Payment Security
PCI PFI Investigation Services
Consult our experts. We are happy to support you.
What atsec offers
atsec (Beijing) Information Technology Co.,Ltd (“atsec China” for short) is accredited as a Payment Card Industry (PCI) Forensic Investigator (PFI) by the Payment Card Industry Security Standards Council (SSC). Currently atsec China provides PCI PFI investigation in the China region ONLY.
atsec China can perform independent forensic investigation once it is requested by card brands, acquirers, and/or compromised entities, and the Preliminary Incident Response Report and Final PFI report can be released after the investigation. The service provided by the investigator(s) of atsec China is to assist the compromised entities to determine the cause of an incident, and provide suggestions for remediation.
atsec’s Computer Forensics and Incident Analysis service will help you identify as much evidence as possible to track down an attacker and confront him or her with the evidence collected. As part of this service we provide the following.
- Conduct a thorough search for material that can help in the investigation, reconstruction of the events, and modeling each step of the attack.
- Map the evidence collected to the attack model to determine whether the information is in accord with the model.
- Refine the model and carry out a more focused search for additional evidence.
Why our services are important to you
The total loss to commercial enterprises due to deliberate attacks on information systems by external or internal personnel is estimated to be hundreds of billion of dollars worldwide. The growing use of the Internet and the increasing complexity of information systems continuously provide new opportunities for deliberate attacks. Even when the effects of such an attack are detected, the attack path and the perpetrator of the attack sometimes are unknown, and there is thus a probability that the attack will be repeated.
One important aspect of risk management is the ability to learn lessons from attacks and incidents. Such learning by experience, however, requires a thorough analysis of the attacks and incidents to identify their source and the steps an attacker has taken. Because many experienced attackers know how to cover their tracks, the skills of experienced security experts must be brought to bear to analyze and reconstruct how an attack was launched and determine who the perpetrator was.
Authoritative websites:
More information:
Change Language:
Still have questions?
Can’t find what you’re looking for? Let’s talk!