Ccr active comparison sheet

Page 1

DON’T BE FOOLED BY THE COMPETITION COMPARE AND VALIDATE THEIR SOLUTION

TM

ActivePCIShield™Gold Competitor

Quarterly (ASV) Certified Vulnerability Scans ASV Certified Vulnerability Scans up to 3 ISP’s No additional Charge Unlimited ASV Certified scans when needed (Example: major network changes, etc.) Access to your scan results 24x7x365 Scans come with an easy to read executive summary Simple Online SAQ tool available 24X7x364 that makes the process convenient and easy SAQ Tool has an easy step-by-step process Detailed instructions and helpful hints throughout the form PCI wizard will help you determine which SAQ to complete. NO GUESSING! Drafts can be saved to finish later Print or electronic submission options to your Processor, ISO , Bank or Acquirer Archived SAQ forms make future submissions easier One-on-One Assistance - Available Certificate of Validation - Stating you have completed the PCI-DSS Self Assessment resulting in a COMPLIANT rating and have passed your vulnerability scan. Security Policy Templates for all SAQ types (as simple as change name here) and implement Security Templates are updated and reviewed after changes to the PCI-DSS 24x7x365 access to the security templates via our portal ActivePCIShield™ Managed Firewall - The first step to a comprehensive Security Structure ActivePCIShield™ Firewall Includes default “Deny All” rules, automatically added to the PCI DSS LAN according to our PCI Template. Then, “pinhole” firewall rules can be added for a business need i.e. to a specific authorized payment gateway ActivePCIShield™ Firewall – Audited testing ensures that the PCI template firewall rules are correctly applied and used by our appliance. ActivePCIShield™ CMS automatically generates a network diagram that displays current connections for all cardholder data – including wireless networks ActivePCIShield™ System includes a PCI Template, which ensures that a PCI DSS compliant firewall is created between all intranets and Demilitarized Zones (DMZs) ActivePCIShield™ CMS automatically uploads the current firewall configuration ActivePCIShield™ Firewall device configuration files are securely transported between the ActivePCIShield CMS and network appliances using Secure Socket Layer (SSL) encryption. Configuration files are updated immediately when any changes in the CMS are applied that effect the network appliance operation directly. The ActivePCIShield™ Firewall Router with Wireless segregates the wireless network and the cardholder data environment (CDE), based on the same “Deny All” templates as found in the present PCI template, and contains firewall controls to prevent access. ©2013 Center for Computer Resources, LLC

Call to learn about the ActivePCIShield™ Solution “take the headache out of PCI” 855-736-5541 or PCISALES@CCR1.COM


The ActivePCIShield™ Firewall automatically download and apply the latest security software and help keep your network protected. Real-time notification of potential network issues, including worm alerts, intrusion detection, unauthorized devices and more If a certain site is using an exceptional amount of data, it could be a sign of a network intrusion or malware infection. The ActivePCIShield™ System helps detect and mitigate these threats by vigilantly monitoring usage across network locations The ActivePCIShield™ appliance employ a range of industry-leading security technologies, such as a stateful inspection firewall, port scanning protection, worm detection, AES encryption for Virtual Private Networks (VPNs). Centralized Logging and Reporting –The ActivePCIShield™ appliance securely send traffic information back to the CMS every few minutes. This data is used to generate easy-to-understand graphical reports about network usage, including data use by site, user and timeframe, real- time reporting of intrusion attempts, and records of Internet traffic. Based on this information, the CMS can also send proactive alerts regarding data usage, device temperature, worm detection, and more. ActivePCIShield™ Firewall Next Business Day Replacement Site To Site VPN (without requiring static IP addresses) Secure Remote Access ( Dual Factor) Security Awareness Training Modules Real Time Rouge Access Detection, Isolation and notification Quarterly Internal Security Scanning Internal Security Risk Report. This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans. Internal Security Policy Assessment Report. A detailed review of the security policies that are in place on both a domain wide and local machine basis Internal Shared Permission Report. Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have. Internal User Permissions Report. Organizes permissions by user, showing all shared computers and files to which they have access Internal Vulnerabilities Report. Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility. Included 3G Auto Failover without human intervention (10mb per location, per month) overage fees will apply. Additional MB available on a monthly basis.** 3G is Based on Sprint’s Availability** 3G pooled plans for failover available for multi locations.** 3G is Based on Sprint’s Availability** 3G Primary Access Plan available per location (5GB per month) .** 3G is Based on Sprint’s Availability** 24x7x365 Monitoring

Signature of our representative A salesperson may say they meet these 45 criteria, but make them sign it – they should stand by every line.

CCR

Competitor

As an experienced managed service provider, we believe you should know what makes us different right up front – so we put it in writing. A lot of providers claim to offer a true managed service, until you dig a little deeper. Your network is the backbone of your business, don’t trust it to just anyone!

©2013 Center for Computer Resources, LLC

Call to learn about the ActivePCIShield™ Solution “take the headache out of PCI” 855-736-5541 or PCISALES@CCR1.COM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.