Ready to manage your entire data center in one solution?

Start your test drive here

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Free 30 Day Trial - With Your Own Data

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Take DCIM Monitoring for a Test Drive

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Take DCIM for a Spin

Request Your Free Online Demo Today

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Free Full Featured Download

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

See why marquee customers
are moving to the Sunbird
DCIM platform.

Start your test drive here

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

See why marquee customers
are moving to the Sunbird
DCIM platform.

Start your test drive here

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

DCIM Suite Bundle

 

See why marquee customers
are moving to the Sunbird
DCIM platform.

Request your demo here

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Ready to join marquee customers moving to the Sunbird DCIM platform?

Request your quote here

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Request Quote

 

Ready to manage your entire data center in one solution?

Start your test drive here

We’re committed to your privacy. Sunbird uses the information you provide us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

PCI Compliance Requirements

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that apply to any company that accepts credit cards as a form of payment. These companies must store, process, and transmit cardholder data with a PCI-compliant hosting provider.

To comply with the PCI security requirements, organizations must:

  • Use firewalls. Firewalls block foreign or unknown entities from accessing private data and are often the first line of defense against hackers.
  • Update passwords. Equipment like routers, modems, and point of sale systems often come out of the box with generic passwords that are vulnerable to unauthorized access. To be PCI-compliant, you must track all devices and software that require a password or other security feature to access and follow best practices (e.g., changing the password) to mitigate against threats.
  • Encrypt cardholder data. Card data must be encrypted with certain algorithms, and the encryption keys themselves must be encrypted. Primary account numbers must be regularly maintained and scanned to ensure there is no unencrypted data.
  • Encrypt transmitted data. Cardholder data that is transmitted to payment processors, central data centers from local stores, etc. must be encrypted in transmission. Account numbers must never be sent to unknown locations.
  • Use anti-virus software. Anti-virus software is required for all devices that interact with or store primary account numbers. Where it cannot be directly installed, anti-virus measures must still be implemented.
  • Maintain and update software. Firewalls, anti-virus software, and other software should be routinely updated to include the latest security patches to eliminate vulnerabilities. The software on devices that interact with or store cardholder data must be properly maintained.
  • Restrict data access. Cardholder data should not be accessible to anyone who does not require it. The roles that do need cardholder data must be documented and maintained.
  • Use unique identification. Individuals who have access to cardholder data must have their own credentials and identification to reduce vulnerabilities and allow for a quicker response time if data is compromised.
  • Physically secure data. Cardholder data must be kept in a physically secure location.
  • Maintain access logs. All access attempts to cardholder data and primary account numbers must be logged. You must document how data flows in your organization and how often access is needed.
  • Perform regular vulnerability testing. Proactively identify things that may malfunction, go out of date, or suffer from human error by regularly scanning and testing for security vulnerabilities.
  • Document your policies. Have a written set of policies and procedures that addresses information security for all personnel.

Enhance Data Center Physical Security with DCIM Software

Modern data center managers use Data Center Infrastructure Management (DCIM) software to protect their assets and data from security threats and intrusions.

DCIM software enables you to:

  • Manage door locks and card access control. Track when doors are opened through contact closure sensors and know when access attempts are made, by whom, and if attempts successful with card access assignments.
  • Perform bulk device configuration and firmware updates. Make changes to the configuration of intelligent rack PDUs in bulk to quickly improve security protections. When a manufacturer delivers a new firmware version, you can roll it out to all supported devices simultaneously.
  • Use granular, role-based permissions. Maintain permissions and prevent unauthorized changes by assigning different roles to users and user groups at granular levels. Role-based permissions can easily be documented to demonstrate compliance with regulatory policies.
  • Monitor surveillance feeds. Multiple IP and USB camera feeds can be viewed on an HTML5 dashboard simultaneously to remotely monitor multiple areas or sites.
  • Alert, audit, and report on your security. Track when cabinet doors are opened or if access attempts are made with real-time notifications to quickly identify unauthorized personnel and act accordingly. Audit logs and security reports help with forensic analysis and clue you in to suspicious trends so you can investigate further.

Want to see how Sunbird’s world-leading DCIM software makes it easy for you to secure your data center and be PCI-compliant? Get your free test drive now.

Related Links

Browse other terms alphabetically:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

WORD OF THE DAY:

Data Center Automation
Data center automation is the process in which the routine processes of data center operations are completed without any manual effort. Automating data center tasks increases operational efficiency, improves data accuracy, and simplifies data center management.
Learn even more about this term