usd AG Re-Certified as Approved Scanning Vendor (ASV) Worldwide

4. July 2019

usd AG with its scanning solution available through the usd PCI DSS Platform has been re-certified as an Approved Scanning Vendor (ASV) by the PCI Security Standards Council (PCI SSC). The certification is valid worldwide.

At the same time, usd released a new version of its usd PCI DSS Platform, which contains comprehensive functional improvements. A new feature allows users to pause and resume scans on their own for a certain period of time. This way users can ensure that the scanner only accesses company servers at specified times and adapt the scanning process to fit their company’s needs. Internal regulations and guidelines are thus implemented directly via the PCI DSS Platform. The Seal of Approval, which can be incorporated into the customer’s web shop or website to demonstrate compliance with the PCI DSS, is now available in a new design. Make security visible. Earn your customers’ trust.

Founded in 1994, usd AG has been operating as an officially accredited assessor in all relevant standards of the payment card industry worldwide since 2004. As a member of the PCI SSC Global Executive Assessor Roundtable (GEAR), we also support the PCI Security Standards Council as one of 20 companies worldwide with our knowledge from thousands of PCI projects.

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories