Securing point of sale (POS) systems is an important element of ensuring that your customer’s valuable payment card information (PCI) is not compromised. CimTrak covers your point of sale (POS) systems as part of a comprehensive strategy to protect your PCI environment.
CimTrak ensures that you have complete visibility into changes to these critical devices. Changes, whether malicious or accidental, can lead to a breach of payment card information (PCI) and non-compliance with PCI-DSS. Trust CimTrak to maintain the integrity and security of your point of sale (POS) systems. CimTrak covers a wide range of point of sale (POS) systems including those running Windows XP (including XP embedded), Windows Embedded for Point of Service (WEPOS), and POSReady.
CimTrak ensures that you have complete visibility into changes to these critical devices. Changes, whether malicious or accidental, can lead to a breach of payment card information (PCI) and non-compliance with PCI-DSS. Trust CimTrak to maintain the integrity and security of your point of sale (POS) systems.
CimTrak covers a wide range of point of sale (POS) systems including those running Windows XP (including XP embedded), Windows Embedded for Point of Service (WEPOS), and POSReady.
File integrity monitoring of point of sale (POS) systems is a requirement of the payment card industry data security standards and is a best practice for ensuring that changes to these systems do not allow a breach of credit card and other customer data. CimTrak is a leader in file integrity monitoring, pioneering real-time detection of changes on IT systems including point of sale systems.
POS systems require file integrity monitoring because they are directly involved with processing of credit cards. Changes to the operating system and applications on point of sale (POS) systems can cause system downtime and worse, a breach of credit card data. CimTrak file integrity monitoring allows changes to be detected and alerted on instantly, allowing investigation before a problem occurs.
CimTrak gives you deep insight to changes that are occurring on your servers. By letting you know “who” made a change, “what” exactly changed, and “when” it changed, users get actionable information, not just an alert that requires time-consuming, manual effort to investigate. Users can even drill-down further and get a side-by-side comparison of what a particular file looked like pre-change vs. post-change and zero in on exactly what changed. This extraordinary level of detail saves already stretched IT staff time, money, and frustration by getting to the root of changes.
With a wide selection of reports which can be scheduled or created on-demand, CimTrak ensures that you have the information that you need for auditing, compliance, or change management purposes. With CimTrak’s ODBC driver, data can be sent from the CimTrak Master Repository to any reporting tool that your organization utilizes including Excel, Crystal Reports, or Cognos
Upon detection of changes, alerts can be sent to the appropriate personnel within your organization. Further, change details can be sent to a Syslog server or a security information and event manager (SIEM). CimTrak offers out-of-the-box integration with all major SIEM solutions including HP ArcSight, IBM QRadar, McAfee Enterprise Security Manager, RSA Security Analytics, Splunk, and more!
CimTrak’s unique architecture gives it the unprecedented ability to go beyond simply change detection. Various modes of operation including “update baseline,”deny rights,” and “restore” give users extreme versatility unlike any other solution.
Users can deploy these modes of operation selectively to monitor a particular file or group of files as appropriate. This granular nature of deployment allows precision monitoring of your unique environment in the way that fits your operational needs.
When changes occur, CimTrak’s unique ability to take pro-active action via the “deny right” or “restore” mode, helps to ensure the integrity and security of your business critical servers. CimTrak protects against external attacks that slip by your perimeter defenses as well as internal attacks and occasional accidents that originate from inside your corporate perimeter.
While intrusion detection systems and anti-virus are essential, they are dependent on known attack-signatures to be effective and they are often useless against zero-day attacks, disgruntled employees, or programmer mistakes. CimTrak is not dependent on outside intelligence of new hacker or virus methods to be 100 percent effective.
As cyber attacks, data breaches and new forms of malware become more and more prevalent, new methods of defense are necessary. With CimTrak’s powerful modes of operation, you are able to stop changes from occurring without specific authorization. This efficiently and effectively prevents new IT scurity threats from wreaking havoc on your IT systems.
Cimtrak Technical Summary Download