BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘PCI’

BI Analytics Reporting

The Best Vulnerability Management Reporting and Analytics

The number one reason why our customers choose BeyondTrust for enterprise vulnerability management is simple: The BeyondInsight Reporting and Analytics capabilities included with Retina CS Enterprise Vulnerability Management exceed the capabilities of every single competitor combined. Retina CS with BeyondInsight is the only vulnerability management solution that ships with an integrated, structured big data warehouse…

Post by Morey Haber March 13, 2014
Tags:
, , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
gold-star

Getting a gold star in compliance

You know I realize that I’m getting older after I lived through “this is gonna be the big year for PKI (heard that for 4 straight years, and I’m still waiting)”, or “everyone will have a digital certificate on all their credit cards next year”, or “security and compliance are two different things.” As for…

Post by Mike Yaffe July 9, 2013
Tags:
, , , , , , ,
zero-gap1

On False Senses of Security

Customer conversations are the best part of my job. I really enjoy talking with users and buyers of security technology, especially in today’s hyperactive threat and attack climate. Most often these conversations are with customers proactively planning updates to their security strategy, or with prospects that have matured to a level where their tools need to be upgraded to enterprise solutions. However, there is small percentage of organizations we speak with who have come to eEye as a result of breach or a failed audit. One of *those* conversations was the impetus for this post.

Post by Mike Puterbaugh November 16, 2011
Tags:

Data Governance – Why and How?

In my first blog post I talked about proving and maintaining compliance for data governance rules defined for file system resources in the enterprise. This post will continue the discussion of data governance, reviewing some of the reasons organizations are implementing these policies and processes as well as the main challenges associated defining the rules…

Post by Morgan Holm July 30, 2011
Tags:
, , , , , , ,
Team

Vulnerability Management in a Data Warehouse

Have you ever been asked, “How long has that vulnerability been in our systems?” Have you ever wondered if your patch management process is keeping up with the number of new vulnerabilities being identified? Keep reading…

Post by Morey Haber November 16, 2010
Tags:
, , , , , , ,

Too Many Regulatory Standards, Only One Tool Please

About every two years, I indulge myself with a new laptop. This time, I waited almost three years and will be retiring my old Dell XPS M1330 for a new Alienware M15x. I wanted raw horsepower for virtual machines in a laptop format and was not as concerned about battery life (since I carry an…

Post by Morey Haber November 12, 2010
Tags:
, , , , , , , , , , , , , , , , ,

PCI DSS 2.0

Yes its PCI time again. PCI DSS 2.0 has just completed final review and is expected to come out next month. As indicated in the summary of changes document , there are no major changes expected. Refinements to better align standards, provide clarifications, increase merchant flexibility, and additional guidance on specific technologies including virtualization and…

Post by Brad Hibbert September 16, 2010
Tags:
, , , ,

Configuration Compliance and Regulatory Reporting

In recent years there have been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity and availability of information stored in their systems and provided through external parties. After reading various whitepapers, websites and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST,…

Post by Brad Hibbert September 9, 2010
Tags:
, , , , , , , , , , , ,

The Importance of Web Application Scanning

The art of hacking a computer, operating system, and application has evolved over time. What was once seen as relatively simple hacks have been suppressed due to various intrusion prevention mechanisms developed by network security companies. Breaching a company’s perimeter to gain direct unauthorized access to an organization’s network is not as simple as it…

Post by Morey Haber August 23, 2010
Tags:
, , ,