Académique Documents
Professionnel Documents
Culture Documents
Companies affected by the Payment Card Industry Data Security Standard (PCI DSS) are required to meet a wide range
of technical and operation requirements. Addressing these standards is not simply a matter of avoiding penalties; its
about incorporating security best practices that protect cardholder data into everyday activities. Unfortunately, many
organizations struggle to meet these requirementsthe Verizon 2014 PCI Compliance Report found that 89% of
organizations failed their 2013 PCI baseline assessment.[1]
SECURITY
INTELLIGENCE
ASSET
DISCOVERY
AlienVault
USM
TM
BEHAVIORAL
MONITORING
VULNERABILITY
ASSESSMENT
THREAT
DETECTION
Asset inventory
Host-based software inventory
Asset discovery and inventory are the first essential steps to knowing what systems are on your network, which of these
systems are in scope. AlienVault USM combines three core discovery and inventory technologies to give you full visibility
into the devices that show up on your network.
Payment Card Industry (PCI) Data Security Standard, v3.0 2013 https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf
Vulnerability Assessment: Identifies assets with unpatched software, insecure configurations and other vulnerabilities
on your network:
Threat Detection: Coordinates incident response and threat management with built-in security monitoring
technologies, emerging threat intelligence from AlienVault Labs, and seamless closed-loop workflow for rapid
remediation:
Behavioral Monitoring: Identifies anomalies and other patterns that signal new, unknown threats in your network, as
well as suspicious behavior and policy violations by authorized users and devices:
Security Intelligence (SIEM): Identify, contain, and remediate threats in your network by prioritizing your risk and
response:
How AlienVault USM Helps You Comply with PCI DSS 3.0 Requirements
Rel evant Al i enVaul t U S M C a p a b i l i t i e s
B e n e f i t s of U n i f i e d S e c u r i t y M a n a g e m en t
NetFlow analysis
System availability monitoring
SIEM
Asset discovery
Do not use
vendor-supplied
defaults for
system
passwords and
other security
parameters
3.6.7
Protect stored
cardholder data
Log management
Host-based intrusion detection (HIDS)
File integrity monitoring
NetFlow analysis
SIEM
4.1
Encrypt
transmission of
cardholder data
across open,
public networks
Netflow Analysis
Behavioral Monitoring
Wireless IDS
SIEM
Protect all
systems against
malware and
regularly update
anti-virus
software or
programs
B e n e f i t s of U n i f i e d S e c u r i t y M a n a g e m en t
Asset discovery
Vulnerability assessment
Network intrusion detection (IDS)
SIEM
7.1, 7.2
Restrict access
to cardholder
data by business
need to know
SIEM
Identify and
authenticate
access to system
components
Log Management
Track and
monitor access to
all network
resources and
cardholder data
Regularly test
security systems
and processes
Vulnerability assessment
Wireless IDS
Host-based intrusion detection (HIDS)
File integrity monitoring
SIEM
www.alienvault.com