Payment Card Industry Data Security Standard (PCI DSS) compliance is a defacto requirement for all organizations that store, process, or transmit any type of payment card data. The PCI DSS was implemented to ensure payment card data is secure and to prevent credit card fraud. Being PCI compliant is crucial for business as any drop from the high security standards could result in fines, penalties, or even restrict your ability to process payment cards in the future.
DataSecurity Plus is a compliance tool that helps solve the challenge of complying with the PCI regulatory mandate. DataSecurity Plus generates a variety of reports for you to analyze privilege escalation, verify legitimate access requirements, and much more. In addition to these reports, the preconfigured alerts help detect and respond to potential threats instantaneously, limiting the extent and scope of damage.
Below is a list of reports you can use to prove that your organization is PCI compliant.
|PCI standards||DataSecurity Plus report or alert|
|Track all file modifications to assess data integrity risks and resolve violations, if any.||All file/folder changes report|
|Deleted/overwritten files report|
|Security permission changes report|
|Most modified file report|
|File modified after N days report|
|Create events report|
|Renamed/moved events report|
|Periodically review all attempts to access critical data, including both successful and failed attempts.||All failed attempts report|
|Read events report|
|Most accessed file report|
|Most accesses by processes/user report|
|Files accessed after N days report|
|Periodically review access rights and file permissions to ensure that excessive permissions aren't assigned.||NTFS permissions report|
|Share permissions report|
|Utilize customizable alerts to enable timely detection of any user actions that violate your data protection policies.||File/folder moved or renamed alert|
|File/folder security changes alert|
|File/folder removed alert|
|Media files alert|
|Periodically examine file storage to verify that stored data is relevant, required, and doesn't exceed the requirements defined in your data retention policy.||Old files report|
|Stale files report|
|Unmodified files report|
|Large files report|
|Hidden files report|
|Non-business files report|
|Use preconfigured alerts to detect and respond quickly to potential data breaches.||Ransomware file alert|
* You can also generate customized reports based on file path, users, business hours, etc.
|The Access Audit report provides detailed information on the quintessential Four W's—who accessed what, when, and from where. This will help you keep track of all accesses and changes. The Access Analysis report provides a summary view of accesses and changes, which can help you detect access trends.||The File Analysis report helps isolate files that are old, unused, unmodified, large, hidden, or non-business; making data cleanup easier. The Disk Analysis report provides visual insight into disk space usage and trends, facilitating optimization of disk space; it also reveals properties of files and folders.|
|Detect security breaches as and when they occur with alerts that get emailed instantly. Define threshold limits for mass access events such as malware attacks.||Examine share and security permissions of files and folders and prevent access exploitation.|
|Become proactive with real-time file and folder access and change auditing. Continuously monitor and get notified about critical activities.|