Security is the Foundation of Compliance

We know that protecting your customer data is extremely important, complicated and challenging. That is why we partnered with Trustwave®, a leading provider of data security services and PCI DSS compliance, to help you protect your business from a data breach.

The result is the Advanced Security Package (ASP), a customized suite of security tools providing detection, monitoring and reporting capabilities that will not only make you more secure, it will help meet and streamline your PCI compliance requirements. ASP not only provides a solid foundation for compliance, but it will also give you peace of mind that your business is secure.

The Advanced Security Package is delivered via Trustwave Endpoint Protection Suite, which simplifies compliance and provides a unified dashboard for monitoring. The Endpoint makes deploying easy. You simply log in and ASP will prompt you to install the Endpoint. Once deployed, ASP enables automatic recognition of your security solutions and can prefill answers to all applicable questions for the SAQ, saving you time.

A Secure Solution for Easier PCI DSS Compliance

We designed the Advanced Security Package (ASP) especially for businesses with limited IT resources. Many businesses don’t have a resource on hand that is knowledgeable in areas of risk, data security or PCI DSS compliance.

ASP helps fill that gap and provides a greater breadth of security capabilities than you’d find from any single security vendor. If you shopped for each of these tools independently, the costs to you will be many times greater. Plus, you’d have to deal with each vendor separately.

The Advanced Security Package is designed to improve your overall security posture by adding additional layers to your data security defenses while also streamlining your PCI DSS compliance process.

If you’d like more information, feel free to read our Advanced Security Package FAQs.

 
96%

Percent of breaches that affect small businesses.

 
87%

Number of breaches that were avoidable with simple/intermediate measures.

 
20%

The number of merchants who fail after a credit card compromise.

Ready to become #SecurityFirst?

Get Started
Key Features

Identifying Vulnerabilities

  • External Vulnerability Scans – Certified external vulnerability scans designed to detect and report security shortcomings of the target physical location and/or website from the perspective of a would-be hacker.POS
  • Application Detection – Monitors the endpoints for known payment applications and reports on their compliance status.
  • Credit Card Data Scanner – Inspects the endpoints for storage of sensitive or PCI-prohibited data including credit card data and full magnetic stripe data.
  • File Integrity Monitor – Detects unexpected or malicious changes to critical system files, directories and registry settings for Windows and Linux OS endpoints.
  • Security Configuration Monitor – Monitors the endpoint’s security configuration against the relevant PCI Data Security Standard controls allowing you to discover and address policy and security weaknesses quickly and holistically on mobile and fixed endpoints.

Preventing Malware and Malicious Activity

  • Web Malware Monitoring – Regular monitoring for malware that may be present on the merchant’s website. It also tracks other issues that may affect consumer confidence in the website, such as being listed on a search engine blacklist, domain hijacking and expired SSL certificates.
  • POS Tracker – Helps track and monitor POS equipment for tampering and substitution.
  • TrustWave® Antivirus – Prevents, detects and removes malicious computer viruses for Windows, Linux, and Android OS endpoints.
16.7 Million

The number of Americans who were victims of a data breach last year.

44.7%

How much data breaches increased last year. 55% of those affected were small businesses.

18 Months

The average time it takes before a breached business goes out of business.

Key Features

Strengthening Access Security

  • Remote Access Security – Monitors and tracks remote access software installed and enabled on the endpoint. Provides guidance on best practices for configuring remote access securely.
  • Unauthorized Device Security – Inventories the local network as well as monitoring for unknown rogue devices.
  • Mobile Device Security – Audits and reports on security and compliance of the device to enable proactive defense.

Improving Reporting

  • Security Policy Generator – Helps the merchant meet the relevant PCI SAQ requirements and speeds the process of showing the compliance.
  • Security Health Check – Monitors the basic health of the endpoints to ensure security settings are in place and active.
  • SAQ Templates – Enables automatic recognition of your security solutions and can prefill answers to all applicable questions for the SAQ, saving you time.

Want to Learn More?

Our team doesn't mess around when it comes to security. Let us help you become #SecurityFirst.

Get Started