Friday 28 December 2007

Simple Team Collaboration

Simplify How You Collaborate With Others
Create online workspaces to share files and documents, manage task lists and engage in group discussions with Central Desktop.

What is Central Desktop?
Central Desktop provides simple collaboration tools for business teams. This platform enables teams to efficiently share information and communicate with employees, customers and partners inside and beyond the firewall.

Team Benefits
- Less Email "Noise"
- Centralized Communication
- Real-Time Collaboration
- Team Accountability
- Access From Anywhere

Collaborate Any Time
- Project Tracking
- Searchable Discussion
- Shared Calendars
- Word, Excel, Powerpoint & PDF
- 256-Bit SSL Encryption

Collaborate In Real Time - Integrated Web Meetings
- Free Audio Conferencing
- IM Presence Support

You can try Central Desktop free for 30 days - just click here..... Central Desktop


Thursday 13 December 2007

Beyond the PCI Band-Aid

Web application firewalls can help retailers pass their audits, but app firewalls aren't enough to secure customer data.

DECEMBER 10, 2007 | Personal data is at risk in the retail environment, and consumers are justifiably worried. The TJX breach may have come as no surprise to the computer security industry, but the story continues to reverberate into the holiday shopping season. The TJX case was recently featured on 60 Minutes. According to the 60 Minutes report, retailers blame credit card companies for forcing them to store transaction data in case of a dispute (what?!). Credit card consortiums point the finger right back at retailers, claiming that storing and transmitting transaction data in a secure fashion is doable.

The Payment Card Industry (PCI) standards provide a low bar for data security in the retail environment. Nevertheless, many retailers are having trouble complying with the PCI Data Security Standard. Now politicians are getting involved, and vendors are coming out of the woodwork with magic solutions. (See PCI Costs, But Not as Much as a Data Breach.) The Web application firewall (WAF) has become a major player in the PCI space, but an app firewall won't even begin to solve the PCI problem.

Web application firewalls do their job by watching port 80 traffic as it interacts at the application layer using deep packet inspection. (See Review: Web Application Firewalls.) Security vendors hyperbolically claim that application firewalls completely solve the software security problem by blocking application-level attacks caused by bad software, but that’s just silly. Sure, application firewalls can stop easy-to-spot attacks like SQL injection or cross-site scripting as they whiz by on port 80, but they do so using simplistic matching algorithms that look for known attack patterns and anomalous input. They do nothing to fix the bad software that causes the vulnerability in the first place.

Nobody disputes the idea that data protection should be carried out as close as possible to where data are created, managed, and stored. Application firewalls are certainly getting closer to the right kind of solution by focusing on applications (at least when it comes to the Web) instead of other network traffic. However, a real solution requires solid software security for both Web apps and non-Web apps, combined with state of the art data security. (See Security Vendors Turn Toward Data Loss Prevention and Want Turns to Need.)

One thing application firewalls can do is stop the bleeding in tricky operational situations: That is, they can buy you some time. (See Wait for WAFs.) If a known breach is causing you to fail a PCI audit, for instance, installing an app firewall and stopping the set of known attacks the auditor is using will allow you to pass the audit.

This paradigm also works for real attacks as they unfold in the real world. If your software is under attack, and you know what the particular attack is, an app firewall can stop it cold. Still, the problem of bad software remains and is very likely to grow as more broken application code gets created. Smart security uses the time window provided by quick provisioning of an app firewall to fix the vulnerable software, and trains developers to do the right thing.

Meanwhile, consumers simply want their data protected. That means those retailers focused the spirit of PCI compliance – actually protecting customer data with better software security – rather than those just focused on the letter of PCI compliance (passing an audit with an app firewall), will win in the end. Customers demand no less.

— Gary McGraw is CTO of Cigital Inc. Special to Dark Reading

Thursday 6 December 2007

The PCI DSS: Get Compliant, Stay Compliant

Click here to Subscribe

We are sending you this offer because you have subscribed to similar Professional Publications in the past. As such, we wanted to give you the chance to sign up for The PCI DSS: Get Compliant. Stay Compliant. and also for Configuration Audit and Control: 10 Critical Factors for CCM Success.

Be sure to forward this information to business associates - they may wish to apply to receive a complimentary publication in their industry as well.

Click here to Subscribe

subscribe
subscribe

The PCI DSS: Get Compliant. Stay Compliant. In September 2006, the Payment Card Industry (PCI) Security Standards Council released the PCI Data Security Standard (DSS) v1.1. This regulation required member financial institutions to be responsible for their own compliance, as well as ensuring the compliance of their merchants and service providers for all payment channels, including in-store, mail/telephone order, and e-commerce.

Many requirements in the PCI DSS focus on the ability to monitor and report on changes made across the IT environment.

Configuration Audit and Control Solutions from Tripwire help validate these PCI requirements by:

  • Confirming access to computing resources and cardholder data is limited to the proper individuals
  • Validating that patches are deployed properly
  • Alerting you to unauthorized changes to firewall rules
  • Ensuring wireless network security policies are not circumvented
  • Detecting new, modified, or deleted user IDs
  • Maintaining file integrity across the entire enterprise

Configuration Audit and Control: 10 Critical Factors for CCM Success As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit and control provides the tools necessary to collect accurate configuration data, monitor change in real time, promptly remediate problems and ensure a stable and productive environment across the datacenter.

In this case study, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.

This case study details:

  • Ten key elements of a configuration and audit control solution
  • How configuration audit and control maps to a proven Semantic Model for standardizing the evaluation of IT management solutions
  • How to mitigate risks, lower costs, and reduce outages and unplanned work by using configuration audit and control to enforce change policies.
Download this case study and see how configuration audit and control can ensure the success of your change and configuration management procedures and policies.

Retail Touch Points