Risk
2/3/2014
12:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Agiliance PCI 3.0 Intelligence Pack Prevents Retail Data Breaches

Pack provides organizations that handle cardholder information with framework to implement and maintain effective information security processes and internal controls

SUNNYVALE, Calif. - January 31, 2014 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Operational and Security programs, today announced the release of the Agiliance Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 Content Pack. Based on the new PCI DSS 3.0 information security standard, it provides organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and point-of-sales cards, with the guidance and best practices to increase controls around cardholder data to prevent data breaches and reduce fraud.

In light of recent data breaches at Target and Neiman Marcus, which resulted in the theft of personal and credit card information belonging to hundreds of millions of consumers, retailers are expected to accelerate their adoption of the enhanced information security standards outlined in the November 2013 release of PCI DSS 3.0. However, implementing the new guidelines will be challenging since PCI DSS 3.0 mandates that retailers replace the current periodic "check-the-box" approach to compliance with continuous security monitoring. Furthermore, PCI DSS 3.0 extends the mandate's scope of coverage to include any part of the IT infrastructure that is connected to or can affect the security of the cardholder data. This change creates a big security data challenge since the number of assets that need to be monitored will increase significantly.

The Agiliance PCI DSS 3.0 Content Pack provides organizations that handle cardholder information and are regulated by the PCI Security Standards Council with a framework to implement and maintain effective information security processes and internal controls. It minimizes the risk of failing to conform to the PCI DSS 3.0 standards, which can result in hefty fines, class-actions lawsuits, and reputational damages. The content pack covers all technical and operational requirements, as well as guidance related to shared hosting providers, including:

. Build and Maintain a Secure Network and Systems;

. Protect Cardholder Data;

. Maintain a Vulnerability Management Program;

. Implement Strong Access Control Measures;

. Regularly Monitor and Test Networks;

. Maintain an Information Security Policy; and

. Shared Hosting Providers Cardholder Data Environment Protection.

Using Agiliance RiskVisionT, organizations can gather, score, and review their data- and survey-driven control assessment results to identify and remediate control gaps that can be exploited by hackers. Agiliance RiskVision provides a comprehensive view of an organization's PCI compliance posture to minimize the risk of data breaches. Its data automation and correlation capabilities enable organizations to more quickly and easily conduct continuous compliance assessments and cover a far broader scope of their infrastructure without adding additional staff.

"One of the most significant changes introduced with PCI DSS 3.0 is the concept of making compliance a daily event, instead of an annual check-box fire drill to comply with an audit," said Torsten George, vice president of worldwide marketing and products at Agiliance. "Continuous compliance is a considerable challenge that requires the rethinking of existing processes, including the tools organizations use to gather and analyze data. Agiliance RiskVision and the Agiliance PCI 3.0 Content Pack provide the controls, data automation, data aggregation, and workflow engine to streamline the overall compliance process and reduce the risk of data breaches."

Availability

The Agiliance PCI DSS 3.0 Content Pack is available immediately and is included with all Agiliance RiskVision subscriptions.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Operational and Security programs. Agiliance RiskVision is automating how Global 2000 companies and government agencies achieve continuous diagnostics of big data across financial, operations, and IT domains to orchestrate incident, threat, and vulnerability actions in real time. Agiliance RiskVision customers demonstrate automation use cases within 30 days on-demand, and within 60 days on-premise, made possible by a configurable platform and applications, broad library of technology integrations, and vast domain and regulatory content. Agiliance RiskVision scales with businesses, effectively managing assets, data, people, and processes to achieve 100% risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?