Risk
2/3/2014
12:00 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Agiliance PCI 3.0 Intelligence Pack Prevents Retail Data Breaches

Pack provides organizations that handle cardholder information with framework to implement and maintain effective information security processes and internal controls

SUNNYVALE, Calif. - January 31, 2014 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Operational and Security programs, today announced the release of the Agiliance Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 Content Pack. Based on the new PCI DSS 3.0 information security standard, it provides organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and point-of-sales cards, with the guidance and best practices to increase controls around cardholder data to prevent data breaches and reduce fraud.

In light of recent data breaches at Target and Neiman Marcus, which resulted in the theft of personal and credit card information belonging to hundreds of millions of consumers, retailers are expected to accelerate their adoption of the enhanced information security standards outlined in the November 2013 release of PCI DSS 3.0. However, implementing the new guidelines will be challenging since PCI DSS 3.0 mandates that retailers replace the current periodic "check-the-box" approach to compliance with continuous security monitoring. Furthermore, PCI DSS 3.0 extends the mandate's scope of coverage to include any part of the IT infrastructure that is connected to or can affect the security of the cardholder data. This change creates a big security data challenge since the number of assets that need to be monitored will increase significantly.

The Agiliance PCI DSS 3.0 Content Pack provides organizations that handle cardholder information and are regulated by the PCI Security Standards Council with a framework to implement and maintain effective information security processes and internal controls. It minimizes the risk of failing to conform to the PCI DSS 3.0 standards, which can result in hefty fines, class-actions lawsuits, and reputational damages. The content pack covers all technical and operational requirements, as well as guidance related to shared hosting providers, including:

. Build and Maintain a Secure Network and Systems;

. Protect Cardholder Data;

. Maintain a Vulnerability Management Program;

. Implement Strong Access Control Measures;

. Regularly Monitor and Test Networks;

. Maintain an Information Security Policy; and

. Shared Hosting Providers Cardholder Data Environment Protection.

Using Agiliance RiskVisionT, organizations can gather, score, and review their data- and survey-driven control assessment results to identify and remediate control gaps that can be exploited by hackers. Agiliance RiskVision provides a comprehensive view of an organization's PCI compliance posture to minimize the risk of data breaches. Its data automation and correlation capabilities enable organizations to more quickly and easily conduct continuous compliance assessments and cover a far broader scope of their infrastructure without adding additional staff.

"One of the most significant changes introduced with PCI DSS 3.0 is the concept of making compliance a daily event, instead of an annual check-box fire drill to comply with an audit," said Torsten George, vice president of worldwide marketing and products at Agiliance. "Continuous compliance is a considerable challenge that requires the rethinking of existing processes, including the tools organizations use to gather and analyze data. Agiliance RiskVision and the Agiliance PCI 3.0 Content Pack provide the controls, data automation, data aggregation, and workflow engine to streamline the overall compliance process and reduce the risk of data breaches."

Availability

The Agiliance PCI DSS 3.0 Content Pack is available immediately and is included with all Agiliance RiskVision subscriptions.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Operational and Security programs. Agiliance RiskVision is automating how Global 2000 companies and government agencies achieve continuous diagnostics of big data across financial, operations, and IT domains to orchestrate incident, threat, and vulnerability actions in real time. Agiliance RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 60 days on-premise, made possible by a configurable platform and applications, broad library of technology integrations, and vast domain and regulatory content. Agiliance RiskVision scales with businesses, effectively managing assets, data, people, and processes to achieve 100% risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web