Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/23/2009
05:11 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ICSA Labs Announces Availability Of PCI DSS Product Capability Assurance Reports

New reports allow businesses to better understand product capabilities, maintain compliant networks

MECHANICSBURG, Pa.—ICSA Labs, an independent division of Verizon Business, today announced the availability of new reports that can help businesses that store, process or handle credit card transactions comply with industry requirements for the secure handling of this data.

Payment Card Industry Data Security Standard (PCI DSS) Product Capability Assurance Reports assist organizations handling sensitive cardholder data in selecting ICSA Labs certified computer and networking security products that also help the organization meet PCI standards. In addition, the reports can guide businesses in choosing additional products and taking other security measures that may be necessary to achieve full compliance with the PCI security standard.

To create ICSA Labs Product Capability Assurance Reports, data is first pulled from ICSA Labs' rigorous certification testing criteria and then compared with version 1.2 of the PCI DSS requirements to identify any overlap. With this information, ICSA Labs' technical staff and program managers use the results from tested products and document how each product helps to satisfy specific PCI DSS requirements. Ultimately, understanding product capabilities in the context of the PCI standard can help businesses maintain compliant networks.

"With the product capability assurances provided by these reports, in combination with the security assurances offered by the ICSA Labs' separate and rigorous certification testing processes, businesses can feel confident that ICSA Labs certified products go a long way toward protecting customers' payment card data," said George Japak, managing director, ICSA Labs. "We are delivering a unique service to help organizations meet this critical security standard while helping to advance security for all cardholders."

Reports Detail How ICSA Labs-Certified Products Aid with PCI Compliance Network and Web application firewalls are just two examples of how the reports can help merchants understand how ICSA Labs certified products fit into a PCI DSS- compliant merchant environment.

"Network firewalls are a critical component for segmenting and protecting sensitive data, and can assist in meeting requirements specified in the latest version of the PCI DSS," said Donald Meyer, senior product marketing manager, High-end Security Systems, Juniper Networks. "The ICSA Labs' Product Capability Assurance Report demonstrates to customers that Juniper's high-performance firewall solutions not only facilitate compliance with the standard, but also help protect online applications and improve enterprise security by supporting features such as encryption, intrusion detection and prevention, antivirus, and other unified threat-management capabilities."

The PCI DSS Product Capability Assurance Report for Juniper's firewall is available here.

"Meeting the requirements of the PCI DSS is a top priority for Barracuda Networks, as it should be for any business that works with sensitive customer information," said Stephen Pao, vice president of product management at Barracuda Networks. "The ICSA Labs PCI DSS Product Capability Assurance Report for the Barracuda Web Application Firewall NC 500 will help our customers feel confident that their critical data is safeguarded." ICSA Labs recently published a PCI DSS Product Capability Assurance Report for the Barracuda Web Application Firewall, which is available here.

The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical proactive measures. The intent of the standard is to help organizations proactively protect sensitive consumer-account data.

Copies of the reports will be available directly from the ICSA Labs Web site at www.icsalabs.com. About ICSA Labs

ICSA Labs is an independent division of Verizon Business, a unit of Verizon Communications (NYSE:VZ). ICSA Labs offers vendor-neutral testing and certification of security products for hundreds of the world's top security vendors. Businesses rely on ICSA Labs to authoritatively set and apply objective testing and certification criteria for measuring product compliance and reliability. For more information about ICSA Labs, please visit: www.icsalabs.com.

About Verizon Business

Verizon Business, a unit of Verizon Communications (NYSE: VZ), is a global leader in communications and IT solutions. We combine professional expertise with the world's most connected IP network to deliver award-winning communications, IT, information security and network solutions. We securely connect today's extended enterprises of widespread and mobile customers, partners, suppliers and employees — enabling them to increase productivity and efficiency and help preserve the environment. Many of the world's largest businesses and governments — including 96 percent of the Fortune 1000 and thousands of government agencies and educational institutions — rely on our professional and managed services and network technologies to accelerate their business. Find out more at www.verizonbusiness.com

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.