Risk
2/3/2014
12:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Agiliance PCI 3.0 Intelligence Pack Prevents Retail Data Breaches

Pack provides organizations that handle cardholder information with framework to implement and maintain effective information security processes and internal controls

SUNNYVALE, Calif. - January 31, 2014 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Operational and Security programs, today announced the release of the Agiliance Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 Content Pack. Based on the new PCI DSS 3.0 information security standard, it provides organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and point-of-sales cards, with the guidance and best practices to increase controls around cardholder data to prevent data breaches and reduce fraud.

In light of recent data breaches at Target and Neiman Marcus, which resulted in the theft of personal and credit card information belonging to hundreds of millions of consumers, retailers are expected to accelerate their adoption of the enhanced information security standards outlined in the November 2013 release of PCI DSS 3.0. However, implementing the new guidelines will be challenging since PCI DSS 3.0 mandates that retailers replace the current periodic "check-the-box" approach to compliance with continuous security monitoring. Furthermore, PCI DSS 3.0 extends the mandate's scope of coverage to include any part of the IT infrastructure that is connected to or can affect the security of the cardholder data. This change creates a big security data challenge since the number of assets that need to be monitored will increase significantly.

The Agiliance PCI DSS 3.0 Content Pack provides organizations that handle cardholder information and are regulated by the PCI Security Standards Council with a framework to implement and maintain effective information security processes and internal controls. It minimizes the risk of failing to conform to the PCI DSS 3.0 standards, which can result in hefty fines, class-actions lawsuits, and reputational damages. The content pack covers all technical and operational requirements, as well as guidance related to shared hosting providers, including:

. Build and Maintain a Secure Network and Systems;

. Protect Cardholder Data;

. Maintain a Vulnerability Management Program;

. Implement Strong Access Control Measures;

. Regularly Monitor and Test Networks;

. Maintain an Information Security Policy; and

. Shared Hosting Providers Cardholder Data Environment Protection.

Using Agiliance RiskVisionT, organizations can gather, score, and review their data- and survey-driven control assessment results to identify and remediate control gaps that can be exploited by hackers. Agiliance RiskVision provides a comprehensive view of an organization's PCI compliance posture to minimize the risk of data breaches. Its data automation and correlation capabilities enable organizations to more quickly and easily conduct continuous compliance assessments and cover a far broader scope of their infrastructure without adding additional staff.

"One of the most significant changes introduced with PCI DSS 3.0 is the concept of making compliance a daily event, instead of an annual check-box fire drill to comply with an audit," said Torsten George, vice president of worldwide marketing and products at Agiliance. "Continuous compliance is a considerable challenge that requires the rethinking of existing processes, including the tools organizations use to gather and analyze data. Agiliance RiskVision and the Agiliance PCI 3.0 Content Pack provide the controls, data automation, data aggregation, and workflow engine to streamline the overall compliance process and reduce the risk of data breaches."

Availability

The Agiliance PCI DSS 3.0 Content Pack is available immediately and is included with all Agiliance RiskVision subscriptions.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Operational and Security programs. Agiliance RiskVision is automating how Global 2000 companies and government agencies achieve continuous diagnostics of big data across financial, operations, and IT domains to orchestrate incident, threat, and vulnerability actions in real time. Agiliance RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 60 days on-premise, made possible by a configurable platform and applications, broad library of technology integrations, and vast domain and regulatory content. Agiliance RiskVision scales with businesses, effectively managing assets, data, people, and processes to achieve 100% risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-0658
Published: 2015-03-27
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.