|By Business Wire||
|September 27, 2012 09:01 AM EDT||
Dell SecureWorks, an industry leader in information security services, has launched a new PCI Compliance Resource Center to help organizations meet and maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS), and to help strengthen their overall security posture. PCI DSS requires any organization that transmits, processes or stores payment card information to protect the privacy and confidentiality of that data.
The PCI Compliance Resource Center features a wide range of white papers, videos and webcasts that address PCI challenges, PCI DSS remediation, and consulting and information security services offered by Dell SecureWorks.
PCI standards require organizations to build, maintain and monitor a secure network to protect cardholder data, as well as maintain a vulnerability management and information security program. Common challenges for merchants include identifying and segmenting cardholder data, assessing their current state of compliance, remediating any problems that are found, and maintaining ongoing compliance.
Regardless of how many transactions they process, merchants must demonstrate PCI compliance annually. Those that are not PCI compliant can face steep fines from their acquiring banks, and in some cases, have their payment card privileges revoked. Fines can range from $2,000 to more than $100,000 per month for PCI compliance violations, plus additional fines for repeat violations, depending on the merchant’s acquiring bank. To demonstrate ongoing compliance, organizations must submit annual Reports on Compliance (ROC) or Self-Assessment Questionnaires (SAQs), and must scan their networks at least quarterly for security vulnerabilities.
Although maintaining a PCI compliant status can prevent organizations from being fined, it is not enough to protect merchants from data breaches.
“Many organizations mistakenly believe that once they are compliant their corporate networks are secure, but many companies that were PCI compliant have been breached,” said John Cartwright, Security Systems Principal Consultant, Dell SecureWorks. “In reality, when you take care of information security issues first, becoming PCI compliant should fall into place. And when you understand security and can accurately interpret the PCI requirements, you can find cost-efficient ways to meet them.”
As with other regulations and guidelines, PCI DSS compliance cannot be achieved through technology alone. It requires establishing and maintaining a PCI program that incorporates the appropriate policies, procedures and technology to ensure ongoing compliance through continuous protection of payment card data that is collected, stored or transmitted.
Dell SecureWorks offers a full suite of PCI Security consulting and remediation solutions and is an Approved Scanning Vendor (ASV) and Qualified Security Assessor (QSA). The Dell SecureWorks Security and Risk Consulting team includes numerous certified QSA and ASV experts who work with a diverse range of organizations.
The Dell SecureWorks PCI Compliance Resource Center is located at http://go.secureworks.com/pci-compliance.
About Dell SecureWorks:
Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. Recognized as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs. For more information, visit www.dell.com/secureworks.
Dell and SecureWorks are trademarks of Dell Inc.
Dell disclaims any proprietary interest in the marks and names of others.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Feb. 26, 2017 05:00 AM EST Reads: 4,834
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
Feb. 26, 2017 03:45 AM EST Reads: 8,491
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Feb. 26, 2017 03:15 AM EST Reads: 2,017
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Feb. 26, 2017 03:00 AM EST Reads: 2,752
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 26, 2017 02:30 AM EST Reads: 13,720
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Feb. 26, 2017 02:30 AM EST Reads: 2,335
Feb. 26, 2017 02:00 AM EST Reads: 4,776
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 26, 2017 01:45 AM EST Reads: 6,217
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Feb. 26, 2017 01:30 AM EST Reads: 5,220
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Feb. 26, 2017 01:15 AM EST Reads: 1,742
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
Feb. 26, 2017 12:00 AM EST Reads: 1,498
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Feb. 25, 2017 10:45 PM EST Reads: 8,594
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 25, 2017 10:30 PM EST Reads: 1,871
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
Feb. 25, 2017 09:45 PM EST Reads: 9,328
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Feb. 25, 2017 09:00 PM EST Reads: 9,134