Risk
2/3/2014
12:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Agiliance PCI 3.0 Intelligence Pack Prevents Retail Data Breaches

Pack provides organizations that handle cardholder information with framework to implement and maintain effective information security processes and internal controls

SUNNYVALE, Calif. - January 31, 2014 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Operational and Security programs, today announced the release of the Agiliance Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 Content Pack. Based on the new PCI DSS 3.0 information security standard, it provides organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and point-of-sales cards, with the guidance and best practices to increase controls around cardholder data to prevent data breaches and reduce fraud.

In light of recent data breaches at Target and Neiman Marcus, which resulted in the theft of personal and credit card information belonging to hundreds of millions of consumers, retailers are expected to accelerate their adoption of the enhanced information security standards outlined in the November 2013 release of PCI DSS 3.0. However, implementing the new guidelines will be challenging since PCI DSS 3.0 mandates that retailers replace the current periodic "check-the-box" approach to compliance with continuous security monitoring. Furthermore, PCI DSS 3.0 extends the mandate's scope of coverage to include any part of the IT infrastructure that is connected to or can affect the security of the cardholder data. This change creates a big security data challenge since the number of assets that need to be monitored will increase significantly.

The Agiliance PCI DSS 3.0 Content Pack provides organizations that handle cardholder information and are regulated by the PCI Security Standards Council with a framework to implement and maintain effective information security processes and internal controls. It minimizes the risk of failing to conform to the PCI DSS 3.0 standards, which can result in hefty fines, class-actions lawsuits, and reputational damages. The content pack covers all technical and operational requirements, as well as guidance related to shared hosting providers, including:

. Build and Maintain a Secure Network and Systems;

. Protect Cardholder Data;

. Maintain a Vulnerability Management Program;

. Implement Strong Access Control Measures;

. Regularly Monitor and Test Networks;

. Maintain an Information Security Policy; and

. Shared Hosting Providers Cardholder Data Environment Protection.

Using Agiliance RiskVisionT, organizations can gather, score, and review their data- and survey-driven control assessment results to identify and remediate control gaps that can be exploited by hackers. Agiliance RiskVision provides a comprehensive view of an organization's PCI compliance posture to minimize the risk of data breaches. Its data automation and correlation capabilities enable organizations to more quickly and easily conduct continuous compliance assessments and cover a far broader scope of their infrastructure without adding additional staff.

"One of the most significant changes introduced with PCI DSS 3.0 is the concept of making compliance a daily event, instead of an annual check-box fire drill to comply with an audit," said Torsten George, vice president of worldwide marketing and products at Agiliance. "Continuous compliance is a considerable challenge that requires the rethinking of existing processes, including the tools organizations use to gather and analyze data. Agiliance RiskVision and the Agiliance PCI 3.0 Content Pack provide the controls, data automation, data aggregation, and workflow engine to streamline the overall compliance process and reduce the risk of data breaches."

Availability

The Agiliance PCI DSS 3.0 Content Pack is available immediately and is included with all Agiliance RiskVision subscriptions.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Operational and Security programs. Agiliance RiskVision is automating how Global 2000 companies and government agencies achieve continuous diagnostics of big data across financial, operations, and IT domains to orchestrate incident, threat, and vulnerability actions in real time. Agiliance RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 60 days on-premise, made possible by a configurable platform and applications, broad library of technology integrations, and vast domain and regulatory content. Agiliance RiskVision scales with businesses, effectively managing assets, data, people, and processes to achieve 100% risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2015-2168
Published: 2015-03-03
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.