Complying with the payment card industry data security standard (PCI DSS) doesn’t stop at payment systems. While keeping the network perimeter hardened is good security practice, it doesn’t completely prevent malicious activity. Threats can come from anywhere, so IT must focus on detecting anomalies and intrusions inside the network.
Many of the most devastating breaches occur when hackers break into the network through non-PCI segments. This is why you must protect all of your endpoints and monitor your complete environment, not just the assets that fall under PCI-compliance requirements.
SNARE’s Desktop Agent collects and analyzes logs from often-forgotten workstations where many threats and breaches originate. The SNARE Enterprise agents address and support your PCI DSS security strategies with a key focus on meeting the logging requirements in the security standard, including logging each event according to:
- type of event
- date and time
- success or failure indication
- origination of event
- identity or name of the affected data, system component, or resources
- anytime any user accesses cardholder data
- root or administrative privileges
- access to all audit trails
- invalid logical access attempts
- use of identification and authentication mechanisms
- initialization of the audit logs
- creation and deletion of system-level objects.