Splunk App for PCI Compliance 2.0 released
Posted on 12 September 2012.
Splunk announced the general availability of the Splunk App for PCI Compliance 2.0. The app is for any organization looking for a simple, intuitive reporting and analysis solution that satisfies the requirements for PCI compliance.

PCI compliance is a requirement for any organization that accepts credit cards. The PCI DSS is the gold standard in the industry for securing this sensitive data and reducing credit card fraud.

The Splunk App for PCI Compliance 2.0 includes:
  • High-level scorecards and reports for each PCI requirement
  • Simple visualizations for indicating PCI compliance issues
  • Prioritization of in-scope assets
  • Operational, security and incident review and workflow capabilities
  • Audit trail for log review and report accesses.
Unlike most security and information event management (SIEM) products that supply their PCI solution as a stack of additional reports on top of their SIEM, the Splunk App and the core Splunk Enterprise software can be a complete stand-alone solution for PCI compliance provided as a powerful yet simple to use solution with incident review workflow, asset threat prioritization and requirement scorecards for PCI compliance.

Organizations that need to be PCI compliant but don't want to implement a traditional SIEM solution find the Splunk App for PCI Compliance particularly beneficial to their security efforts. It is a good fit when PCI DSS compliance needs to be viewed separately from a SIEM or when it is desirable to have a single, simple solution to track operational, security and compliance activities.

Customers in a wide variety of industries and organizations participated in the beta program by using the App for PCI log management, reporting and incident tracking.

"Our managed service customers hold us responsible for maintaining PCI compliance," said Ryan McFadden, managed services operations specialist, Tessitura Network. "The Splunk App for PCI Compliance helps us know where we are with PCI compliance, not only at audit time, but also in real-time, at any given moment."





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //