Cynet enables you to fully comply with all the breach protection aspects of the major regulatory frameworks spanning requirements across Monitoring & Control, Attack Prevention & Detection and Response Orchestration. Cynet 360 consolidated endpoint, user and network protection provides the widest requirement coverage that can be found in a single platform.
Complying with the Payment Card Industry Data Security Standard (PCI-DSS) is essential to any organization that stores and processes branded credit cards.
Cynet 360 meets all parts of requirement 5: “Protect all systems against malware and regularly update antivirus software or programs.“
Additionally, Cynet 360 assists in meeting additional PCI requirements
The US National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) establishes information security standards and guidelines for critical infrastructure and is in wide use by organizations of all verticals. NIST CSF breaks down security into five categories: Identify, Protect, Detect, Respond and Recover.
Cynet 360 directly supports key requirements across all categories
Additionally, Cynet 360 provides supplemental support across all the controls that entail manual workflows and processes
The General Data Protection Regulation (GDPR) is the binding standard to any organization that conducts business operation in the European Union. GDPR includes vast specifications that relate to the responsibility of organizations to safeguard private customer information from both inadvertent exposure as well as from malicious breach. GDPR prescribes six principles for the processing of personal data: fairness and transparency; purpose limitation; data minimization; accuracy; storage limitation; integrity and confidentiality; and accountability.
Cynet 360 direct support to integrity and confidentiality; and accountability by playing a key role in prevention & detection, as well as in response processes
HIPPA provides requirements and guidelines for maintaining the security and privacy of Personal Identifiable Information (PII). Some of the specifications in HIPPA are policyprocess requirements that are entirely within the organization responsibility while others apply to implemented technology. HIPPA specifications are divided to the following groups: Risk Management, Protection from Malicious Software, Log-In Monitoring, Integrity, Response and Reporting, Audit Controls and Notification.
Cynet 360 provides direct and supplemental support across all HIPPA groups