Conquering PCI DSS Compliance



Similar documents
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

How To Protect Visa Account Information

Payment Card Industry Data Security Standards.

Accelerating PCI Compliance

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

PCI Compliance Top 10 Questions and Answers

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Compliance for Cloud Applications

PCI Compliance. Top 10 Questions & Answers

Cisco Security Optimization Service

worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected.

Payment Card Industry Data Security Standard

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Project Title slide Project: PCI. Are You At Risk?

PCI Data Security Standards (DSS)

Is the PCI Data Security Standard Enough?

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

How To Protect Your Business From A Hacker Attack

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance: Protection Against Data Breaches

PCI Requirements Coverage Summary Table

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Thoughts on PCI DSS 3.0. September, 2014

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

PCI DSS Requirements - Security Controls and Processes

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

PCI Data Security Standards

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

PCI Requirements Coverage Summary Table

Managed Security Services for Data

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

GFI White Paper PCI-DSS compliance and GFI Software products

THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS

PCI Compliance: How to ensure customer cardholder data is handled with care

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Franchise Data Compromise Trends and Cardholder. December, 2010

CloudCheck Compliance Certification Program

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Network Segmentation

SecurityMetrics Introduction to PCI Compliance

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Introduction. PCI DSS Overview

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

Preventing. Payment Card Fraud. Is your business protected?

Need to be PCI DSS compliant and reduce the risk of fraud?

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

PCI v2.0 Compliance for Wireless LAN

How To Secure Your Store Data With Fortinet

How To Protect Your Credit Card Information From Being Stolen

Becoming PCI Compliant

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Achieving Compliance with the PCI Data Security Standard

What Every Business Should Know About PCI Compliance

PCI Compliance 3.1. About Us

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

PCI DSS COMPLIANCE DATA

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

An article on PCI Compliance for the Not-For-Profit Sector

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

How To Protect Your Data From Being Stolen

PCI Data Security Standard 3.0

Client Security Risk Assessment Questionnaire

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Josiah Wilkinson Internal Security Assessor. Nationwide

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

PAI Secure Program Guide

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

University of Sunderland Business Assurance PCI Security Policy

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Best Practices (Top Security Tips)

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

Achieving PCI Compliance Using F5 Products

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Merchant guide to PCI DSS

Transcription:

Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal, the Payment Card Industry (PCI) Security Standards Council developed the PCI Digital Security Standard (PCI DSS). This set of standards provides a global framework of practices designed to prevent, detect and react to security incidents. Entities expected to comply include merchants, financial institutions, e-commerce companies, non-profit and educational organizations, restaurants, professional services providers, Cloud Service Providers (CSPs), Managed Security Service Providers (MSSPs) and even individuals who accept payment cards for product sales and services. The PCI DSS Standards The PCI DSS, which covers technical and operational components in the payment card transaction environment, expects entities to: Build and maintain a secure network - Install and maintain a firewall configuration to protect cardholder data - Eliminate vendor-supplied defaults for system passwords and other security parameters Protect cardholder data - Safeguard stored cardholder data - Encrypt transmission of cardholder data across open, public networks Maintain a vulnerability management program Implement strong access control measures - Limit access to cardholder data to only those individuals whose jobs require such access - Assign a unique ID to each person with computer access - Restrict physical access to cardholder data Regularly monitor and test networks - Track and monitor all access to network resources and cardholder data - Regularly test security systems and processes Maintain an information security policy - Develop, implement and enforce an information security policy for all personnel - Use and regularly update anti-virus software or programs - Develop and maintain secure systems and applications 1

Compliance: Costly and Complex Organizations that must comply with PCI DSS face a number of obstacles, including the following: - Lack of In-House Expertise The complicated process for PCI DSS compliance usually includes determining which system components are impacted, examining the compliance of those components, validating alternative control technologies/processes, reporting Most organizations do not have spare headcount to determine security requirements, review and update documentation, conduct risk assessments and install and maintain security network hardware and software. - CAPEX Investment In many cases, the hardware and software an organization uses for its day-to-day operations does not meet the technical requirements of the PCI DSS. This means entities may face a considerable capital outlay in the name of security compliance. The tab continues to grow as ongoing maintenance, capacity expansions and upgrades to meet changing regulations and increased threats are added to the total investment cost. - Diminished Operational Efficiency Unless an organization invests in specialized IT staff and in-house compliance experts, it will find itself diverting the attention of team members away from operations that grow revenue and improve customer service to focus instead on complex security compliance activities. Most organizations impacted by PCI DSS do not have spare headcount to determine security requirements, review and update documentation, conduct risk assessments and install and maintain security network hardware and software. and submitting required documentation, and clarifying or updating report statements. Adding to the complexity is the fact that requirements vary depending upon an entity s classification or risk level. Moreover, each payment card brand has its own specific compliance enforcement program. Rarely does a merchant or other entity have the in-house expertise required to fully interpret and comply with all the variables. - Constantly Evolving Security Environment Organizations not only must fight current attacks but also anticipate and thwart future ones. Threats can originate from evolving network technologies, protocols and devices, as well as sophisticated hackers, internal breaches, Bring Your Own Device (BYOD) and wireless environments, increased personnel access, business partner security breaches and even natural disasters. 2

Managed Security: Effective and Essential Often the most effective way to approach PCI DSS compliance is to work with a PCI Compliant CSP or MSSP. A managed security approach that encompasses both technology and threat management provides an organization with efficiencies and functionality far beyond what can be accomplished in house, including: - Lowered CAPEX Organizations can reduce or even eliminate their cost of capital investment for PCI DSS compliance by jettisoning the purchase and maintenance of specialized hardware and software, and taking advantage of a hosted cloud network or an MSSP s purpose-built resources. Retained capital resources can then be used for projects that more significantly impact enterprise growth. vulnerabilities may appear almost anywhere, including point-of-sale devices, wireless hotspots or Web applications, servers and more. By keeping ahead of sophisticated hackers and data thieves who constantly devise new ways to breach security, organizations will see increased customer confidence and protected brand reputation, as well as avoided lawsuits, insurance claims and fines. - Accelerated Time to Market By partnering with a cloud provider or MSSP and its security compliance experts, an enterprise reduces precious time spent researching, purchasing and installing specialized hardware and software, and developing complicated security processes. It can instead focus on other critical operational issues required for a timely launch or expansion. - Predictable OPEX and Workforce Efficiencies In addition to reaping the benefits that come from converting burdensome CAPEX spending to OPEX predictability, organizations can reduce or eliminate the need for staff to devote time to security compliance activities and instead focus on projects that contribute directly to organizational profitability. - Decreased Risk A CSP or MSSP provides immediate access to new technologies and applications in an always-changing card-processing ecosystem where By keeping ahead of sophisticated hackers and data thieves, organizations will see increased customer confidence and protected brand reputation, as well as avoided lawsuits, insurance claims and fines. 3

What to Look for in a Provider Windstream s PCI compliant Data Centers and MSSP offerings are able to combine security technologies and security management into a single, unified package, so organizations can quickly and cost-effectively get the help they need to comply with PCI DSS. The many benefits that organizations gain when choosing a provider such as Windstream include: - Access to experts trained in the interpretation and implementation of regulations and their impact on an organization s network - Enterprise-class Cloud Data Centers that include vulnerability assessments, threat detection, penetration testing and incident response to help identify and deal with security issues before and after they occur - Technologies and processes for access control, authentication, data encryption and accountability practices on all Local Area Networks (LANs) and Wide Area Networks (WANs), and for users accessing the network remotely through Virtual Private Networks (VPNs) and WiFi - Real-time protection with application intelligence that detects and prevents malicious traffic from gaining network access, and protects against viruses, worms and phishing attacks - Security log storage and robust reporting Finally, organizations must ensure the services they obtain meet the requirements of PCI DSS. Although each entity ultimately is responsible for its own compliance, confirming that cloud and MSSP services meet regulations allows an organization to rest assured that the specific piece of the compliance puzzle being outsourced will meet regulatory requirements. Windstream s PCI compliant Data Centers and MSSP offerings are able to combine security technologies and security management into a single, unified package. - Quick and easy scalability for growing enterprises - Risk-free, easy deployment and a single point of contact for all issues 4

Conclusion With a company like Windstream as your CSP and MSSP for compute, storage, networking, email and web security, you can stop worrying about outdated equipment, hardware failure and lack of capital resources. You also gain access to seasoned professionals who use powerful security technology and highly accurate threat intelligence to provide comprehensive, 24 x 7 network protection and regulatory compliance. Windstream s Security Services team members will work with you at every point to implement and maintain the most cost-effective solutions to safeguard your network and your business. Rely on their expertise with complex security demands and strict regulatory compliance requirements so you can strengthen security while freeing your IT resources for projects that contribute to your business goals and your bottom line. 12080 09.13 2013 Windstream Corporation 5