The PCI Security Standards Council is an open global forum for the ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection. The PCI Security Standards Council’s mission is to enhance payment account data security by driving education and awareness of the PCI Security Standards. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa Inc.
If you require any assistance with your PCI DSS compliance requirements, please email email@example.com and one of our consultant will contact you within 24h
Galix PCI Security Assessment.pdf
The objective of a BOUNDARY SECURITY ASSESSMENT is to check the ability of the Information Technology (IT) infrastructure to resist compromise from unauthorized external sources. This is not intended to be a stealth vulnerability assessment and the relevant Network and Security documentation is provided by the Network administrator. The information and the various security access controls are analyzed, and recommendations for improvement are made based upon best practices. The assessment is done in line with the International Security Standard ISO 27000.
These are some of the areas covered
- Network Boundary Protection design and implementation (includes Firewalls and Secure Remote Access)
- Design, implementation and configuration of corporate network (includes LAN, VLAN and WLAN)
- Network Intrusion Prevention/Detection Systems
- Network Services and Access Control
- Network Authentication, Logging and Reporting
- Network End-Point protection (includes Anti-Malware and Content filtering)
- External Services Vulnerability Scan
- Firewall Audits
- Penetration Testing
Vulnerability scanning & Penetration Testing
Security Assessment based on Managed Security Services, ISO 27000, including various levels of Network penetration and vulnerability testing, Network and Physical Security analysis, Business Continuity and Disaster Recovery, etc. It also includes a report indicating possible security exposures and recommendations for improvements
Information security policy design
The design, development and implementation of a comprehensive Information Security policy (including all related operational procedures documentation)
Provides businesses of any size with remote and on-site management of IT security infrastructure, irrespective of the underlying operating platforms or business applications in use
Includes the design and implementation of various security solutions such as firewall systems, intrusion detection systems (IDS),active content scanning engines as well as integration of various security Central management solutions such as Anti-virus systems, Intrusion prevention systems (IPS), Virtual Private Networks (VPN),two-factor authentication systems and Public Key Infrastructure (PKI), Trusted EndPoint Security Solution.
Provides User Awareness and customized Security Training, as well as product specific Training.
Archiving and copying of data so that it can be restored if there is loss of data.
CDP (Continuous Data Protection)
Captures data changes to a separate storage location using various technologies depending on needs.
Off site and online backup, fully automated, restore easily and anytime.
Secure Mobile Access
Mobile Device Management
Software that manages,monitors, supports and secures mobile devices applicable to both company-owned and BYOD devices.
Cloud computing relies on sharing of resources to achieve coherence over a network by maximizing the effectiveness of the shared resources. Applications are up and running faster, with improved manageability and less maintenance, costs are reduced and mobility increased.
Unified communications integrates real-time communication services (telephony, video conferencing, IM’s etc) with non real-time communication services (fax, voicemail, email, sms) into a single converged infrastructure. It creates a flow between the work employees do & the people they need to communicate with to get the job done faster and efficiently. Communications costs are lower, IT management is streamlined with lower total cost of ownership; employee productivity, efficiency and responsiveness to customers is improved.