|
|
Developed
by the major credit card issuers, the Payment Card Industry Data
Security Standard (PCI DSS) outlines best practices for credit card
data,storage, processing, and transmission. Its intent is to protect
credit card information from fraud, theft, or any other breach
|
|
|
- Build and maintain a secure network.
- Protect cardholder data.
- Maintain a vulnerability management program.
- Implement strong access control measures.
- Regularly monitor and test networks.
- Maintain an information security policy.
|
|
How does
EncrypTight™ Help You Comply with PCI DSS
|
|
|
EncrypTight
enables secure data transmissions, which assures the confidentiality,
authenticity, and integrity of data as it travels across anynetwork,
regardless of size, type, or topology. You’ll get encryption and
authentication of all data, including cardholder information. Acting
as a cryptographic firewall that rejects any packets lacking the
proper authentication, EncrypTight ensures access to data is limited
to those who need to see it. By protecting the network and the data,
EncrypTight helps you comply with PCI DSS
|
|
PCI Requirement VS
How EncrypTight helps you with compliance
|
|
|
Scope of PCI assessment may include
the entire network
|
|
- Avoid major network changes by overlaying
encryption on top of the existing network.
- Strong cryptography and simple policies isolate the
Cardholder Data Environment (CDE) from the rest of the network.
- Get stronger security through encryption rather
than firewall-based approaches. The network is isolated using
encryption rather than relying only on packet headers.
- Secure data without changing the physical or
logical network topology.
- Simplify by encrypting among network segments that
store, process, or transmit cardholder data.
- Save money during PCI assessments by reducing the
scope of the assessments.
- Setup and management is
simplified with GUI-based policies that allowthe network headers
to pass in the clear while encrypting the payload.
|
|
|
Use strong cryptography and security protocols to
safeguard sensitive cardholder data during transmission over open,
public networks
|
|
- Quickly and simply encrypt card-holder data and
other sensitive information across any network without affecting
the applications and services that run over the network.
- Encrypt data as it traverses a third-party service
provider network or the Internet.
- EncrypTight is an easy, drop-in solution that works
with existing network and applications.
- Doesn't affect existing
failover, redundancy and load-sharing.
|
|
|
Track and
monitor all access to network resources and cardholder data
|
|
- Provide a full audit trail for logging and
auditing.
- Role-based access enables an auditor to monitor
security.
- Auditing and monitoring can be easily outsourced to
a third party
|
|
|
|
|
|
No comments:
Post a Comment