SlideShare a Scribd company logo
PCI 3.0
Compliance and Security for Retailers
Solution Brief
The Aerohive Personalized Engagement Platform provides a flexible, high-performance Wi-Fi
network with advanced security features that address PCI 3.0 requirements. Gain a highly
secure way to personalize the shopping experience for in-store customers while
complementing your PCI compliance goals.
Challenges
Recent breaches at high-profile retailers have put credit card and customer
data security back in the spotlight. Securing this data becomes even more
challenging as retailers look for innovative ways set themselves apart, increase
in-store traffic, strengthen customer loyalty, and drive sales. Many retailers are
implementing mobile strategies that allow customers to do everything from
check item availability and compare products to make mobile purchases with
their smartphones. These new capabilities place new security and compliance
demands on wireless networks.
PCI Compliance and Access Networks
Access networks provide network connectivity to point-of-sale devices, laptops, and
mobile phones in the retail store. The PCI Data Security Standard (PCI DSS)
applies to all network components—wired and wireless. The PCI Security Standards
Council continues to update PCI DSS requirements to address the dynamic threat
landscape. Version 3.0 of the PCI Data Security Standard (PCI DSS) became effective
on Jan. 1, 2014.
For wireless and access networks, the elements generally included in PCI
compliance checking are Wi-Fi access points, switches, firewalls, authenticating
servers, and any security appliance is part of the cardholder data environment
(CDE). The specific PCI DSS requirements that apply to wireless and access
networks are shown in Figure 1.
Guideline Benefit
4.1.1 - Ensure wireless networks
transmitting cardholder data or
connected to the cardholder data
environment, use industry best
practices (for example, IEEE 802.11i)
to implement strong encryption for
authentication and transmission.
Note: The use of WEP as a security
control is prohibited.
Use the latest, most advanced
encryption standards to permit only
authorized devices and users in the
network.
6.5.10 - Broken authentication and
session management.
Note: Requirement 6.5.10 is a best
practice until June 30, 2015, after
Secure authentication and session
management prevents
unauthorized individuals from
compromising legitimate account
PCI 3.0 Compliance and Security for Retailers
which it becomes a requirement. credentials, keys, or session tokens.
11.1.1 – Maintain an inventory of
authorized wireless access points
including a documented business
justification.
Locate and identify unauthorized
(rogue) access points and clients.
Figure 1. PCI DSS Requirements Applying to Wireless and Access Networks
Aerohive Solution Overview
The Aerohive Personalized Engagement Platform includes Aerohive intelligentaccess
platforms with built-in Aerohive HiveOS™ security features and HiveManager PCI 3.0
Reporting. Figure 2 illustrates the platform’s functionality.
Figure 2. Aerohive Personalized Engagement Platform
Aerohive HiveOS
Aerohive intelligent access platforms include the enterprise-class Aerohive
HiveOS operating system. HiveOS includes the following advanced security
features that help address PCI compliance requirements:
• Wireless Intrusion Protection System (WIPS), which enables each AP to perform
off-channel scanning and identify and locate unauthorized (rogue) APs and
clients, as well as misbehaving clients.
• Strong authentication and encryption standards, such as WPA/WPA2
(Personal), WPA/WPA2 802.1X Enterprise and Aerohive Private Pre-Shared Key
• Intrusion detection (MAC Dos, IP DoS) features help detect active
penetration attempts, such as failed authentications, associations, or EAP
handshakes; various types of protocol frame floods, such as probe requests,
probe responses, and authentication requests; and denial of service attacks
through deauthentication and disassociation attacks.
• An integrated firewall with full application visibility and control that isolates
the cardholder data from rest of the network and ensures network access is
tightly controlled based on context.
• Strong password enforcement to validate that all passwords include at least
seven characters with both numeric and alphabetic characters.
Copyright ©2014, Aerohive Networks, Inc. 3
PCI 3.0 Compliance and Security for Retailers
• Logging of all wireless association and authentication requests.
Aerohive HiveManager
Aerohive HiveManager is an out-of-band enterprise-class network management system
that handles configuration, OS updates, and monitoring for thousands of Aerohive
devices. HiveManager checks the network for PCI DSS compliance and reports on non-
compliant Wi-Fi configurations and vulnerabilities as shown in Figure 3. HiveManager
reports include:
• Rogue Device Compliance provides details on rogue devices and stations
• Device Configuration Compliance identifies devices with weak access
security, WEP, or open authentication.
• Intrusion Detection Compliance for MAC address and IP DoS
Log Servers provide a list of external and internal log servers
Figure 3. HiveManager PCI DSS Wireless LAN Compliance Report
Address Wi-Fi PCI Compliance More Effectively With Aerohive
Maintaining PCI compliance is an ongoing effort. As wireless and access networks
become critical to retailers’ sales, marketing, and customer engagement objectives,
they must be secure and compliant. The Aerohive Personalized Engagement Platform
delivers advanced security features and PCI compliance reporting capabilities that
retailers need to effectively address PCI compliance while delivering a superior
shopping experience to their customers.
4 Copyright ©2014, Aerohive Networks, Inc.
PCI 3.0 Compliance and Security for Retailers
For More Information
Products: http://www.aerohive.com/products/overview.html
Resource Center: http://www.aerohive.com/resources
Promotions: http://www.aerohive.com/promotions
About Aerohive
Aerohive (NYSE: HIVE) unleashes the power of enterprise mobility. Aerohive’s
technology enables organizations of all sizes to use mobility to increase productivity,
engage customers, and grow their business.Deployed in over 13,000 enterprises
worldwide, Aerohive's proprietary mobility platform takes advantage of the cloud and
a distributed architecture to deliver unified, intelligent, simplified and cost-effective
networks. Aerohive was founded in 2006 and is headquartered in Sunnyvale, Calif. For
more information, please visit www.aerohive.com, call us at 408-510-6100, follow us
on Twitter @Aerohive, subscribe to our blog, join our community or become a fan on
our Facebook page.
Copyright ©2014, Aerohive Networks, Inc. 5

More Related Content

What's hot

Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Ping Identity
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
WSO2
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Ping Identity
 
Unique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - OverviewUnique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - Overview
Rajesh Kumar Raj
 
Open Banking via APIc 2018
Open Banking via APIc 2018Open Banking via APIc 2018
Open Banking via APIc 2018
Shiu-Fun Poon
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
Block Armour
 
Finance
FinanceFinance
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
Ping Identity
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
International Communications Corporation
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity
 
Sign On Express for BPO
Sign On Express for BPOSign On Express for BPO
Sign On Express for BPO
ILANTUS Technologies
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
WSO2
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity
 
FreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsFreeG WiFi PPT for Hotels
FreeG WiFi PPT for Hotels
Shailendra Jain
 
Identity Federation Patterns with WSO2 Identity Server​
Identity Federation Patterns with WSO2 Identity Server​Identity Federation Patterns with WSO2 Identity Server​
Identity Federation Patterns with WSO2 Identity Server​
WSO2
 
FreeG WiFi Introduction
FreeG WiFi IntroductionFreeG WiFi Introduction
FreeG WiFi Introduction
Shailendra Jain
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 

What's hot (20)

Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Unique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - OverviewUnique Performance TechSoft Pvt Ltd - Overview
Unique Performance TechSoft Pvt Ltd - Overview
 
Open Banking via APIc 2018
Open Banking via APIc 2018Open Banking via APIc 2018
Open Banking via APIc 2018
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Finance
FinanceFinance
Finance
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Sign On Express for BPO
Sign On Express for BPOSign On Express for BPO
Sign On Express for BPO
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
FreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsFreeG WiFi PPT for Hotels
FreeG WiFi PPT for Hotels
 
Identity Federation Patterns with WSO2 Identity Server​
Identity Federation Patterns with WSO2 Identity Server​Identity Federation Patterns with WSO2 Identity Server​
Identity Federation Patterns with WSO2 Identity Server​
 
FreeG WiFi Introduction
FreeG WiFi IntroductionFreeG WiFi Introduction
FreeG WiFi Introduction
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 

Similar to PCI 3.0 Compliance and Security for Retailers

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
SafeNet
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Sutedjo Tjahjadi
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
gaborvodics
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
ScottBreadmore
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
HelpSystems
 
Can I Trust the Cloud?
Can I Trust the Cloud?Can I Trust the Cloud?
Can I Trust the Cloud?
Lee Technologies
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Hacken_Ecosystem
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
Derrick McBreairty
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
Melvin Dickerson
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
Rasheed Al Sulh
 
ICC Data and Device management
ICC Data and Device managementICC Data and Device management
ICC Data and Device management
International Communications Corporation
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
Donald Malloy
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
Raz-Lee Security
 

Similar to PCI 3.0 Compliance and Security for Retailers (20)

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
Can I Trust the Cloud?
Can I Trust the Cloud?Can I Trust the Cloud?
Can I Trust the Cloud?
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
 
ICC Data and Device management
ICC Data and Device managementICC Data and Device management
ICC Data and Device management
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 

More from Aerohive Networks

The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
Aerohive Networks
 
Economic Value Validation by ESG
Economic Value Validation by ESGEconomic Value Validation by ESG
Economic Value Validation by ESG
Aerohive Networks
 
Switches At-a-Glance
Switches At-a-GlanceSwitches At-a-Glance
Switches At-a-Glance
Aerohive Networks
 
Routers At-a-Glance
Routers At-a-GlanceRouters At-a-Glance
Routers At-a-Glance
Aerohive Networks
 
Enterprise Access Points At-a-Glance
Enterprise Access Points At-a-GlanceEnterprise Access Points At-a-Glance
Enterprise Access Points At-a-Glance
Aerohive Networks
 
Mobility Suite At-a-Glance
Mobility Suite At-a-GlanceMobility Suite At-a-Glance
Mobility Suite At-a-Glance
Aerohive Networks
 
AP230 802.11ac Access Point Datasheet
AP230 802.11ac Access Point DatasheetAP230 802.11ac Access Point Datasheet
AP230 802.11ac Access Point Datasheet
Aerohive Networks
 
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Aerohive Networks
 
Infographic: How are enterprises adopting cloud services?
Infographic: How are enterprises adopting cloud services? Infographic: How are enterprises adopting cloud services?
Infographic: How are enterprises adopting cloud services?
Aerohive Networks
 
Aerohive SR2148P Switch
Aerohive SR2148P SwitchAerohive SR2148P Switch
Aerohive SR2148P Switch
Aerohive Networks
 
Aerohive SR2124P Switch
Aerohive SR2124P SwitchAerohive SR2124P Switch
Aerohive SR2124P Switch
Aerohive Networks
 
Aerohive SR2024P Switch
Aerohive SR2024P SwitchAerohive SR2024P Switch
Aerohive SR2024P Switch
Aerohive Networks
 
Aerohive SR2024 Switch
Aerohive SR2024 SwitchAerohive SR2024 Switch
Aerohive SR2024 Switch
Aerohive Networks
 
Aerohive BR200 Branch Router
Aerohive BR200 Branch RouterAerohive BR200 Branch Router
Aerohive BR200 Branch Router
Aerohive Networks
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
Aerohive Networks
 
Aerohive AP390 802.11ac Wireless Access Point
Aerohive AP390 802.11ac Wireless Access PointAerohive AP390 802.11ac Wireless Access Point
Aerohive AP390 802.11ac Wireless Access Point
Aerohive Networks
 
Aerohive AP370 802.11ac Wireless Access Point
Aerohive AP370 802.11ac Wireless Access PointAerohive AP370 802.11ac Wireless Access Point
Aerohive AP370 802.11ac Wireless Access Point
Aerohive Networks
 
Aerohive AP350 802.11n Wireless Access Point
Aerohive AP350 802.11n Wireless Access PointAerohive AP350 802.11n Wireless Access Point
Aerohive AP350 802.11n Wireless Access Point
Aerohive Networks
 
Aerohive AP330 802.11n Wireless Access Point
Aerohive AP330 802.11n Wireless Access PointAerohive AP330 802.11n Wireless Access Point
Aerohive AP330 802.11n Wireless Access Point
Aerohive Networks
 
Aerohive AP170 802.11n Outdoor Wireless Access Point
Aerohive AP170 802.11n Outdoor Wireless Access PointAerohive AP170 802.11n Outdoor Wireless Access Point
Aerohive AP170 802.11n Outdoor Wireless Access Point
Aerohive Networks
 

More from Aerohive Networks (20)

The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
Economic Value Validation by ESG
Economic Value Validation by ESGEconomic Value Validation by ESG
Economic Value Validation by ESG
 
Switches At-a-Glance
Switches At-a-GlanceSwitches At-a-Glance
Switches At-a-Glance
 
Routers At-a-Glance
Routers At-a-GlanceRouters At-a-Glance
Routers At-a-Glance
 
Enterprise Access Points At-a-Glance
Enterprise Access Points At-a-GlanceEnterprise Access Points At-a-Glance
Enterprise Access Points At-a-Glance
 
Mobility Suite At-a-Glance
Mobility Suite At-a-GlanceMobility Suite At-a-Glance
Mobility Suite At-a-Glance
 
AP230 802.11ac Access Point Datasheet
AP230 802.11ac Access Point DatasheetAP230 802.11ac Access Point Datasheet
AP230 802.11ac Access Point Datasheet
 
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
 
Infographic: How are enterprises adopting cloud services?
Infographic: How are enterprises adopting cloud services? Infographic: How are enterprises adopting cloud services?
Infographic: How are enterprises adopting cloud services?
 
Aerohive SR2148P Switch
Aerohive SR2148P SwitchAerohive SR2148P Switch
Aerohive SR2148P Switch
 
Aerohive SR2124P Switch
Aerohive SR2124P SwitchAerohive SR2124P Switch
Aerohive SR2124P Switch
 
Aerohive SR2024P Switch
Aerohive SR2024P SwitchAerohive SR2024P Switch
Aerohive SR2024P Switch
 
Aerohive SR2024 Switch
Aerohive SR2024 SwitchAerohive SR2024 Switch
Aerohive SR2024 Switch
 
Aerohive BR200 Branch Router
Aerohive BR200 Branch RouterAerohive BR200 Branch Router
Aerohive BR200 Branch Router
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
Aerohive AP390 802.11ac Wireless Access Point
Aerohive AP390 802.11ac Wireless Access PointAerohive AP390 802.11ac Wireless Access Point
Aerohive AP390 802.11ac Wireless Access Point
 
Aerohive AP370 802.11ac Wireless Access Point
Aerohive AP370 802.11ac Wireless Access PointAerohive AP370 802.11ac Wireless Access Point
Aerohive AP370 802.11ac Wireless Access Point
 
Aerohive AP350 802.11n Wireless Access Point
Aerohive AP350 802.11n Wireless Access PointAerohive AP350 802.11n Wireless Access Point
Aerohive AP350 802.11n Wireless Access Point
 
Aerohive AP330 802.11n Wireless Access Point
Aerohive AP330 802.11n Wireless Access PointAerohive AP330 802.11n Wireless Access Point
Aerohive AP330 802.11n Wireless Access Point
 
Aerohive AP170 802.11n Outdoor Wireless Access Point
Aerohive AP170 802.11n Outdoor Wireless Access PointAerohive AP170 802.11n Outdoor Wireless Access Point
Aerohive AP170 802.11n Outdoor Wireless Access Point
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

PCI 3.0 Compliance and Security for Retailers

  • 1. PCI 3.0 Compliance and Security for Retailers Solution Brief
  • 2. The Aerohive Personalized Engagement Platform provides a flexible, high-performance Wi-Fi network with advanced security features that address PCI 3.0 requirements. Gain a highly secure way to personalize the shopping experience for in-store customers while complementing your PCI compliance goals. Challenges Recent breaches at high-profile retailers have put credit card and customer data security back in the spotlight. Securing this data becomes even more challenging as retailers look for innovative ways set themselves apart, increase in-store traffic, strengthen customer loyalty, and drive sales. Many retailers are implementing mobile strategies that allow customers to do everything from check item availability and compare products to make mobile purchases with their smartphones. These new capabilities place new security and compliance demands on wireless networks. PCI Compliance and Access Networks Access networks provide network connectivity to point-of-sale devices, laptops, and mobile phones in the retail store. The PCI Data Security Standard (PCI DSS) applies to all network components—wired and wireless. The PCI Security Standards Council continues to update PCI DSS requirements to address the dynamic threat landscape. Version 3.0 of the PCI Data Security Standard (PCI DSS) became effective on Jan. 1, 2014. For wireless and access networks, the elements generally included in PCI compliance checking are Wi-Fi access points, switches, firewalls, authenticating servers, and any security appliance is part of the cardholder data environment (CDE). The specific PCI DSS requirements that apply to wireless and access networks are shown in Figure 1. Guideline Benefit 4.1.1 - Ensure wireless networks transmitting cardholder data or connected to the cardholder data environment, use industry best practices (for example, IEEE 802.11i) to implement strong encryption for authentication and transmission. Note: The use of WEP as a security control is prohibited. Use the latest, most advanced encryption standards to permit only authorized devices and users in the network. 6.5.10 - Broken authentication and session management. Note: Requirement 6.5.10 is a best practice until June 30, 2015, after Secure authentication and session management prevents unauthorized individuals from compromising legitimate account
  • 3. PCI 3.0 Compliance and Security for Retailers which it becomes a requirement. credentials, keys, or session tokens. 11.1.1 – Maintain an inventory of authorized wireless access points including a documented business justification. Locate and identify unauthorized (rogue) access points and clients. Figure 1. PCI DSS Requirements Applying to Wireless and Access Networks Aerohive Solution Overview The Aerohive Personalized Engagement Platform includes Aerohive intelligentaccess platforms with built-in Aerohive HiveOS™ security features and HiveManager PCI 3.0 Reporting. Figure 2 illustrates the platform’s functionality. Figure 2. Aerohive Personalized Engagement Platform Aerohive HiveOS Aerohive intelligent access platforms include the enterprise-class Aerohive HiveOS operating system. HiveOS includes the following advanced security features that help address PCI compliance requirements: • Wireless Intrusion Protection System (WIPS), which enables each AP to perform off-channel scanning and identify and locate unauthorized (rogue) APs and clients, as well as misbehaving clients. • Strong authentication and encryption standards, such as WPA/WPA2 (Personal), WPA/WPA2 802.1X Enterprise and Aerohive Private Pre-Shared Key • Intrusion detection (MAC Dos, IP DoS) features help detect active penetration attempts, such as failed authentications, associations, or EAP handshakes; various types of protocol frame floods, such as probe requests, probe responses, and authentication requests; and denial of service attacks through deauthentication and disassociation attacks. • An integrated firewall with full application visibility and control that isolates the cardholder data from rest of the network and ensures network access is tightly controlled based on context. • Strong password enforcement to validate that all passwords include at least seven characters with both numeric and alphabetic characters. Copyright ©2014, Aerohive Networks, Inc. 3
  • 4. PCI 3.0 Compliance and Security for Retailers • Logging of all wireless association and authentication requests. Aerohive HiveManager Aerohive HiveManager is an out-of-band enterprise-class network management system that handles configuration, OS updates, and monitoring for thousands of Aerohive devices. HiveManager checks the network for PCI DSS compliance and reports on non- compliant Wi-Fi configurations and vulnerabilities as shown in Figure 3. HiveManager reports include: • Rogue Device Compliance provides details on rogue devices and stations • Device Configuration Compliance identifies devices with weak access security, WEP, or open authentication. • Intrusion Detection Compliance for MAC address and IP DoS Log Servers provide a list of external and internal log servers Figure 3. HiveManager PCI DSS Wireless LAN Compliance Report Address Wi-Fi PCI Compliance More Effectively With Aerohive Maintaining PCI compliance is an ongoing effort. As wireless and access networks become critical to retailers’ sales, marketing, and customer engagement objectives, they must be secure and compliant. The Aerohive Personalized Engagement Platform delivers advanced security features and PCI compliance reporting capabilities that retailers need to effectively address PCI compliance while delivering a superior shopping experience to their customers. 4 Copyright ©2014, Aerohive Networks, Inc.
  • 5. PCI 3.0 Compliance and Security for Retailers For More Information Products: http://www.aerohive.com/products/overview.html Resource Center: http://www.aerohive.com/resources Promotions: http://www.aerohive.com/promotions About Aerohive Aerohive (NYSE: HIVE) unleashes the power of enterprise mobility. Aerohive’s technology enables organizations of all sizes to use mobility to increase productivity, engage customers, and grow their business.Deployed in over 13,000 enterprises worldwide, Aerohive's proprietary mobility platform takes advantage of the cloud and a distributed architecture to deliver unified, intelligent, simplified and cost-effective networks. Aerohive was founded in 2006 and is headquartered in Sunnyvale, Calif. For more information, please visit www.aerohive.com, call us at 408-510-6100, follow us on Twitter @Aerohive, subscribe to our blog, join our community or become a fan on our Facebook page. Copyright ©2014, Aerohive Networks, Inc. 5