Isolating the Cardholder Data Environment with Network Segmentation

Isolating the Cardholder Data Environment with Network Segmentation

In a recent post, we discussed many of the challenges with attesting to PCI DSS compliance, including a description of some of the factors that are often overlooked when defining the cardholder data environment (CDE). See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on PCI DSS-related topics for more information. …

Read More
Securing Cloud Networks

Securing Cloud Networks

Continuing our blog series on Azure Secure Cloud Migration, we will discuss Azure’s take on network control and how scalability and manageability play a role in designing a secure and functional environment. See our previous post on Talking to the Cloud for insights on architecting an Azure network. Network Access Control Network Security Groups (NSGs) are a native Azure feature to apply...

Read More
How to Talk to the Cloud

How to Talk to the Cloud

Picking up from last week’s post on Preparing to Migrating to a Secure Cloud, the first part of our Azure Secure Cloud Migration blog series, we’ll jump right in to how and why the client’s Azure network was architected. Connectivity and traffic flow between Azure, on-premises locations, and even business partners are things to consider immediately, as they impact the overall structure of the...

Read More
Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)

In a recent post, we discussed what PCI DSS is, why it matters, and the release of the latest version, including a summary of the changes and the impact of each. See “What PCI DSS version 3.2 means for you” for more information. In 2016, West Monroe Partners has conducted over 140 IT diligences on behalf of private equity firms and strategic buyers across a number of industries as...

Read More
Preparing to Migrate to a Secure Cloud

Preparing to Migrate to a Secure Cloud

West Monroe Partners recently completed a nine-month effort to help a client migrate a large custom SaaS platform with regulatory requirements (PCI DSS v3.1, SSAE16). The engagement involved migrating on-premises systems to Microsoft Azure’s IaaS platform, and in the coming weeks, we’ll be detailing our methodology for designing and securing that environment in a series of blog...

Read More
What PCI DSS Version 3.2 Means for You

What PCI DSS Version 3.2 Means for You

The Payment Card Industry Security Standards Council (PCI SSC) recently released version 3.2 of their Data Security Standard (PCI DSS v3.2).  The PCI DSS is a global standard designed to protect payment card data.  It applies to any organization that accepts or processes payment cards, and lays out a comprehensive compliance program designed to define how organizations should implement...

Read More
Partly Cloudy with a Chance of Compliance

Partly Cloudy with a Chance of Compliance

As advisors to our 100+ private equity clients who use M&A activity to provide positive returns to their investors, WMP helps establish platforms, processes, and technology that can enable rapid EBITDA growth. Within the world of M&A, carve-outs and divestitures are some of the most complex situations when it comes to quickly getting the newly acquired business on the right track...

Read More
Cyber-attack in Ukraine a Red Flag for Power Distribution Networks

Cyber-attack in Ukraine a Red Flag for Power Distribution Networks

‘..the first known power outage caused by hackers and also the most complex cyber-attack on infrastructure to date.’ The Institute of Engineering and Technology, Jan 19, 2016 On December 23, 2015 an outage in Western Ukraine’s Prykarpattya Oblenergo and Kyivoblenergo power distribution networks lost power between three to six hours, affecting between 80,000-700,000 customers.…

Read More

What You Need to Know about Identity Access Management

Identity and access management – the process of ensuring the right people have the right access to information – should be a key component of any organization’s security infrastructure. A sound IAM approach will not only help protect your sensitive data, it will also save you time and money. However, implementation challenges such as business system complexities, lack of defined user roles and...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons