GS Logo
The Green Sheet, Inc

Please Log in

A Thing
View Archives

View flipbook of this issue

Care to Share?

Table of Contents

Lead Story

EMV, four months on

Patti Murphy

Thicken that skin


Industry Update

FTC takes on big data

U.S. adds six Russian banks to OFAC banned list

MasterPass joins Wal-Mart payment mix

New DOT standards reach airport kiosks


The automated ISO

Phablet popularity soars this holiday season

Felix Richter
Statista Inc.

Smarthphone-driven commerce


Choice not chance

Dale S. Laszig
DSL Direct LLC

Will we be Uberized?

Ken Musante
Eureka Payments LLC


Street SmartsSM:
Facts and figures of the MLS

Jeffrey I. Shavitz
TrafficJamming LLC

The M&A market 2016: 10 things to know to best position your business

Adam Hark

Real capabilities of tokenization in mobile payments

David Poole

Termination: The end or a new beginning?

Adam Atlas
Attorney at Law

The high-risk merchant services opportunity

Matt O'Shea
National Bank Services

The time is right for second generation P2PE

Ruston Miles
Bluefin Payment Systems LLC

Company Profile


New Products

Holistic approach to cybersecurity

Next Generation Security Assessment Services
Redhawk Network Security LLC

Future-proof, obsolescence-free POS

CardWare International Inc.


Letter From the Editors

Readers Speak: Much ado about faster payments

Boost Your Biz:Earn respect with your website

ISOMetrics:Online retailer status update

GS Book Notes:Powerful presence, powerful stories

Resource Guide


A Bigger Thing

The Green Sheet Online Edition

January 25, 2016  •  Issue 16:01:02

previous next

New Products

Holistic approach to cybersecurity

Product: Next Generation Security Assessment Services

Redhawk Network Security LLC,RedHawk Logo a network engineering and information security firm established in 2001, designed a suite of onsite, remote and online services for businesses. Services include information security assessment, managed security services, security software-as-a-service, security consulting, network monitoring and management, network implementation, and network storage.

The company works closely with clients' IT staff to understand and identify organizational risks. Risks and controls are evaluated based on information security best practices defined in ISO/IEC 27001 and ISO/IEC 27002 specifications, along with guidance from the National Institute of Standards and Technology. Compliance with the Payment Card Industry (PCI) Data Security Standard (DSS) and related security standards is evaluated by the PCI Security Standards Council (PCI SSC). These standards provide the framework to ensure the safe handling of cardholder information.

All-inclusive assessments

Redhawk noted that its security analysts review all system assets within scope at client locations. Every aspect of a security program is evaluated, from network architecture, hardware and software configurations to policies and procedures. This hands-on approach employs software tools, manual analysis, interviews and personal observations to determine the program's overall effectiveness. A cloud portal provides detailed and easy to understand assessment reports along with tools for documenting remediation progress and managing vulnerabilities. Recommendations for remediation are provided for all vulnerabilities found.

After the review process, a comprehensive report provides documentation with recommendations to assure the client is following accepted industry best practices for maintaining information security. "Over the past few years we have seen progress in PCI compliance requirements, but we continue to see outdated assessment methods in numerous business sectors, including financial services, healthcare and government, that fail to provide merchants with a clear remediation path," said David Lindemann, Redhawk Vice President of Technology and Products. "Redhawk Network Security addresses this trend by providing our customers with next-generation security assessment services."

Next generation security assessment services

Beyond initial penetration testing and security assessment, maintaining a secure network requires ongoing due diligence and monitoring to mitigate vulnerabilities. Redhawk stated it offers a variety of services and products focused on security, including:

Acquirer-centric approach

Redhawk security assessors have Qualified Security Assessor and Certified Information Systems Security Professional certifications and maintain the company's portal tools in conformance with PCI SSC assessment controls and specific acquirer compliance requirements. "The two most critical components in performing any type of PCI assessment is an accurately scoped cardholder data environment and a clear understanding of the acquirer's compliance requirements," Lindemann said. "While we do approach PCI compliance from a focused perspective, we are always looking to improve the industry standard and provide feedback to agencies and ISOs," he added.

Website: Contact:

Notice to readers: These are archived articles. Contact names or information may be out of date. We regret any inconvenience.

previous next

Spotlight Innovators:

North American Bancard | USAePay | Impact Paysystems | Electronic Merchant Systems | Board Studios