SlideShare una empresa de Scribd logo
1 de 11
The Oldest Club in English Football uses 
ManageEngine EventLog Analyzer to Comply 
with PCI DSS 3.0 Requirements
 Industry: 
 Headquarters: 
 Employees: 
 Business Type:
EventLog Analyzer’s 
Out-Of-The-Box PCI DSS 
Compliance report helped 
the organization to be 
audit ready
EventLog Analyzer’s Out- 
Of-The-Box Alerting 
feature allowed the 
organization to quickly 
setup alerts for critical user 
activity events like User 
Account Locked Out, Logon 
Failures, etc.
EventLog Analyzer’s Agentless 
Log Collection capability 
collected log data from all 5 
data centers at a central 
place
EventLog Analyzer helped the organization to retain the 
Log Data generated by their data centers for the required 
period of 1 year
EventLog Analyzer’s File Integrity Monitoring capability 
checked for changes to critical files and notified in real-time 
when unauthorized changes were detected
Audit ready for PCI DSS 3.0 Compliance 
File Integrity Monitoring secured critical files from being 
compromised 
Log Data from Data Centers across the United Kingdom 
was now centrally collected 
Real-Time Notifications during anomalous events 
concerning user activities 
Retained Log Data successfully for a period of 1 year
Thank You 
Joel John Fernandes 
joeljohn.f@manageengine.com

Más contenido relacionado

La actualidad más candente

SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SHRIYARAI4
 
Best cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CKBest cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CKShriya Rai
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersAlgoSec
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSightSridhar Karnam
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldAnton Chuvakin
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) ArkhipovaOWASP Russia
 
Hp arcsight services 2014 ewb
Hp arcsight services 2014   ewbHp arcsight services 2014   ewb
Hp arcsight services 2014 ewbrty_ngtglobal
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESMImproving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESMAnton Goncharov
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextAlgoSec
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
Kaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017Micro Focus
 

La actualidad más candente (20)

SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Best cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CKBest cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CK
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
 
Hp arcsight services 2014 ewb
Hp arcsight services 2014   ewbHp arcsight services 2014   ewb
Hp arcsight services 2014 ewb
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESMImproving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Kaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions Update
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
 

Destacado

English basics for intermediate learners lesson 14
English basics for intermediate learners lesson 14English basics for intermediate learners lesson 14
English basics for intermediate learners lesson 14SkimaTalk
 
English Grammar - Tense System
English Grammar - Tense SystemEnglish Grammar - Tense System
English Grammar - Tense SystemWilly BUN
 
Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...
Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...
Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...Michele Snider
 
Especially Strange (use the word especially without sounding strange), Lesson...
Especially Strange (use the word especially without sounding strange), Lesson...Especially Strange (use the word especially without sounding strange), Lesson...
Especially Strange (use the word especially without sounding strange), Lesson...Michele Snider
 
Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words Michele Snider
 
A, An, The, or Nothing, Lesson 8 of Misused and Misunderstood Words
A, An, The, or Nothing, Lesson 8 of Misused and Misunderstood WordsA, An, The, or Nothing, Lesson 8 of Misused and Misunderstood Words
A, An, The, or Nothing, Lesson 8 of Misused and Misunderstood WordsMichele Snider
 
Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...
Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...
Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...Michele Snider
 
To and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood Words
To and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood WordsTo and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood Words
To and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood WordsMichele Snider
 
English Punctuations Rules And Uses By Hamad
English Punctuations Rules And Uses By HamadEnglish Punctuations Rules And Uses By Hamad
English Punctuations Rules And Uses By HamadHamad Khan
 
12 Rules to Solve Sentence Correction Problems in English
12 Rules to Solve Sentence Correction Problems in English12 Rules to Solve Sentence Correction Problems in English
12 Rules to Solve Sentence Correction Problems in EnglishSentence Fixer
 
Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
Look, Watch, See, Lesson 1 of Misused and Misunderstood WordsLook, Watch, See, Lesson 1 of Misused and Misunderstood Words
Look, Watch, See, Lesson 1 of Misused and Misunderstood WordsMichele Snider
 
Sentence correction practice problems
Sentence correction   practice problemsSentence correction   practice problems
Sentence correction practice problems7498
 
Uses of internet for English Students
Uses of internet for English StudentsUses of internet for English Students
Uses of internet for English Studentsperegar2
 
Present Perfect
Present PerfectPresent Perfect
Present Perfectmonira21
 
Uses of Present Perfect Simple
Uses of Present Perfect SimpleUses of Present Perfect Simple
Uses of Present Perfect SimpleIsadown
 
Chapter 2 past continuous + past simple
Chapter 2   past continuous + past simpleChapter 2   past continuous + past simple
Chapter 2 past continuous + past simplewendydej
 
Chapter 1 woordvolgorde
Chapter 1   woordvolgordeChapter 1   woordvolgorde
Chapter 1 woordvolgordewendydej
 

Destacado (20)

EventLog Analyzer 6 Features
EventLog Analyzer 6 FeaturesEventLog Analyzer 6 Features
EventLog Analyzer 6 Features
 
English basics for intermediate learners lesson 14
English basics for intermediate learners lesson 14English basics for intermediate learners lesson 14
English basics for intermediate learners lesson 14
 
Word order
Word orderWord order
Word order
 
English Grammar - Tense System
English Grammar - Tense SystemEnglish Grammar - Tense System
English Grammar - Tense System
 
Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...
Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...
Teacher version: A, An, The, or Nothing, Lesson 8 of Misused and Misunderstoo...
 
Especially Strange (use the word especially without sounding strange), Lesson...
Especially Strange (use the word especially without sounding strange), Lesson...Especially Strange (use the word especially without sounding strange), Lesson...
Especially Strange (use the word especially without sounding strange), Lesson...
 
Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
Teacher version: Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
 
A, An, The, or Nothing, Lesson 8 of Misused and Misunderstood Words
A, An, The, or Nothing, Lesson 8 of Misused and Misunderstood WordsA, An, The, or Nothing, Lesson 8 of Misused and Misunderstood Words
A, An, The, or Nothing, Lesson 8 of Misused and Misunderstood Words
 
Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...
Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...
Teacher version: To and Fro with To, For, and From, Lesson 7 of Misused and M...
 
To and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood Words
To and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood WordsTo and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood Words
To and Fro with To, For, and From, Lesson 7 of Misused and Misunderstood Words
 
7 advanced uses of rdfs
7 advanced uses of rdfs7 advanced uses of rdfs
7 advanced uses of rdfs
 
English Punctuations Rules And Uses By Hamad
English Punctuations Rules And Uses By HamadEnglish Punctuations Rules And Uses By Hamad
English Punctuations Rules And Uses By Hamad
 
12 Rules to Solve Sentence Correction Problems in English
12 Rules to Solve Sentence Correction Problems in English12 Rules to Solve Sentence Correction Problems in English
12 Rules to Solve Sentence Correction Problems in English
 
Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
Look, Watch, See, Lesson 1 of Misused and Misunderstood WordsLook, Watch, See, Lesson 1 of Misused and Misunderstood Words
Look, Watch, See, Lesson 1 of Misused and Misunderstood Words
 
Sentence correction practice problems
Sentence correction   practice problemsSentence correction   practice problems
Sentence correction practice problems
 
Uses of internet for English Students
Uses of internet for English StudentsUses of internet for English Students
Uses of internet for English Students
 
Present Perfect
Present PerfectPresent Perfect
Present Perfect
 
Uses of Present Perfect Simple
Uses of Present Perfect SimpleUses of Present Perfect Simple
Uses of Present Perfect Simple
 
Chapter 2 past continuous + past simple
Chapter 2   past continuous + past simpleChapter 2   past continuous + past simple
Chapter 2 past continuous + past simple
 
Chapter 1 woordvolgorde
Chapter 1   woordvolgordeChapter 1   woordvolgorde
Chapter 1 woordvolgorde
 

Similar a The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Comply with PCI DSS 3.0 Requirements

Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...
Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...
Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...ManageEngine EventLog Analyzer
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentationtsteh
 
Event log monitoring for the pci dss
Event log monitoring for the pci dssEvent log monitoring for the pci dss
Event log monitoring for the pci dssSarahLamusu
 
Security threat analysis points for enterprise with oss
Security threat analysis points for enterprise with ossSecurity threat analysis points for enterprise with oss
Security threat analysis points for enterprise with ossHibino Hisashi
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfNesterWare
 
Nava SIEM Agent Datasheet
Nava SIEM Agent DatasheetNava SIEM Agent Datasheet
Nava SIEM Agent DatasheetLinkgard
 
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PCI DSS and Logging: What You Need To Know by Dr. Anton ChuvakinPCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PCI DSS and Logging: What You Need To Know by Dr. Anton ChuvakinAnton Chuvakin
 
Get to know primero v1.0 may2015
Get to know primero v1.0 may2015Get to know primero v1.0 may2015
Get to know primero v1.0 may2015RobertMacT
 
Pci dss-compliance
Pci dss-compliancePci dss-compliance
Pci dss-compliancefaisal_ss1
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingAlienVault
 
A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...Alexander Decker
 
Responding to extended events in near real time
Responding to extended events in near real timeResponding to extended events in near real time
Responding to extended events in near real timeGianluca Sartori
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfsagaraccura
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...iFour Consultancy
 

Similar a The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Comply with PCI DSS 3.0 Requirements (20)

Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...
Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...
Leading Pizza Company in the United States uses ManageEngine EventLog Analyze...
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
Event log monitoring for the pci dss
Event log monitoring for the pci dssEvent log monitoring for the pci dss
Event log monitoring for the pci dss
 
Security threat analysis points for enterprise with oss
Security threat analysis points for enterprise with ossSecurity threat analysis points for enterprise with oss
Security threat analysis points for enterprise with oss
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdf
 
Nava SIEM Agent Datasheet
Nava SIEM Agent DatasheetNava SIEM Agent Datasheet
Nava SIEM Agent Datasheet
 
Manage Engine Log 360
Manage Engine Log 360Manage Engine Log 360
Manage Engine Log 360
 
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PCI DSS and Logging: What You Need To Know by Dr. Anton ChuvakinPCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
 
Get to know primero v1.0 may2015
Get to know primero v1.0 may2015Get to know primero v1.0 may2015
Get to know primero v1.0 may2015
 
File000138
File000138File000138
File000138
 
Pci dss-compliance
Pci dss-compliancePci dss-compliance
Pci dss-compliance
 
The New Event Load
The New Event LoadThe New Event Load
The New Event Load
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...
 
Responding to extended events in near real time
Responding to extended events in near real timeResponding to extended events in near real time
Responding to extended events in near real time
 
H1803014347
H1803014347H1803014347
H1803014347
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Comply with PCI DSS 3.0 Requirements

  • 1. The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Comply with PCI DSS 3.0 Requirements
  • 2.  Industry:  Headquarters:  Employees:  Business Type:
  • 3.
  • 4.
  • 5. EventLog Analyzer’s Out-Of-The-Box PCI DSS Compliance report helped the organization to be audit ready
  • 6. EventLog Analyzer’s Out- Of-The-Box Alerting feature allowed the organization to quickly setup alerts for critical user activity events like User Account Locked Out, Logon Failures, etc.
  • 7. EventLog Analyzer’s Agentless Log Collection capability collected log data from all 5 data centers at a central place
  • 8. EventLog Analyzer helped the organization to retain the Log Data generated by their data centers for the required period of 1 year
  • 9. EventLog Analyzer’s File Integrity Monitoring capability checked for changes to critical files and notified in real-time when unauthorized changes were detected
  • 10. Audit ready for PCI DSS 3.0 Compliance File Integrity Monitoring secured critical files from being compromised Log Data from Data Centers across the United Kingdom was now centrally collected Real-Time Notifications during anomalous events concerning user activities Retained Log Data successfully for a period of 1 year
  • 11. Thank You Joel John Fernandes joeljohn.f@manageengine.com