN Approach to Secure Remote Access for the SMB Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST udit.pathak@niiconsulting.com Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com

More information

Clean VPN Approach to Secure Remote Access

Clean VPN Approach to Secure Remote Access Clean VPN Approach to Secure Remote Access A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond the Perimeter

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

LogRhythm and PCI Compliance

LogRhythm and PCI Compliance LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper PCI DSS Compliance with the Barracuda NG Firewall White Paper About Payment Card Industry Data Security Standard (PCI DSS) Requirements In response to the increase in identity theft and security breaches,

More information

PCI Compliance in Multi-Site Retail Environments

PCI Compliance in Multi-Site Retail Environments TECHNICAL ASSESSMENT WHITE PAPER PCI Compliance in Multi-Site Retail Environments Executive Summary As an independent auditor, Coalfire seeks to be a trusted advisor to our clients. Our role is to help

More information

Protecting Point-of-Sale Environments Against Multi-Stage Attacks

Protecting Point-of-Sale Environments Against Multi-Stage Attacks SOLUTION BRIEF: PROTECTING POS DEVICES & BROADER ENVIRONMENT........................................ Protecting Point-of-Sale Environments Against Multi-Stage Attacks Who should read this paper Point-of-Sale

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - brownj52@michigan.gov Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

PCI DSS 3.0 Compliance

PCI DSS 3.0 Compliance A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

You Can Survive a PCI-DSS Assessment

You Can Survive a PCI-DSS Assessment WHITE PAPER You Can Survive a PCI-DSS Assessment A QSA Primer on Best Practices for Overcoming Challenges and Achieving Compliance The Payment Card Industry Data Security Standard or PCI-DSS ensures the

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Automate PCI Compliance Monitoring, Investigation & Reporting

Automate PCI Compliance Monitoring, Investigation & Reporting Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently

More information

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published

More information

How To Secure Your Store Data With Fortinet

How To Secure Your Store Data With Fortinet Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Enforcing PCI Data Security Standard Compliance

Enforcing PCI Data Security Standard Compliance Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

Trend Micro Solutions for PCI DSS Compliance

Trend Micro Solutions for PCI DSS Compliance s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

PCI v2.0 Compliance for Wireless LAN

PCI v2.0 Compliance for Wireless LAN PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Dell SonicWALL Portfolio

Dell SonicWALL Portfolio Dell SonicWALL Portfolio Jiří Svatuška Presales Consultant Transform Connect Inform Protect Dell SonicWALL network security portfolio Network security Secure mobile access Email security Policy and management

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN 10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Providing Secure IT Management & Partnering Solution for Bendigo South East College Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Importance of Web Application Firewall Technology for Protecting Web-based Resources Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS SECURITY PLATFORM FOR HEALTHCARE PROVIDERS Our next-generation security platform prevents successful cyberattacks for hundreds of hospitals, clinics and healthcare networks across the globe. Palo Alto

More information

Best Practices in Deploying a Secure Wireless Network

Best Practices in Deploying a Secure Wireless Network Best Practices in Deploying a Secure Wireless Network CONTENTS Abstract 2 Today s concerns 2 Purpose 2 Technology background 3 Today s challenges 4 Key security requirements of an integrated network 4

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security

More information

Applications erode the secure network How can malware be stopped?

Applications erode the secure network How can malware be stopped? Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

WHITE PAPER. Towards A Consolidated Approach For PCI-DSS Compliance In Healthcare

WHITE PAPER. Towards A Consolidated Approach For PCI-DSS Compliance In Healthcare WHITE PAPER Towards A Consolidated Approach For PCI-DSS Compliance In Healthcare FORTINET - Next Generation Security for Enterprise Networks PAGE 2 Introduction In recent years we ve witnessed the extraordinary

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group Meeting PCI-DSS v1.2.1 Compliance Requirements By Compliance Research Group Table of Contents Technical Security Controls and PCI DSS Compliance...1 Mapping PCI Requirements to Product Functionality...2

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information