About The Customer
Leading designer and distributor
of apparel and accessories having
over 120+ exclusive retail
showrooms...
IT Security Requirements
 Meet PCI DSS Compliance standards
by protecting customers credit card
information used while pr...
How did ManageEngine
EventLog Analyzer fulfill
their requirements?
PCI DSS Compliance Reporting
EventLog Analyzer's out-of-the-box
PCI DSS compliance reports helped
the company stay complia...
Real-Time File Integrity Monitoring
PCI DSS Requirement 11.5 Mandates:
“Deploy file integrity monitoring software
to alert...
Real-Time Notifications
Real-Time User Activity Monitoring
The organization secured their network from Internal
Threats using EventLog Analyzer ke...
Thank You

Joel John Fernandes
joeljohn.f@manageengine.com
Leading International Designer and Distributor of Apparel and Accessories uses ManageEngine EventLog Analyzer to stay Comp...
Leading International Designer and Distributor of Apparel and Accessories uses ManageEngine EventLog Analyzer to stay Comp...
Upcoming SlideShare
Loading in …5
×

Leading International Designer and Distributor of Apparel and Accessories uses ManageEngine EventLog Analyzer to stay Compliant with PCI DSS requirements

496 views

Published on

Staying Compliant with Payment Card Industry Data Security Standard (PCI DSS) with ManageEngine EventLog Analyzer

EventLog Analyzer provides the most cost-effective Security Information and Event Management (SIEM) software on the market. Using this SIEM software, organizations can automate the entire process of managing terabytes of machine generated logs by collecting, analyzing, searching, reporting, and archiving from one central location. This event log analyzer software helps to mitigate internal threats, monitor file integrity, conduct log forensics analysis, monitor privileged users and comply to different compliance regulatory bodies by intelligently analyzing your logs and instantly generating a variety of reports like user activity reports, regulatory compliance reports, historical trend reports, and more.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
496
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Leading International Designer and Distributor of Apparel and Accessories uses ManageEngine EventLog Analyzer to stay Compliant with PCI DSS requirements

  1. 1. About The Customer Leading designer and distributor of apparel and accessories having over 120+ exclusive retail showrooms worldwide. The company owns some of the biggest fashion brands. Apparel & Fashion Industry 2000 - 5000 Employees United States, Headquartered in Florida Designer and distributor of apparel and accessories for men and women Location Services Offered
  2. 2. IT Security Requirements  Meet PCI DSS Compliance standards by protecting customers credit card information used while processing orders via their online shopping portals and brick and mortar retail stores.  Centralized log collection from 650 corporate and retail store network servers spread across the United States.  Monitor critical files and folders.  Real-time notifications when critical files/folders are accessed.  Track user activity in real-time.
  3. 3. How did ManageEngine EventLog Analyzer fulfill their requirements?
  4. 4. PCI DSS Compliance Reporting EventLog Analyzer's out-of-the-box PCI DSS compliance reports helped the company stay compliant by fulfilling the stringent PCI DSS requirements
  5. 5. Real-Time File Integrity Monitoring PCI DSS Requirement 11.5 Mandates: “Deploy file integrity monitoring software to alert personnel to unauthorized modification of critical system files, configuration files or content files. Configure the software to perform critical file comparisons at least weekly.” EventLog Analyzer's file integrity monitoring capability fulfilled PCI DSS Requirement 11.5 by allowing the organization to centrally track and alert on all changes happening to their critical files and folders.
  6. 6. Real-Time Notifications
  7. 7. Real-Time User Activity Monitoring The organization secured their network from Internal Threats using EventLog Analyzer keeping in mind that their ‘Most Trusted Employees’ can also turn out to be Network Intruders. All employees and privileged users are now being monitored in real-time using EventLog Analyzer’s User Activity Monitoring Capability.
  8. 8. Thank You Joel John Fernandes joeljohn.f@manageengine.com

×