Using Masking And Sensitive Data Discovery To Meet PCI DSS 2.0 Requirements

Dataguise will be publishing a new guide on addressing PCI DSS 2.0 requirements

December 15, 2010

1 Min Read


Fremont, Calif., December 15, 2010 - DataguiseT (, a leading provider of security solutions for protecting sensitive data across the enterprise, has developed a guide, "Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking," that shows organizations how integrated sensitive data discovery and masking solutions can be used to efficiently and cost effectively address the latest security requirements spelled out in PCI DSS 2.0.

All organizations with payment card data - including merchants who are authorized acceptors of cards and service providers who store, process or transmit cardholder data - must meet this latest iteration of the standard, released in October 2010, by January 1, 2011. Dataguise solutions help organizations comply with sections 3.1, 3.1.1, 7, and 11 of PCI DSS 2.0 by enabling them to quickly identify cardholder data in networks and systems, facilitate safe testing of applications with masked production data and manage risks to sensitive data.

"Dataguise solutions are organized around four critical data protection functionalities: finding databases deployed on the network; searching databases and shared file systems for sensitive data; remediating sensitive data risk in application data sets with next-generation, high-speed data masking; and reporting on the existence of sensitive data risks in the enterprise," said Allan Thompson, EVP, Operations for Dataguise. "These are exactly the functionalities companies must have in place to meet the requirements of PCI DSS 2.0. Our new guide maps the standard's requirements and testing procedures against our products' capabilities to illustrate how DgDiscover and DgMasker can help organizations fulfill those requirements."

These highlights from Dataguise summarize some PCI DSS 2.0 requirements and the corresponding Dataguise capabilities.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights