Whenever a major retailer gets hacked, compliance gets called in for questioning. But security experts say these latest breaches point to implementation failures not missing certifications.
Often the detective work occurs when interpreting PCI's 12 requirements—which include rigorous penetration testing, anti-virus, and regular audits—and implementing them correctly for your IT environment.
As the dark world of cybercrime evolves with new techniques, such as social engineering and planting insider threats, every company (large or small) is a potential target and no platform is off limits—even IBM i.
IBM i has its own set of security controls and recommended configurations for PCI compliance. Beyond that, there are certain exposures that also need to be accounted for and secured.
Unfortunately, many PCI auditors don’t have enough experience on the platform to check these exposures. To make sure your implementation of PCI compliance is really protecting customer data—you need insider know-how.
Everything you need—white paper, checklist, and quick reference guide—to implement PCI’s latest requirements smoothly, secure your IBM i servers, and prevent cybercrime on your own turf. Find out:
As a member of the PCI Security Standards Council and the leading IBM i security expert, PowerTech understands how to achieve PCI compliance and protect customer data on IBM i.