SlideShare una empresa de Scribd logo
1 de 40
How to Sell PCI Compliance With Without PCI Road Ahead SPEED LIMIT 80 SPEED LIMIT 45
How to Sell Compliance
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PCI-DSS Payment Card Industry Data Security Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PCI SSC Responsibilities
PCI Industry Standards CONFIDENTIAL  All Rights Reserved
Roles of the Payment Brands Function Visa M/C Amex Discover JCB Data security program CISP SDP DSOP DISC DSP Service provider VNP TPP / DSE TPP TPP/ PSP TPP Authorization services Clearing services Settlement services Establish operating rules & regulations Issue cards through  3 rd  parties Acquire transactions through 3 rd  parties Issue cards directly Acquire transactions directly
Comparison  of US / RoW / WW Compliance Status Validation Update* * Source: http://usa.visa.com/download/merchants/cisp_pcidss_compliancestats.pdf ,[object Object],[object Object],[object Object],Majority PCI Category  (Transactions/ year) US Estimated Population Size RoW Estimated Population Size WW Estimated Population Size Level 1 Merchant** (>6M) 352 1,006 1,358 Level 2 Merchant** (1-6M) 895 2,557 3,452 Level 3 Merchant (e-commerce only 20,000 – 1M) 2,482 7,091 9,573 Level 4 Merchant  (<1M) ~5.0M ~14.3M ~19.3M
Past and Upcoming PCI DSS Deadlines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Non-Compliance Risks Fines, Fees, Costs, Loss ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A non-compliant, compromised business could expect the following:  *2008 G artner estimate for data breach  remediation for compromised cards
Anatomy of PCI Transactions
Payment Transaction Flow CONFIDENTIAL  All Rights Reserved
Example of Payment Industry Ecosystem Merchants Issuer (Consumer Bank) Payment  Brand  Network Credit Cards Cardholder Acquirer (Merchant Bank)
Card Processing - Authorization Merchants CB approves purchase CH swipes card at Merchant MB asks processor to determine CH’s bank Merchant connects to MB 3 4 PBN determines CB & requests approval 5 6 7 8 1 2 PBN sends approval to MB MB sends approval to Merchant Merchant gives receipt to CH Issuer (Consumer Bank) Payment  Brand  Network Credit Cards Cardholder Acquirer (Merchant Bank)
Card Processing - Clearing Merchants CB provides reconciliation to PBN MB sends purchase info to PBN 1 2 PBN sends purchase info to CB 3 4 PBN sends reconciliation to MB Issuer (Consumer Bank) Payment  Brand  Network Acquirer (Merchant Bank)
Card Processing - Settlement Merchants CB sends payment to processor 1 2 3 Processor's settlement bank sends pmt to MB MB pays merchant for CH purchase 4 CB bills  CH Issuer (Consumer Bank) Processor Cardholder Acquirer (Merchant Bank)
PCI Mapping to SonicWALL
Where Does SonicWALL Play?
PCI Mapping By Security Product Line PCI DSS Requirement TZ NSA E-Class SSL-VPN EMS GMS Requirement 1 Requirement 2 Requirement 3 Requirement 4 Requirement 5 Requirement 6 Requirement 7 Requirement 8 Requirement 9 Requirement 10 Requirement 11 Requirement 12
SonicWALL PCI Solution Set ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comprehensive PCI DSS Solutions Small, Medium & Distributed Networks SonicWALL GMS Devices / Servers Switches SonicWALL Firewalls Remote Clients Clients Data Storage E-mail/IM/P2P Clients Integrated Business Solutions POS Solutions
Example of a  SonicWALL PCI Deployment
Addressing Retail Concerns    … And Protecting Systems ,[object Object],[object Object],[object Object],We classify retail into three groups
Typical SonicWALL Quick Service POS Solution
Typical SonicWALL Quick Service POS Solution ,[object Object]
Typical SonicWALL Quick Service POS Solution ,[object Object],[object Object]
Typical SonicWALL Quick Service POS Solution ,[object Object],[object Object],[object Object]
Typical SonicWALL Quick Service POS Solution ,[object Object],[object Object],[object Object],[object Object]
Typical SonicWALL Quick Service POS Solution 5.  Create secure, reliable VPN connections over broadband (Req 4)
Typical SonicWALL Quick Service POS Solution ,[object Object],[object Object]
Typical SonicWALL Quick Service POS Solution ,[object Object],[object Object],[object Object]
PCI Pitch
Steps to Prepare for Compliance CONFIDENTIAL  All Rights Reserved * Report of Compliance (ROC).
Problem - Pain Point - Product Problem Question Pain Point SonicWALL Product/Feature SonicWALL Benefit How concerned are you about Rogue Access Points (RAP)? Finding RAPs connected to the network. (Req. 11) SonicOS, SonicPoints and GMS Single appliance option for RAP detection Would you like to throttle unauthorized merchant activity and increase store site productivity? Non-business traffic is killing the pipe while legitimate business traffic  suffers (Req 2) Application intelligence control Policy-based block/restrict throttles CHD traffic with bandwidth management How difficult do you find it to maintain consistent policy control across your protected CHD environment? Maintaining unified policies, controlling access and avoiding orphaned policies and security gaps. GMS – Policy management Easily create security policies and enforce them at the global, group or unit level. How are you mitigating your exposure to web-facing vulnerabilities? Protect against XSS, CSRF, SQL injection, etc. (Req. 6.6) WAF Integrated WAF protection with DPI How do you limit scope and protect CHD in transit? Network segmentation  SonicOS (PortSchield, Zones) Integrated segmentation of CHD
How We Help with PCI Compliance?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Marketing Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SonicWALL Reference Customers
PCI & Security Resource Center ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visit www.SonicWALL.com
Take the Fast lane to PCI Compliance ,[object Object],[object Object],With SonicWALL Without SonicWALL  Design and build piecemeal security solution… Deliver solid security solutions that streamline compliance configurations, allow for scalability and are approved by a PCI QSA PCI Road Ahead SPEED LIMIT 80 SPEED LIMIT 45
Q&A
Thank you Email Questions to  PCI @SonicWALL.com

Más contenido relacionado

La actualidad más candente

Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactionslfilliat
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overviewb28stu
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
Cost Of A Breach Case Study and PCI Prioritization
Cost Of A Breach Case Study  and PCI PrioritizationCost Of A Breach Case Study  and PCI Prioritization
Cost Of A Breach Case Study and PCI PrioritizationJan Carroza
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certificationhodonoghue
 
YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009guest3e40ef
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
NFC Contactless EMV Payment Device
NFC Contactless EMV Payment DeviceNFC Contactless EMV Payment Device
NFC Contactless EMV Payment DeviceStuart McGregor
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Netcetera
 
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, NetceteraBoost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, NetceteraNetcetera
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...John Baines
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
 

La actualidad más candente (19)

Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overview
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Cost Of A Breach Case Study and PCI Prioritization
Cost Of A Breach Case Study  and PCI PrioritizationCost Of A Breach Case Study  and PCI Prioritization
Cost Of A Breach Case Study and PCI Prioritization
 
Apani PCI-DSS Compliance
Apani PCI-DSS ComplianceApani PCI-DSS Compliance
Apani PCI-DSS Compliance
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
 
YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)
 
NFC Contactless EMV Payment Device
NFC Contactless EMV Payment DeviceNFC Contactless EMV Payment Device
NFC Contactless EMV Payment Device
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
 
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, NetceteraBoost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
Boost your approved transaction volume - Ana Vuksanovikj Vaneska, Netcetera
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 

Similar a How To Sell PCI Compliance (External)

Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliancehypknight
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. Compliance3
 
Mako PCI Presentation
Mako PCI PresentationMako PCI Presentation
Mako PCI PresentationAdrian_Pearce
 
Closing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet EnterpriseClosing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet Enterprisebagnalldarren
 
Furture_of_banking
Furture_of_bankingFurture_of_banking
Furture_of_bankingrclalwani
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...Ingenico Group
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudKnowledge Group
 
DataPower for PCI
DataPower for PCIDataPower for PCI
DataPower for PCIDanteJara8
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultJolin Löf
 

Similar a How To Sell PCI Compliance (External) (20)

Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliance
 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
 
PruebaJLF.pptx
PruebaJLF.pptxPruebaJLF.pptx
PruebaJLF.pptx
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study.
 
Mako PCI Presentation
Mako PCI PresentationMako PCI Presentation
Mako PCI Presentation
 
Closing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet EnterpriseClosing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet Enterprise
 
Cards Center Workshop
Cards Center WorkshopCards Center Workshop
Cards Center Workshop
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
 
Payment System Risk. Visa
Payment System Risk. VisaPayment System Risk. Visa
Payment System Risk. Visa
 
Furture_of_banking
Furture_of_bankingFurture_of_banking
Furture_of_banking
 
Furtureofbanking
FurtureofbankingFurtureofbanking
Furtureofbanking
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
 
DataPower for PCI
DataPower for PCIDataPower for PCI
DataPower for PCI
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsult
 

How To Sell PCI Compliance (External)

  • 1. How to Sell PCI Compliance With Without PCI Road Ahead SPEED LIMIT 80 SPEED LIMIT 45
  • 2. How to Sell Compliance
  • 3.
  • 4.
  • 6. PCI Industry Standards CONFIDENTIAL All Rights Reserved
  • 7. Roles of the Payment Brands Function Visa M/C Amex Discover JCB Data security program CISP SDP DSOP DISC DSP Service provider VNP TPP / DSE TPP TPP/ PSP TPP Authorization services Clearing services Settlement services Establish operating rules & regulations Issue cards through 3 rd parties Acquire transactions through 3 rd parties Issue cards directly Acquire transactions directly
  • 8.
  • 9.
  • 10.
  • 11. Anatomy of PCI Transactions
  • 12. Payment Transaction Flow CONFIDENTIAL All Rights Reserved
  • 13. Example of Payment Industry Ecosystem Merchants Issuer (Consumer Bank) Payment Brand Network Credit Cards Cardholder Acquirer (Merchant Bank)
  • 14. Card Processing - Authorization Merchants CB approves purchase CH swipes card at Merchant MB asks processor to determine CH’s bank Merchant connects to MB 3 4 PBN determines CB & requests approval 5 6 7 8 1 2 PBN sends approval to MB MB sends approval to Merchant Merchant gives receipt to CH Issuer (Consumer Bank) Payment Brand Network Credit Cards Cardholder Acquirer (Merchant Bank)
  • 15. Card Processing - Clearing Merchants CB provides reconciliation to PBN MB sends purchase info to PBN 1 2 PBN sends purchase info to CB 3 4 PBN sends reconciliation to MB Issuer (Consumer Bank) Payment Brand Network Acquirer (Merchant Bank)
  • 16. Card Processing - Settlement Merchants CB sends payment to processor 1 2 3 Processor's settlement bank sends pmt to MB MB pays merchant for CH purchase 4 CB bills CH Issuer (Consumer Bank) Processor Cardholder Acquirer (Merchant Bank)
  • 17. PCI Mapping to SonicWALL
  • 19. PCI Mapping By Security Product Line PCI DSS Requirement TZ NSA E-Class SSL-VPN EMS GMS Requirement 1 Requirement 2 Requirement 3 Requirement 4 Requirement 5 Requirement 6 Requirement 7 Requirement 8 Requirement 9 Requirement 10 Requirement 11 Requirement 12
  • 20.
  • 21. Example of a SonicWALL PCI Deployment
  • 22.
  • 23. Typical SonicWALL Quick Service POS Solution
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Typical SonicWALL Quick Service POS Solution 5. Create secure, reliable VPN connections over broadband (Req 4)
  • 29.
  • 30.
  • 32. Steps to Prepare for Compliance CONFIDENTIAL All Rights Reserved * Report of Compliance (ROC).
  • 33. Problem - Pain Point - Product Problem Question Pain Point SonicWALL Product/Feature SonicWALL Benefit How concerned are you about Rogue Access Points (RAP)? Finding RAPs connected to the network. (Req. 11) SonicOS, SonicPoints and GMS Single appliance option for RAP detection Would you like to throttle unauthorized merchant activity and increase store site productivity? Non-business traffic is killing the pipe while legitimate business traffic suffers (Req 2) Application intelligence control Policy-based block/restrict throttles CHD traffic with bandwidth management How difficult do you find it to maintain consistent policy control across your protected CHD environment? Maintaining unified policies, controlling access and avoiding orphaned policies and security gaps. GMS – Policy management Easily create security policies and enforce them at the global, group or unit level. How are you mitigating your exposure to web-facing vulnerabilities? Protect against XSS, CSRF, SQL injection, etc. (Req. 6.6) WAF Integrated WAF protection with DPI How do you limit scope and protect CHD in transit? Network segmentation SonicOS (PortSchield, Zones) Integrated segmentation of CHD
  • 34. How We Help with PCI Compliance?
  • 35.
  • 37.
  • 38.
  • 39. Q&A
  • 40. Thank you Email Questions to PCI @SonicWALL.com

Notas del editor

  1. The PCI-DSS Standard May 26, 2011 Copyright © 2006-2007, Network Frontiers LLC. All rights reserved.
  2. The PCI-DSS Standard May 26, 2011 Copyright © 2006-2007, Network Frontiers LLC. All rights reserved.
  3. The PCI-DSS Standard May 26, 2011 Copyright © 2006-2007, Network Frontiers LLC. All rights reserved. Acquirer and Issuer exchange information. This usually happens within 1 day.
  4. The PCI-DSS Standard May 26, 2011 Copyright © 2006-2007, Network Frontiers LLC. All rights reserved.
  5. Wireless also gives you the opportunity to offer Internet access to your customers. It can be offered as a free service to attract more customers into restaurants, or perhaps offered as a revenue-generating service on its own. If you’re thinking about setting up hotspot Internet access in your restaurants, you already know it is important to keep your wireless guests out of your private POS network. SonicWALL wireless solutions do this by creating a separate wireless network segment for guests which only allows access to the Internet while sealing off the rest of the POS network.
  6. Finally, no security solution is effective is it remains static. The Internet is an incredibly dynamic environment, with new threats emerging every day. Your security solution must be dynamic as well to keep pace with the ever-changing threat environment. It is important to monitor and maintain your protection, whether you do it yourself or outsource it to your preferred IT service provider. Remotely monitoring systems and keeping them up-to-date with SonicWALL management systems will help you address requirement a number of requirements such as 2, 5, 6, 10, and 11. Adam: How has your staff remotely logged in to systems to make sure they’re up-to-date?
  7. As a Level 2, 3 or 4 merchant with external facing IP(s), what needs to be submitted to an acquirer in order to be PCI Compliant? (Answer all that apply)   SAQ Attestation of Compliance Results of PCI scan with a passing grade from an ASV Report of Compliance (ROC) is optional Submit the SAQ, evidence of a passing scan (if applicable), and the Attestation of Compliance, passing PCI Scan from an ASV along with any other requested documentation, to an acquirer. A Report of Compliance (ROC) is only required for a Level 1 merchant. A QSA is not required for a Level 2, 3 or 4. Scanning does not apply to all merchants. It is required for Validation Type 4 and 5 – those merchants with external facing IP addresses. Basically if merchant electronically stores cardholder information or if their process systems have any internet connectivity, a quarterly scan by an ASV is required.