PCI.png      iso-27001.png      HIPAA.png

Secure Cloud Hosting and Compliance for Ecommerce and Financial Platforms, Applications and Data.
Partner with WHOA.com's Compliance experts to maximize your efforts.

free consult.png

 

 

WHOA.com PCI COMPLIANT CLOUD FEATURES


Our quick reference guide maps your PCI DSS Requirements to our secure cloud solutions, representing common sense steps that mirror security best practices.

BUILD AND MAINTAIN A SECURE NETWORK
Install & maintain a firewall configuration to protect cardholder data.
Do not use vendor-supplied defaults for system passwords & other security parameters.

 

Icon.PCI-firewall2.png Icon.PCI-perimterFirewall.png Icon.PCI-Vxlan.png Icon.PCI-policies.png Icon.PCI-HardOS.png
 Managed Firewall  Perimeter Firewall  VXLAN  System Policies  Hardened OS 


PROTECT CARDHOLDER DATA
Protect stored cardholder data.
Encrypt transmission of cardholder data across open, public networks

 

Icon.PCI.encrypted.png Icon.PCI-log.encryptedBackup.png Icon.PCI-VPN.png
Encrypted
Storage
Encrypted
Backups
 VPN


VULNERABILITY MANAGEMENT PROGRAM
Use and regularly update anti-virus software or programs.
Develop and maintain secure systems and applications.

 

Icon.PCI-antivirus.png Icon.PCI-TOPS.png Icon.PCI-threatmanager.png Icon.PCI-penetration.png Icon.PCI-vulnerability.png Icon.PCI-WAf.png
Anti Virus IDS and IPS Threat Manager Penetration Tests Vulnerability Scans  Web Application
Firewall


IMPLEMENT STRONG ACCESS CONTROLS
Restrict access to cardholder data by business.
Assign a unique ID to each person with computer access.
Restrict physical access to cardholder data.

 

Icon.PCI-password.png PCI-Security.png Icon.PCI-tier4.png Icon.PCI-dataChain.png
 Password
Management
 Security
Training
Tier IV
Datacenters
 Data Chain
of Custody


REGULARLY MONITOR AND TEST NETWORKS
Track & monitor all access to network resources & cardholder data.
Regularly test security systems & processes.

 

Icon.PCI-logMan.png Icon.PCI-FIM.png Icon.PCI-vulnerability.png Icon.PCI-penetration.png Icon.PCI-TOPS.png Icon.PCI-threatmanager.png
Log
Management
Fire Integrity Monitoring Vulnberability Scans Penetration Tests IDS and
IPS
Threat
Manager


MAINTAIN AN INFORMATION SECURITY POLICY
Maintain a policy that addresses information security for all personnel.

 

Icon.PCI-log.incident.png PCI-Security.png Icon.PCI-BC.png Icon.PCI-DR.png
Incident
Response
 Secuirty
Training
Business
Continuity
Disaster
Recovery


OUR PCI-DSS COMPLIANT CLOUD PARTNERS



paloalto-1.png   compliancepoint-1.png  sciencelogic.png     tintri_logo.png      HIMSS.png 

 Trend-Micro_logo.png      Vormetric-Logo.png      AlertLogic.png      vmware-vector-logo.png    microsoft.png      authAnvil.png     zerto.png

3d cloud2.png

HIPAA Compliant Hosting Solutions

To Learn more about partnering with WHOA.com for a customized HIPAA Compliant Hosting solution, contact us today or click below to request a free consultation.

Learn More