Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/1/2010
10:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

nCircle Updates Certified PCI Scan Service

nCircle Certified PCI Scan Service now provides discovery of external assets

SAN FRANCISCO—June 1, 2010—nCircle, the leader in security and compliance auditing solutions, today announced a new version of the nCircle Certified PCI Scan Service™, which adds significant functionality designed to simplify the compliance workflow for merchants of all sizes. The nCircle Certified PCI Scan Service is a practical, self-service and highly automated solution that enables anyone to scan their Internet-facing payment network for PCI compliance.

The new version of the nCircle Certified PCI Scan Service provides a range of new features including:

* Automated asset discovery – the service now provides discovery of external assets, automating the task of determining systems that are in scope for PCI ASV scanning. * Annual subscription pricing – the service adds annual subscription pricing to the previously available “pay-as-you-go” pricing providing greater flexibility to users that prefer more frequent testing. * Advanced exception management – the service now enables users to group common issues and address them all at once, providing significant time savings for customers with large numbers of PCI assets. * Simplified user interface – the user interface now enables customers to perform tasks with the fewest possible clicks, saving time and making the nCircle Certified PCI Scan Service the most accessible PCI ASV service available.

“The security of our merchants’ networks is of paramount importance in maintaining the availability of our payment network,” said Jason Miller, Director of Customer Support at Beanstream Internet Commerce, a leading provider of authentication and electronic payment processing solutions. “nCircle’s PCI service plays a critical role in certifying the security of our merchant networks. We have found it to be the most accurate and straight forward service to use, and the features in this version will definitely save us time.”

The new version of the nCircle Certified PCI Scan Service is available now. Customers using the service for the first time are eligible to receive a free trial PCI subscription. For more information on the nCircle Certified PCI Scan Service, please visit ncircle.com/pci.

About nCircle Suite360 nCircle provides the world's most comprehensive suite of solutions for agentless security and configuration auditing for physical and virtual IT environments. nCircle’s solutions combine the broadest discovery of networked systems and their operating systems, applications, vulnerabilities and configurations with advanced analytics to help enterprises reduce security risk and achieve compliance. nCircle's solutions includes IP360™ for vulnerability management and risk management, WebApp360™ for web application vulnerability auditing, Configuration Compliance Manager (CCM)™ for configuration auditing and file integrity monitoring, Certified PCI Scan Service™ for on-demand self-service PCI scanning, and Security Intelligence Hub™ for IT governance, risk and compliance (ITGRC) reporting and analytics.

About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,500 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.