Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:46 PM
Dark Reading
Dark Reading
Products and Releases

New Services From EMC Help Organizations Move Beyond Compliance With Latest Release Of PCI Standards

Announces expanded consulting services

HOPKINTON, Mass., Dec. 15, 2010 /PRNewswire/ -- EMC Corporation (NYSE: EMC) today announced expanded consulting services to help organizations meet new guidelines outlined within the Payment Card Industry Data Security Standard (PCI DSS) 2.0, effective January 1, 2011. The new services help organizations reduce compliance costs with the Standard and offer customers a holistic and forward-looking approach to risk management.

Importance of PCI DSS and new Revisions

-- The PCI DSS is a framework of best practice requirements for all organizations that collect, process or store payment card account and transaction information and is designed to protect payment card data throughout the information lifecycle.

-- Due to hefty fines being levied because of non-compliance, significant percentages of enterprise budgets are devoted to compliance-related data security programs like PCI DSS, according to a recent study conducted by Forrester Consulting on behalf of RSA and Microsoft.*

-- Key revisions to Version Two reinforce the need for organizations to participate in a thorough scoping exercise prior to assessment in order to understand where cardholder data resides. This allows organizations to adopt a risk-based approach when assessing and prioritizing vulnerabilities that is based on their specific business circumstances.

New PCI DSS Readiness and Response Services from EMC Consulting

-- EMC's new PCI DSS Readiness and Response services from EMC Consulting address the PCI DSS 2.0 revisions and help translate business objectives into policies and information risk strategies.

-- Leveraging the security and compliance expertise of RSA, the security division of EMC, these services are delivered through technology, policy and program development. They also include a recommended separation of function between the PCI assessment itself and readiness and remediation planning.

New Services Include:

-- PCI Program Strategy and Implementation - Organizations leveraging this service not only remediate their PCI compliance issues, but develop a security and compliance program that is aligned with business objectives. New services offered include program development and management, design of strategic frameworks for PCI program, assessment and development of processes and best practices, and PCI training to security teams, data owners, key stakeholders, and internal audit team.

-- PCI Readiness Assessments - This service evaluates an organization's current PCI DSS posture and helps develop a remediation strategy roadmap prior to undergoing a formal PCI assessment. Experts from EMC Consulting use a combination of interviews, system reviews, site visits and document reviews to discover gaps and issues with organizations' PCI DSS compliance.

-- Breach Management and Post- Event Readiness Assessment- Even organizations that pass a PCI Assessment can be impacted by a breach of cardholder information. Should a breach occur, the actions taken following the breach can determine the level of financial impact on an organization. These new services offer post-breach forensics, evaluation, and guidelines to help ensure future compliance of the organization.

A full list of EMC Consulting's Risk Management and Compliance offerings can be found online.

Analyst Validation:

"Enterprises are still unclear about the importance of separating Readiness and Compliance," said Chris Liebert, Senior Analyst, Security Services, IDC. "The challenge organizations face is not the PCI assessment process itself. The PCI Security Standards Council establishes clear requirements for self-assessment and the process for annual on-site PCI assessments conducted by Qualified Security Assessors (QSA) is straightforward and certified by the Council. The correct approach to PCI compliance validation is to approach it as a three step process: assessment, remediation, and compliance. By approaching PCI compliance with a detailed readiness gap analysis, and remediation activities before any onsite assessment takes place, organizations mitigate the risk of failing an assessment and incurring steep costs of non-compliance."

EMC Executive Quote

"EMC Consulting and RSA are leaders in delivering programs that help customers build security strategies that meet regulatory and governance requirements," said Tom Roloff, Senior Vice President of EMC Consulting, EMC Corporation. "We understand that demonstrating and maintaining PCI compliance remains one of the broadest and most complex challenges faced by organizations today. By leveraging the expertise of RSA, EMC Consulting acts as a trusted security advisor, giving organizations the confidence they need to comply with regulations and also establish a foundation of broad data security best practices."

About EMC Consulting

As part of EMC Corporation, the world's leading developer and provider of information infrastructure technology and solutions, EMC Consulting provides strategic guidance and technology expertise to help organizations exploit information to its maximum potential. With worldwide expertise across organizations' business, applications and infrastructure, as well as deep industry understanding, EMC Consulting guides and delivers revolutionary thinking to help clients realize their ambitions in an information economy. EMC Consulting drives execution for its clients, including more than half of the Global Fortune 500 companies, to transform information into actionable strategies and tangible business results. More information about EMC Consulting can be found at www.EMC.com/consulting

About RSA

RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.