PCI DSS. Get Compliant, Stay Compliant Seminar



Similar documents
Fortinet Solutions for Compliance Requirements

Did you know your security solution can help with PCI compliance too?

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Payment Card Industry Data Security Standard

74% 96 Action Items. Compliance

Achieving PCI-Compliance through Cyberoam

How To Comply With The Pci Ds.S.A.S

Net Report s PCI DSS Version 1.1 Compliance Suite

worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected.

You Can Survive a PCI-DSS Assessment

How To Manage Your Information Systems At Aerosoft.Com

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

Clavister InSight TM. Protecting Values

Enforcing PCI Data Security Standard Compliance

Your Security Partner of Choice

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

How To Secure Your Store Data With Fortinet

Virtualization Impact on Compliance and Audit

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment

Project Title slide Project: PCI. Are You At Risk?

Automate PCI Compliance Monitoring, Investigation & Reporting

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

On and off premises technologies Which is best for you?

Payment Card Industry Data Security Standards.

PCI Requirements Coverage Summary Table

Symantec Endpoint Protection Datasheet

CONTENTS. PCI DSS Compliance Guide

Meeting PCI Data Security Standards with

PCI Requirements Coverage Summary Table

LogRhythm and PCI Compliance

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

March

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

safend S e c u r i n g Y o u r E n d p o i n t s

Next-Generation Firewalls: CEO, Miercom

Move over, TMG! Replacing TMG with Sophos UTM

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

WatchGuard: Your Security Partner of Choice. Carlos Vieira

Introduction. PCI DSS Overview

Advantages of Managed Security Services

PCI Data Security Standards (DSS)

Achieving SOX Compliance with Masergy Security Professional Services

Data Sheet: IT Compliance Payment Card Industry Data Security Standard

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

White Paper. Understanding & Deploying the PCI Data Security Standard

Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications

PCI Overview. PCI-DSS: Payment Card Industry Data Security Standard

Astaro Gateway Software Applications

Network Security. Intertech Associates, Inc.

Symantec Endpoint Protection

How To Buy Nitro Security

How are we keeping Hackers away from our UCD networks and computer systems?

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

Beef O Brady's. Security Review. Powered by

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

PCI Compliance for Cloud Applications

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Need to be PCI DSS compliant and reduce the risk of fraud?

McAfee Endpoint Protection Products

Symantec Security Information Manager Version 4.7

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Gateway Security at Stateful Inspection/Application Proxy

CSU, Chico Credit Card PCI-DSS Risk Assessment

Best Practices for PCI DSS V3.0 Network Security Compliance

Response to Questions CML Managed Information Security

Networking for Caribbean Development

End-user Security Analytics Strengthens Protection with ArcSight

Observations from the Trenches

Achieving Compliance with the PCI Data Security Standard

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

SonicWALL Unified Threat Management. Alvin Mann April 2009

INFORMATION PROTECTED

How To Achieve Pca Compliance With Redhat Enterprise Linux

Payment Card Industry Self-Assessment Questionnaire

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

The Fortinet Secure Health Architecture

Setting up an icap Server for ISG- 1000/2000 AV Support

Cyberoam Perspective BFSI Security Guidelines. Overview

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

PCI DATA SECURITY STANDARD OVERVIEW

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Unified Threat Management, Managed Security, and the Cloud Services Model

Halo. for PCI Compliance. Who Needs PCI in the Cloud? What It Takes to be PCI Compliant

Federated Network Security Administration Framework

SonicWALL PCI 1.1 Implementation Guide

WHITE PAPER. Towards A Consolidated Approach For PCI-DSS Compliance In Healthcare

GFI White Paper PCI-DSS compliance and GFI Software products

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Best Practices For Department Server and Enterprise System Checklist

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Transcription:

PCI DSS Get Compliant, Stay Compliant Seminar

ValueSYS Solutions & Services Wael Hosny CEO ValueSYS Wael.hosny@valuesys.net Solutions you Need, with Quality you Deserve

Seminar Agenda Time 09:00 10:00 Topic Registration 10:00 10:30 ValueSYS: Welcome & Introduction 10:30 11:15 11:15 11:45 VISA: Account Information Security Program (AIS) ValueSYS: Ensuring Continuous Compliance with Tripwire 11:45 12:30 MSCC: Solutions & PCI DSS Coffee Break 3 01:00 02:00 PM ValueSYS: Solutions for Complying with PCI-DSS 02:00 03:00 PM Q&A Lunch

ValueSYS ValueSYS founded in 2001 to provide organizations with innovative and proven software solutions, as well as comprehensive consulting and technical support to help organizations achieve their business goals in Egypt and Middle East region. ValueSYS provides a full-range of solutions for the enterprise, including Business, Infrastructure and security Solutions. 300+ Corporate Customers ValueSYS Technology Partners 2001 SunSystems Partner 2004 SUSE Linux Gold Partner 2004 Novell Gold Partner Linux Specialist 2005 Novell VAD Distributor 2005 Red Hat Partner 2005 Kaspersky Business Partner 2006 Kaspersky VAD Distributor 2007 Juniper Partner 2007 Source Fire Distributor 2008 Tripwire Partner 2008 Citrix Solution Advisor 4

Enterprise Infrastructure & Security Solutions Internet Oracle RAC IP SAN (iscsi) Storage Proxy Directory DNS, DHCP FTP Database Cluster Web Server Cluster Windows, Mac and Linux users Network Services Admin Tools Server Consolidation Messaging & Collaboration Resource Management 5 Virtualization

Enterprise Infrastructure & Security Solutions Infrastructure Solutions Linux & Open Source SW Resource & PC Life Cycle Management Network Monitoring Messaging & Collaboration Identity Management Virtualization High Availability Web& Portal Development 6 Security Solutions Vulnerability Assessment UTM / NGFW IDS/IPS Anti-Virus & Anti-SPAM SIEM - Security Info. & Event Management LMI -Log Management Intelligence Configuration Audit & Control IT Compliance

ValueSYS Security Solutions & PCI DSS 7 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

ValueSYS Security Solutions & PCI DSS 8 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

Tripwire: configuration audit and control Configuration Assessment Change Auditing Proactively Assess & Validate Datacenter Configurations Rapidly Detect & Enforce Configuration Changes Configuration Audit & Control 9

Why Configuration Assessment Security Compliance Operational FISMA SOX Reduce Vulnerabilities Provide a Risk Profile Quantify risk based on prescriptive security benchmarks Having controls blocks 80 95% of vulnerabilities 10 Pass Audits Achieve and maintain continuous compliance Avoid fines and penalties Out-of-the-box policies based on regulatory standard Improve Availability Ensure performance of business-critical services Reduce unplanned work and MTTR Reducing business risk through automation

PCI DSS Requirements and Tripwire Tripwire software and services solutions help enable compliance with numerous sections in eleven of the twelve PCI DSS requirements: PCI REQUIREMENT 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect Stored Data 4. Encrypt transmission of cardholder data across open, public networks 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes N/A 12. Maintain a policy that addresses information security for employees and contractors 11

Sample of Tripwire s 6,000+ Customers FINANCIAL SERVICES MANUFACTURI NG RETAIL & HOSPITALITY 12 COMMUNICATIO NS GOVERNME NT EDUCATIO N

ValueSYS Security Solutions & PCI DSS 13 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

ValueSYS Security Solutions & PCI DSS 14 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

FACT: Sourcefire has been depicted by Gartner as the most visionary leader in Gartner s IPS Magic Quadrant since 2006! 15

The Sourcefire: Unifies Security Through Intelligence Intrusion Prevention Vulnerability Assessment Network Behavior Analysis (NBA) Network Access Control (NAC) T g Tuning Adaptive IPS 16

PCI DSS Requirements and Sourcefire PCI REQUIREMENT 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect Stored Data 4. Encrypt transmission of cardholder data across open, public networks 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security for employees and contractors 17

ValueSYS Security Solutions & PCI DSS 18 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

ValueSYS Security Solutions & PCI DSS 19 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

Magic Quadrant for Application Delivery Products, 2007 Source: Gartner (January 2007) 20

End-to-End Application Delivery Infrastructure Sense and respond to change Control & deliver desktops deployed in the datacenter 21 Control & deliver Windows apps Control & deliver Web apps Control app workloads on physical and virtual servers

End-to-End Application Delivery Infrastructure Workflow Studio XenApp XenServer XenDesktop NetScaler 22

PCI DSS Requirements and Citrix PCI REQUIREMENT 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect Stored Data 4. Encrypt transmission of cardholder data across open, public networks 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security for employees and contractors 23

ValueSYS Security Solutions & PCI DSS 24 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

ValueSYS Security Solutions & PCI DSS 25 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

Kaspersky Technologies Highest detection rate of known malware; Fastest speed of response to new malware threats; Most frequent signature database updates; Effective proactive technologies; Best-of-class spyware protection; Comprehensive Host Intrusion Prevention System; Antispam: Urgent Detection System. Best Detection Quality combined with minimal false alarms! 26

27

Triple Protection concept of new versions personal products 1 2 3 3 28

ValueSYS Security Solutions & PCI DSS 29 Tripwire: configuration audit & control Sourcefire: Adaptive IPS Citrix: Application Delivery Infrastructure Kaspersky: Anti-virus & Anti-SPAM Juniper: New Generation Firewall

Magic Quadrant for Enterprise Network Firewalls, 2H07 30 Source: Gartner (September 2007)

Secure Service Gateway Family Secure Services Gateway (SSG) family SSG 5 integrates proven security of ScreenOS SSG 20 and WAN connectivity to deliver secured and assured networking SSG 140 New levels of price/performance and SSG 320M I/O flexibility SSG 350M Unified Threat Management features complement FW, IPSec VPN Ideal small to medium stand alone business / branch office offerings SSG 520M Can be deployed as a traditional Firewall, as a Site-to-Site VPN and as a Security Router 31 SSG 550M

Unified Threat Management (UTM) Features Stop Common and Emerging Threats Inbound Threats IPS Juniper IDP detects/stops Worms, Trojans, DoS (L4 & L7), Recon, Scans Web Filtering AV Anti Spam Core Security 32 Outbound Threats Juniper IDP detects/stops Worms, Trojans SurfControl to block to Spyware / Phishing / Unapproved Site Access Kaspersky Lab AV stops Viruses, file-based Trojans, Spyware, Adware, Keyloggers Kaspersky Lab AV stops Viruses, file-based Trojans or spread of Spyware, Adware, Keyloggers Symantec stops Spam / Phishing Juniper Stateful Firewall, VPN, Access Control Juniper Stateful Firewall, VPN, Access Control

Thank You Wael Hosny CEO ValueSYS Wael.hosny@valuesys.net Solutions you need, with quality you deserve

Seminar Agenda Time 09:00 10:00 Topic Registration 10:30 10:30 ValueSYS: Welcome & Introduction 10:30 11:15 11:15 11:45 VISA: Account Information Security Program (AIS) ValueSYS: Ensuring Continuous Compliance with Tripwire 11:45 12:30 MSCC: Solutions & PCI DSS Coffee Break 34 01:00 02:00 PM ValueSYS: Solutions for Complying with PCI-DSS 02:00 03:00 PM Q&A Lunch