Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

4/27/2010
04:50 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Report: Tier 1 Merchants Pay $122,000 More For PCI Assessments

Ponemon Institute/Thales survey PCI DSS security assessment firms about next version of PCI

When it comes to annual costs for PCI assessments, not all engagements are created equal: Larger, Tier 1 merchants pay an average of $122,000 more, according to a survey of PCI qualified security assessors (QSAs) released today.

The Ponemon Institute, which was commissioned by encryption firm Thales e-Security for the survey, says Tier 1 merchants pay around $225,000 annually to confirm their PCI compliance. The average cost to a Tier 1 merchant is $204,000 for an on-site QSA assessment, versus $103,000 for smaller, Tier 2 merchants.

"QSAs feel they are adding value and identifying issues that, when remediated, improve the security posture of their clients," says Larry Ponemon, chairman and founder of the Ponemon Institute. "But it is expensive: Companies are paying more than an extra $1,000 to achieve PCI compliance. For companies that are struggling on the resources side, this seems to be a large amount of money."

Not all Tier 1 companies are especially large: It may just be that they conduct a lot of credit card transactions, he says. "The cost of certification wasn't appropriate to the size of the organization," he adds.

Ponemon says other companies spent less than $50,000 per year for their assessments.: "But are they getting a Yugo versus a Mercedes? Is there a quality difference?"

Among the 155 QSAs surveyed by Ponemon, more than 40 percent predict that tokenization technology will be included in the next version of PCI DSS, due to be released in October. Nearly 30 percent say end-to-end encryption is most likely to be part of the new PCI version; virtual terminals, 13 percent; and magnetic stripe imaging, 9 percent.

And 60 percent of QSAs say encryption is the most effective way to protect payment card data on an end-to-end basis. More than 40 percent consider managing encryption-key access the biggest challenge faced by merchants deploying encryption.

The current version of PCI DSS doesn't specify how encrypted data should be handled in audits. "Something that's expected [in the next version] is more clarification on the use of encryption and key management, and what organizations need to do to secure the process," Ponemon says.

A full copy of the report is available for download here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.