SlideShare a Scribd company logo
1 of 2
Download to read offline
WAF FOR PCI-DSS COMPLIANCE
AWF Series Solution Brief
AWF Series Web Application Firewall Helps Meet PCI DSS Standard, Protecting
Cardholder Data, Reducing Fraud and Mitigating Security Vulnerabilities
Background
The Payment Card Industry Data Security Standard (PCI DSS) was instituted
more than a decade ago to specify the minimum levels of security for storing,
processing and transmitting credit cardholder data. Any type of business that
wishes to accept major credit cards, such as MasterCard, Visa, American
Express and others, is required to comply with PCI DSS in order to obtain or
maintain membership status.
The stakes are high for merchants – failure to comply with PCI DSS, and a
subsequent breach of cardholder or transaction data, can result in substantial
fines and/or the revocation of the right to accept credit card payments, not
to mention the potential for a class-action lawsuit by the credit cardholders
themselves or by a government entity.
The PCI DSS requirements apply to all network components, servers and
applications included in or connected to the cardholder data environment.
The standard sets out six key control objectives and twelve requirements that
members must adhere to – and larger entities must be externally validated for
compliance.
Solution Overview
Array’s AWF Series Web application firewalls provide industry-leading Web
application attack protection, ensuring continuity and high availability of Web
applications while reducing security risks. The AWF Series not only detects
the complex Web application attacks of today, but also blocks attack traffic in
real time without affecting the normal flow of traffic. In addition, the AWF Series
provides extremely fine-grained attack detection and analysis capabilities while
protecting against a broad spectrum of Web application attacks.
Deployed in the datacenter or enterprise network, the AWF Series includes a
powerful suite of features to assist in attaining and maintaining PCI compliance.
AWF Series Benefits
„„ Operates on multiple levels to protect
Web servers and applications
„„ Continuous scanning for vulnerabilities
and for SQL injection or cross-site
scripting and other threats within
applications
„„ DDoS protection via brute force attacks
mitigation
„„ Active incident response with detection,
blocking and prevention of attacks,
including zero-day detection
„„ Post-incident diagnosis and analysis to
reduce overall security risk
„„ Highly refined rules library includes
sophisticated protections
„„ Comprehensive Layer 1 through 7
protection for Web servers at the
network and application level
„„ Web page tamper-proofing through
centralized management and control of
all Web tamper-proofing endpoints
„„ Customizable feature library and flexible
configuration model
„„ Guided configuration to reduce
installation complexity and errors
„„ Comprehensive management portal
with visualized monitoring
1371 McCarthy Blvd., Milpitas, CA 95035
Phone: (408) 240-8700 Toll Free: 1-866-MY-ARRAY
Nov-2015 rev. a
www.arraynetworks.com
® 2015 Array Networks, Inc. All Rights Reserved.
The majority of the PCI DSS requirements, and the
specific ways in which the AWF Series can help achieve
compliance, include:
„„ Install and maintain a firewall configuration
to protect cardholder data. The AWF Series
Web application firewall protects backend Web
servers from attacks. It includes a predefined
attack signature library that helps block common
attacks, and in addition the administrator can define
customized rules to prevent new attacks.
„„ Do not use vendor-supplied defaults for system
passwords and other security parameters. AWF
Series allows the administrator accounts’ passwords
to be changed, and all remote administrative access
is encrypted via SSL.
„„ Protect stored cardholder data. The AWF Series
itself does not store cardholder data, and a reverse
proxy mode can be utilized to protect Web servers
from being directly accessed by attackers.
„„ Encrypt transmission of cardholder data across
open, public networks. Array’s AWF Series supports
secure transmission of data via SSL, and does not
provide a wireless network interface.
„„ Protect all systems against malware and regularly
update antivirus software or programs. The AWF
Series’ core operating system is proprietary, and
security hardened to protect against malicious
attacks. In addition, the built-in attack signature
library can be updated as needed to counter the
latest attacks.
„„ Develop and maintain secure systems and
applications. Protection is provided against SQL
injection, buffer overflow, server information leaks,
and known vulnerabilities, as well as XSS, CSRF
and other attacks. Vulnerability pattern can be easily
updated as needed. Access control lists help assure
that administrators and auditors can access only the
appropriate data.
„„ Restrict access to cardholder data by business
need to know. As mentioned previously, the AWF
Series provides role-based administrative rights.
Administrator accounts are restricted to configuration
tasks; account manager accounts are restricted to
managing the administrators and their sessions;
and the audit accounts are restricted to auditing the
administrators’ activities and system logs. None of
these accounts has access to cardholder data.
„„ Identify and authenticate access to system
components. In addition to authenticating and
restricting access for multiple management account
types, the AWF Series sets up an individual session
each time an administrator accesses the system, and
all user types’ accesses are logged.
„„ Track and monitor all access to network resources
and cardholder data. The AWF Series maintains a
log system which maintains access logs, attack logs,
audit logs, webkeeper logs and backup logs.
„„ Regularly test security systems and processes.
A scanning function is included in the AWF Series,
allowing administrators to define automatic scan
tasks to regularly scan destination URLs to ensure the
security of backend applications.
„„ Maintain a policy that addresses information
security for all personnel. As mentioned previously,
the AWF Series provides role-based authentication
and access for administrators, account managers
and auditors. In addition, all access activities and
operations are recorded in logs for auditing purposes.
Summary
With the exception of restricting physical access to
cardholder data, Array’s AWF Series Web application
firewall can help enterprises and other entities meet the
requirements for PCI DSS compliance, while protecting
cardholder data, reducing fraud exposure, and
mitigating security risks.

More Related Content

What's hot

6 Steps to Secure Network Devices
6 Steps to Secure Network Devices6 Steps to Secure Network Devices
6 Steps to Secure Network DevicesLisa Kearney
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT
 
Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Jeff Suratt
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentationtsteh
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
WhiteHat Security Presentation
WhiteHat Security PresentationWhiteHat Security Presentation
WhiteHat Security Presentationmarkgmeyer
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Nextel S.A.
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesRIZWAN HASAN
 
Web application firewall
Web application firewallWeb application firewall
Web application firewallAju Thomas
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop ServicesGss America
 

What's hot (20)

6 Steps to Secure Network Devices
6 Steps to Secure Network Devices6 Steps to Secure Network Devices
6 Steps to Secure Network Devices
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 
Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers 
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
 
Our Software
Our SoftwareOur Software
Our Software
 
WhiteHat Security Presentation
WhiteHat Security PresentationWhiteHat Security Presentation
WhiteHat Security Presentation
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release Highlights
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilities
 
JBlair_Resume
JBlair_ResumeJBlair_Resume
JBlair_Resume
 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
 
MBESDatasheet
MBESDatasheetMBESDatasheet
MBESDatasheet
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop Services
 

Viewers also liked

Ursul Tedi si stupul de albine
Ursul Tedi si stupul de albineUrsul Tedi si stupul de albine
Ursul Tedi si stupul de albineAdri F
 
RESUME HARDIK KOLI
RESUME HARDIK KOLIRESUME HARDIK KOLI
RESUME HARDIK KOLIHardik koli
 
забытые страницы 1мв газовые атаки
забытые страницы 1мв газовые атакизабытые страницы 1мв газовые атаки
забытые страницы 1мв газовые атакиViktor Kurko
 
The Anatomy of Addiction by Akikur Mohammad, MD
The Anatomy of Addiction by Akikur Mohammad, MDThe Anatomy of Addiction by Akikur Mohammad, MD
The Anatomy of Addiction by Akikur Mohammad, MDInspire Malibu
 
The Nike KD9 Premiere
The Nike KD9 PremiereThe Nike KD9 Premiere
The Nike KD9 PremiereTrung Ho
 
KATERINARANIAALEJANDROSHLIAS
KATERINARANIAALEJANDROSHLIASKATERINARANIAALEJANDROSHLIAS
KATERINARANIAALEJANDROSHLIAS50dimthess
 
ΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕ
ΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ  ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ  ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕ
ΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕ50dimthess
 
The Life and Ministry of Paul, Part 1: Transformation Begins
The Life and Ministry of Paul, Part 1: Transformation BeginsThe Life and Ministry of Paul, Part 1: Transformation Begins
The Life and Ministry of Paul, Part 1: Transformation BeginsPacific Church
 
Jitendrasinh Jadon
Jitendrasinh JadonJitendrasinh Jadon
Jitendrasinh JadonJeetu Jadon
 

Viewers also liked (13)

Ursul Tedi si stupul de albine
Ursul Tedi si stupul de albineUrsul Tedi si stupul de albine
Ursul Tedi si stupul de albine
 
RESUME HARDIK KOLI
RESUME HARDIK KOLIRESUME HARDIK KOLI
RESUME HARDIK KOLI
 
Lip sycing
Lip sycing Lip sycing
Lip sycing
 
забытые страницы 1мв газовые атаки
забытые страницы 1мв газовые атакизабытые страницы 1мв газовые атаки
забытые страницы 1мв газовые атаки
 
The Anatomy of Addiction by Akikur Mohammad, MD
The Anatomy of Addiction by Akikur Mohammad, MDThe Anatomy of Addiction by Akikur Mohammad, MD
The Anatomy of Addiction by Akikur Mohammad, MD
 
Soldadura
SoldaduraSoldadura
Soldadura
 
The Nike KD9 Premiere
The Nike KD9 PremiereThe Nike KD9 Premiere
The Nike KD9 Premiere
 
Cuevas de lascaux
Cuevas de lascauxCuevas de lascaux
Cuevas de lascaux
 
KATERINARANIAALEJANDROSHLIAS
KATERINARANIAALEJANDROSHLIASKATERINARANIAALEJANDROSHLIAS
KATERINARANIAALEJANDROSHLIAS
 
ΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕ
ΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ  ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ  ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕ
ΕΡΓΑΣΙΑ ΣΤ' ΤΑΞΗΣ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΓΛΩΣΣΑΣ ΣΕ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΠΕ
 
The Life and Ministry of Paul, Part 1: Transformation Begins
The Life and Ministry of Paul, Part 1: Transformation BeginsThe Life and Ministry of Paul, Part 1: Transformation Begins
The Life and Ministry of Paul, Part 1: Transformation Begins
 
Abc book
Abc bookAbc book
Abc book
 
Jitendrasinh Jadon
Jitendrasinh JadonJitendrasinh Jadon
Jitendrasinh Jadon
 

Similar to WAF FOR PCI-DSS COMPLIANCE

Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks Array Networks
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Security Operations
Security OperationsSecurity Operations
Security Operationsankitmehta21
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungardCheryl Goldberg
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfDigital Auxilio Technologies
 
Secure code practices
Secure code practicesSecure code practices
Secure code practicesHina Rawal
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster SecurityAditya Bhuyan
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
Cloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsCloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsGlobalDots
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseWinWire Technologies Inc
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3vhimsikal
 
How to Build a Secure Java Web Application.pdf
How to Build a Secure Java Web Application.pdfHow to Build a Secure Java Web Application.pdf
How to Build a Secure Java Web Application.pdfGeorgeThomas874377
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 

Similar to WAF FOR PCI-DSS COMPLIANCE (20)

Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
 
Web Access Firewall
Web Access FirewallWeb Access Firewall
Web Access Firewall
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungard
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Weblogic security
Weblogic securityWeblogic security
Weblogic security
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
DBMS SECURITY
DBMS SECURITYDBMS SECURITY
DBMS SECURITY
 
Cloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsCloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDots
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
How to Build a Secure Java Web Application.pdf
How to Build a Secure Java Web Application.pdfHow to Build a Secure Java Web Application.pdf
How to Build a Secure Java Web Application.pdf
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 

More from Array Networks

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl... Array Networks
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ... Array Networks
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance Array Networks
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer Array Networks
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010 Array Networks
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief Array Networks
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava... Array Networks
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS Array Networks
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS Array Networks
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY Array Networks
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS Array Networks
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES Array Networks
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES Array Networks
 
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal... Array Networks
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper Array Networks
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility Array Networks
 

More from Array Networks (20)

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES
 
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

WAF FOR PCI-DSS COMPLIANCE

  • 1. WAF FOR PCI-DSS COMPLIANCE AWF Series Solution Brief AWF Series Web Application Firewall Helps Meet PCI DSS Standard, Protecting Cardholder Data, Reducing Fraud and Mitigating Security Vulnerabilities Background The Payment Card Industry Data Security Standard (PCI DSS) was instituted more than a decade ago to specify the minimum levels of security for storing, processing and transmitting credit cardholder data. Any type of business that wishes to accept major credit cards, such as MasterCard, Visa, American Express and others, is required to comply with PCI DSS in order to obtain or maintain membership status. The stakes are high for merchants – failure to comply with PCI DSS, and a subsequent breach of cardholder or transaction data, can result in substantial fines and/or the revocation of the right to accept credit card payments, not to mention the potential for a class-action lawsuit by the credit cardholders themselves or by a government entity. The PCI DSS requirements apply to all network components, servers and applications included in or connected to the cardholder data environment. The standard sets out six key control objectives and twelve requirements that members must adhere to – and larger entities must be externally validated for compliance. Solution Overview Array’s AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity and high availability of Web applications while reducing security risks. The AWF Series not only detects the complex Web application attacks of today, but also blocks attack traffic in real time without affecting the normal flow of traffic. In addition, the AWF Series provides extremely fine-grained attack detection and analysis capabilities while protecting against a broad spectrum of Web application attacks. Deployed in the datacenter or enterprise network, the AWF Series includes a powerful suite of features to assist in attaining and maintaining PCI compliance. AWF Series Benefits „„ Operates on multiple levels to protect Web servers and applications „„ Continuous scanning for vulnerabilities and for SQL injection or cross-site scripting and other threats within applications „„ DDoS protection via brute force attacks mitigation „„ Active incident response with detection, blocking and prevention of attacks, including zero-day detection „„ Post-incident diagnosis and analysis to reduce overall security risk „„ Highly refined rules library includes sophisticated protections „„ Comprehensive Layer 1 through 7 protection for Web servers at the network and application level „„ Web page tamper-proofing through centralized management and control of all Web tamper-proofing endpoints „„ Customizable feature library and flexible configuration model „„ Guided configuration to reduce installation complexity and errors „„ Comprehensive management portal with visualized monitoring
  • 2. 1371 McCarthy Blvd., Milpitas, CA 95035 Phone: (408) 240-8700 Toll Free: 1-866-MY-ARRAY Nov-2015 rev. a www.arraynetworks.com ® 2015 Array Networks, Inc. All Rights Reserved. The majority of the PCI DSS requirements, and the specific ways in which the AWF Series can help achieve compliance, include: „„ Install and maintain a firewall configuration to protect cardholder data. The AWF Series Web application firewall protects backend Web servers from attacks. It includes a predefined attack signature library that helps block common attacks, and in addition the administrator can define customized rules to prevent new attacks. „„ Do not use vendor-supplied defaults for system passwords and other security parameters. AWF Series allows the administrator accounts’ passwords to be changed, and all remote administrative access is encrypted via SSL. „„ Protect stored cardholder data. The AWF Series itself does not store cardholder data, and a reverse proxy mode can be utilized to protect Web servers from being directly accessed by attackers. „„ Encrypt transmission of cardholder data across open, public networks. Array’s AWF Series supports secure transmission of data via SSL, and does not provide a wireless network interface. „„ Protect all systems against malware and regularly update antivirus software or programs. The AWF Series’ core operating system is proprietary, and security hardened to protect against malicious attacks. In addition, the built-in attack signature library can be updated as needed to counter the latest attacks. „„ Develop and maintain secure systems and applications. Protection is provided against SQL injection, buffer overflow, server information leaks, and known vulnerabilities, as well as XSS, CSRF and other attacks. Vulnerability pattern can be easily updated as needed. Access control lists help assure that administrators and auditors can access only the appropriate data. „„ Restrict access to cardholder data by business need to know. As mentioned previously, the AWF Series provides role-based administrative rights. Administrator accounts are restricted to configuration tasks; account manager accounts are restricted to managing the administrators and their sessions; and the audit accounts are restricted to auditing the administrators’ activities and system logs. None of these accounts has access to cardholder data. „„ Identify and authenticate access to system components. In addition to authenticating and restricting access for multiple management account types, the AWF Series sets up an individual session each time an administrator accesses the system, and all user types’ accesses are logged. „„ Track and monitor all access to network resources and cardholder data. The AWF Series maintains a log system which maintains access logs, attack logs, audit logs, webkeeper logs and backup logs. „„ Regularly test security systems and processes. A scanning function is included in the AWF Series, allowing administrators to define automatic scan tasks to regularly scan destination URLs to ensure the security of backend applications. „„ Maintain a policy that addresses information security for all personnel. As mentioned previously, the AWF Series provides role-based authentication and access for administrators, account managers and auditors. In addition, all access activities and operations are recorded in logs for auditing purposes. Summary With the exception of restricting physical access to cardholder data, Array’s AWF Series Web application firewall can help enterprises and other entities meet the requirements for PCI DSS compliance, while protecting cardholder data, reducing fraud exposure, and mitigating security risks.