Copyright © 2000
Restorepoint Ltd, all rights reserved
PCI DSS compliance requires organisations to perform regular audits of their network environments to ensure that cardholder data is always protected. PCI compliance audits take place at 6 month intervals, but the preparation work for IT managers, PCI compliance managers and internal auditors often begins many weeks in advance.
Restorepoint helps customers dramatically shorten audit cycles and demonstrate PCI DSS compliance by implementing automated processes and PCI DSS compliance checks across network and security devices including routers, switches and firewalls. The PCI Data Security Standard specifies12 requirements, and by using Restorepoint, organisations are able to meet the following PCI DSS requirements:
Restorepoint enables you to standardise network configurations, to detect and track changes since the last audit using configuration baselines. Checks are performed at the point of your scheduled configuration backup, and alerts sent if required.
Using Restorepoint compliance policies, you can quickly assess if devices are configured to allow untrusted connections or protocols. Checks are performed every-time a configuration backup is taken, and alerts can be sent to highlight a PCI violation.
Restorepoint secures configurations using AES encryption to protect the sensitive data that network configurations contain, such as passwords and IP address. Restorepoint can also check whether a device no longer meets an approved baseline or build.
Using Restorepoint compliance policies, you can quickly assess if devices are configured to allow untrusted connections or protocols. Checks are performed every-time a configuration backup is taken, and alerts can be sent to highlight a PCI violation.
Using Restorepoint compliance policies, you can quickly assess if devices are configured to allow untrusted connections or protocols. Checks are performed every-time a configuration backup is taken, and alerts can be sent to highlight a PCI violation.
Restorepoint automatically detects the use of default vendor/manufacturer passwords. Passwords can be regularly updated in bulk using our Device Control feature. Furthermore, password policies can be used to ensure that devices conform with your password stands for strength/length.
Simple rules can be created and applied to multiple devices using Compliance Policies to ensure that configurations do not contain insecure protocols. Restorepoint's Global Search feature can also be used to identify non-compliance in seconds.
Restorepoints customisable Asset Management functionality acts as a live network inventory. Allowing you to Track device IP addresses, locations, firmware revisions, network interfaces, licenses and more.
Restorepoint can store any vendor documentation and PCI policies so that it is easily available to the users who need it.
Restorepoints Password policies can be applied to devices to ensure that they conform to company policy and that PCI DSS password requirements regarding the use of strong passwords are met.
Passwords can be regularly updated in bulk using our Device Control feature, simplifying compliance of PCI DSS password requirements and saving administrators valuable time. Restorepoint manages bulk changes quickly, and provides visibility of the changes as they're performed.
Restorepoint enables customers to retain multiple versions of their network configurations using customisable schedules for disaster recovery and auditing. Configurations versions can be compared to highlight changes, baseline differences and restored in seconds if needed.
Restorepoint is used by many service providers to manage the configuration backup, compliance and device monitoring of customer devices.
Restorepoint performs change detection at the point of backup, allowing you to detect whether devices have been altered, meet PCI DSS compliance requirements or no longer meet approved baselines.