Managed SaaS SolutionsPayment Card Industry-Professional Compliant & Secure.

Service Brief 

Compliance doesn’t always equate to security. DDI understands the challenge of meeting today's Payment Card Industry (PCI) compliance standards while helping you maintain a comprehensive security program that addresses the ongoing security concerns of your business.

A data breach can cripple, if not totally devastate, an organization and its valued customer base, especially one that captures personally identifiable information through acceptance of credit cards. The results of these incidents are costly, both financially and reputationally.

Built upon DDI’s premier managed service, Vulnerability Lifecycle Management-Professional, PCI-Pro offers clients a unique solution:

  • A managed security program approach, not only for PCI compliance, but more importantly, a robust information security program to continually improve the security culture and minimize their risk of a data breach.
  • A higher level of understanding surrounding PCI compliance.  Clients benefit from DDI’s stature as a PCI Approved Scanning Vendor (ASV) for nine years running, an accomplishment that separates us from more than 90% of the other ASV’s. This translates into time and cost efficiencies for you. Unlike other providers, our PCI-Pro service, with the expert assistance of a Personal Security Analyst, allows clients to achieve PCI compliance more quickly and efficiently. 

Let DDI’s PCI experts help you achieve compliance, while reducing risk….and anxiety!

Learn more about our recognized PCI-Pro service. Read our press release.  

Alert Center

12/17/2014 » CVE-2014-4626
EMC Documentum Content Server before 6.7 SP1 P29, 6.7 SP2 before P18, 7.0 before P16, and 7.1 before P09 allows remote authenticated users to gain privileges by (1) placing a command in a dm_job object and setting this object's owner to a privileged user or placing a rename action in a dm_job_request object and waiting for a (2) dm_UserRename or (3) dm_GroupRename service task, aka ESA-2014-105. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2515. [READ ME]

Visit DDI Alert Center