New Net Technologies

Displaying 1-8 of 8 results

  • White Papers // May 2013

    File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard

    Has there ever been a more confusion-generating initiative than the PCI DSS? Even now, a good seven years on from its initial introduction, a clear and definitive understanding of what the user's organization needs to do may still be a challenge. Tier 1 Payment Card Merchants will now be entering...

    Provided By New Net Technologies

  • White Papers // May 2012

    The Art of Layered Security - Data Protection in a Threatscape of Modern Malware

    Threats to theft of Intellectual Property, financial data, Cardholder Data, PII (Personally Identifiable Information) are more diverse and increasingly difficult to defend against. The traditional 'Internet vandalism' from viruses is still an issue but the 'Threatscape' in 2012 is far more diverse and dangerous than ever before. Not only is...

    Provided By New Net Technologies

  • White Papers // Jan 2012

    PCI Compliance in Ten Minutes A Day - Best Practices for Addressing File Integrity and Event Log Monitoring Requirements

    Many organizations choose to delay the implementation of their PCI program, being wary of the resource requirements necessary to manage PCI compliance. This whitepaper provides practical advice on how taking a 'Baby steps' approach to PCI compliance and leveraging automated monitoring technology for file integrity and event logs will only...

    Provided By New Net Technologies

  • White Papers // Mar 2011

    PCI DSS File Integrity Monitoring Explained

    Although FIM or File-Integrity Monitoring is only mentioned specifically in two sub-requirements of the PCI DSS (10.5.5 and 11.5), it is actually one of the more important measures in securing business systems from card data theft. File Integrity monitoring systems are designed to protect card data from theft. The primary...

    Provided By New Net Technologies

  • White Papers // Dec 2010

    PCI DSS 101- The Background You Need for Understanding the PCI DSS

    Any organization storing, processing or transmitting Primary Account Numbers (PAN) must comply with the Payment Card Industry Data Security Standard or PCI DSS. Understanding the background, the objectives and the detailed requirements of the standard is still proving to be a challenge for thousands of organizations around the world. This...

    Provided By New Net Technologies

  • White Papers // Oct 2010

    Event Log Monitoring and the PCI DSS

    Getting the balance right between the need to meet the users mandatory obligations for PCI DSS, and the imperative of minimizing costs' of ownership, is a challenge. To the letter of the PCI DSS, users are obliged to make use of event and audit logs in order to track user...

    Provided By New Net Technologies

  • White Papers // Aug 2010

    Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

    All security standards and Corporate Governance Compliance Policies such as PCI DSS, GCSx CoCo, SOX (Sarbanes OXley), GLBA, NERC CIP, HIPAA, HITECH, ISO27000 and FISMA require IT systems to be secure in order that they protect confidential data. This paper explores one of the key dimensions to securing devices through...

    Provided By New Net Technologies

  • White Papers // May 2010

    The Problem With The ITIL Change Management Process

    A formalized Change Management process is vital in order to maximize the effectiveness of any change while minimizing potential problems resulting from a configuration change being made. Common sense quickly determines the need for some form of process. Imagine running your IT Service Delivery organization without any processes and no...

    Provided By New Net Technologies

  • White Papers // Mar 2011

    PCI DSS File Integrity Monitoring Explained

    Although FIM or File-Integrity Monitoring is only mentioned specifically in two sub-requirements of the PCI DSS (10.5.5 and 11.5), it is actually one of the more important measures in securing business systems from card data theft. File Integrity monitoring systems are designed to protect card data from theft. The primary...

    Provided By New Net Technologies

  • White Papers // Dec 2010

    PCI DSS 101- The Background You Need for Understanding the PCI DSS

    Any organization storing, processing or transmitting Primary Account Numbers (PAN) must comply with the Payment Card Industry Data Security Standard or PCI DSS. Understanding the background, the objectives and the detailed requirements of the standard is still proving to be a challenge for thousands of organizations around the world. This...

    Provided By New Net Technologies

  • White Papers // May 2012

    The Art of Layered Security - Data Protection in a Threatscape of Modern Malware

    Threats to theft of Intellectual Property, financial data, Cardholder Data, PII (Personally Identifiable Information) are more diverse and increasingly difficult to defend against. The traditional 'Internet vandalism' from viruses is still an issue but the 'Threatscape' in 2012 is far more diverse and dangerous than ever before. Not only is...

    Provided By New Net Technologies

  • White Papers // May 2013

    File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard

    Has there ever been a more confusion-generating initiative than the PCI DSS? Even now, a good seven years on from its initial introduction, a clear and definitive understanding of what the user's organization needs to do may still be a challenge. Tier 1 Payment Card Merchants will now be entering...

    Provided By New Net Technologies

  • White Papers // Jan 2012

    PCI Compliance in Ten Minutes A Day - Best Practices for Addressing File Integrity and Event Log Monitoring Requirements

    Many organizations choose to delay the implementation of their PCI program, being wary of the resource requirements necessary to manage PCI compliance. This whitepaper provides practical advice on how taking a 'Baby steps' approach to PCI compliance and leveraging automated monitoring technology for file integrity and event logs will only...

    Provided By New Net Technologies

  • White Papers // Oct 2010

    Event Log Monitoring and the PCI DSS

    Getting the balance right between the need to meet the users mandatory obligations for PCI DSS, and the imperative of minimizing costs' of ownership, is a challenge. To the letter of the PCI DSS, users are obliged to make use of event and audit logs in order to track user...

    Provided By New Net Technologies

  • White Papers // Aug 2010

    Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

    All security standards and Corporate Governance Compliance Policies such as PCI DSS, GCSx CoCo, SOX (Sarbanes OXley), GLBA, NERC CIP, HIPAA, HITECH, ISO27000 and FISMA require IT systems to be secure in order that they protect confidential data. This paper explores one of the key dimensions to securing devices through...

    Provided By New Net Technologies

  • White Papers // May 2010

    The Problem With The ITIL Change Management Process

    A formalized Change Management process is vital in order to maximize the effectiveness of any change while minimizing potential problems resulting from a configuration change being made. Common sense quickly determines the need for some form of process. Imagine running your IT Service Delivery organization without any processes and no...

    Provided By New Net Technologies