FOLLOW US  facebook twitter linkedin viadeo

Wallix

Home / Download / White papers

Meeting and excelling at PCI DSS

Meeting and excelling at PCI DSS


Securing Payment Data:
How do you hit a moving target
Meeting and excelling at PCI DSS

Recent research highlighted that less than one third of organisations were still compliant with PCI having met the standard just one year earlier (Verizon PCI Compliance Report 2015).

As the focus of PCI is to keep payment data held on systems secure, maintaining compliance as IT infrastructure rapidly evolves to virtualised platforms and the cloud is tougher than ever.

Take a look at our PCI DSS Briefing which concentrates on some key areas to move you towards compliance:

• Control and manage access
Automate and secure change
• Session recording and full audit trail

Download Meeting and excelling at PCI DSS

 

 

Or call us at: +44 203 440 5695

KUPPINGERCOLE REPORT: HOW TO REDUCE YOUR RISK FROM AN INSIDER ATTACK 
THROUGH PRIVILEGED USERS MANAGEMENT

KuppingerCole Report WAB2015


How to reduce your risk from an insider attack
through Privileged Users Management

Founded in 2004, KuppingerCole is a global Analyst Company headquartered in Europe focusing on Information Security and Identity Access Management.

This report produced by KuppingerCole highlights the key requirements for managing and monitoring privileged users in your business. Individuals with elevated access pose one of the biggest threats of a data breach, yet many organisations don’t have measures in place to control, manage and monitor their access.

Download the full report by analyst Mathias Reinwarth for a practical and pragmatic explanation of the importance of dealing with privileged users as well as an assessment of the capabilities of Wallix AdminBastion:

   check Managing and controlling access
   check Approval workflows
   check Session recording and full audit trail

kuppingerbutton

 

Or call us at: +44 203 440 5695

 

MARKET STUDY : MANAGEMENT OF PRIVILEGED ACCOUNTS

MS PUM  


Over 40% of Information Systems Security Managers (ISSMs) interviewed do not know if their company has been victim of an attack involving data leaks. This was revealed in a study performed by WALLIX on September 1, 2014, among a sample of 2,000 French information system security managers, 5% of which accepted to state their opinions.

«Market Study : Management of privileged accounts»

Download this document

Or call us at: +44 203 440 5695

 

IMPACTS OF REGULATORY CHANGES UPON I.S. GOVERNANCE

mazarsLBEN  

  In the first section of this document, we will summarise the main financial incidents that led the governments to set up regulations governing corporate internal control activities. These various regulatory frameworks include the new regulations governing information system management. Secondly, we will provide details of the main regulations applicable both to corporate processes involving information systems, and to corporate internal controls.

«IMPACTS OF REGULATORY CHANGES UPON INFORMATION
SYSTEM GOVERNANCE. Ensuring optimum compliance with existing and future regulatory standards »

Register here to download this White Paper

Or call us at: +44 203 440 5695

 

IT Service Providers Management

WPServiceprovidersThumb 

Managing your IT service providers

Simple solutions to solve your issues of external iT service providers and employees mobility management.
This white paper shows the basis for real security policies control and traceability of actions performed on the IS. It reflects the risk inherent in outsourcing and IT staff mobility. It provides simple answers, practical and efficient to implement this security policy.

Register here to download this White Paper

Or call us at: +44 203 440 5695

 

 

Subscribe newsletter

How many eyes has a human ?
Name:
Email: