Compliance

Achieve and enforce a compliant Linux enterprise, whether governed by PCI, HIPAA, SOC2, or FINRA, with a single solution for your production environment.

The Challenge

Most organizations are in a constant struggle to not only secure their production environment but do so in a way that adheres to compliance regulations. Failing to do so can not only be costly from a penalty standpoint, but it can also erode customer trust — and even internal trust in the security team. Adding containers and other cloud-native technologies into the mix makes it harder than ever for organizations to adhere to already burdensome compliance standards.

The Capsule8 Difference

Capsule8 Protect can be deployed in heterogeneous production environments, including containers, virtual machines, and bare metal on any sort of cloud or in data centers. This allows enterprises to shift from multiple legacy controls to a single solution that performs well even on the busiest workloads and networks. Capsule8 also satisfies compliance requirements in Intrusion Detection and Prevention systems (IDS/IPS), File Integrity Monitoring (FIM) and Anti-Virus (AV) — meaning Capsule8 meets several compliance requirements and can again replace various point solutions with a single product. At the same time, Capsule8 protects customers better than all the legacy solutions combined, dramatically reducing false positives, and removing performance risk in a way that makes operations teams happy.

For PCI:

Following a rigorous evaluation by DirectDefense, a leading provider of PCI and security assessment services for PCI DSS, Capsule8 was found to be a compliant solution for several controls regarding IDS/IPS, FIM, and AV for architectures that rely on Linux for their host operating systems, and for enterprises that manage PCI compliance in house, including several of the key “control” statements in Requirements 5, 6, 10, and 11. This allows organizations to replace legacy IDS/IPS, FIM, and AV solutions in their Linux production environment with a single solution.

Among the PCI DSS requirements the Capsule8 solution helps address are the following:

Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs – Capsule8 provides comprehensive detection and protection, not only from unknown and ‘zero-day’ attacks, but also for malicious programs.

Requirement 6: Develop and maintain secure systems and applications – To stay ahead of the curve, Capsule8 Labs has a continuous process to identify and evaluate new and existing CVEs (Common Vulnerabilities and Exposures), testing its product continually against new exploits to ensure effectiveness — even by quickly writing custom exploits when no public exploit is available for a customer-impacting vulnerability.

Requirement 11: Regularly test security systems and processes – Capsule8 Protect provides cloud-native IDS/IPS capabilities that leverage workload-level data to provide vastly superior detection to traditional IDS/IPS. The solution also provides a comprehensive policy capability, including File Integrity Management (FIM) and AV.

For SOC 2:

SOC 2 is among the most common tech standards for security, applying to most SaaS applications. It requires strong controls and procedures for protecting personally identifiable information.

Capsule8 helps provide the controls you need, without creating an additional compliance headache.

Capsule8 Protect works at the system level, and looks at no application-level data, unless you explicitly ask it to do inspection of file content.

Additionally, Capsule8 Protect can easily be run entirely by the customer, without Capsule8 hosting it — thus removing the burden and expense of using a third-party service provider.

Among the capabilities that Capsule8 provides that help achieve SOC 2 compliance include:

  • A modern, cloud-native attack protection solution meant to replace legacy IDS, IPS and AV controls.
  • Monitoring and protection for suspicious issues across the filesystem, user accounts, network, user behavior and configurations.
  • Detailed information about post-compromise activity, to trace whether PHI was accessed.
  • Comprehensive audit capabilities.
For HIPAA:

For healthcare companies and business serving the community that are processing personal health information (PHI), Capsule8 helps provide the controls you need, without creating an additional compliance headache.

Capsule8 Protect works at the system level and does not look at application-level data unless you explicitly ask it to do an inspection of file content.

Additionally, Capsule8 Protect can easily be run entirely by the customer, without Capsule8 hosting it — thus removing the burden and expense of using a third-party service provider.

HIPAA requires use of controls that are reasonable and appropriate. One of the challenges faced by organizations transitioning to modern infrastructure has been that legacy controls are no longer appropriate and there were only a few reasonable alternatives to replace them — until Capsule8.

Among the capabilities that Capsule8 provides that help achieve HIPAA compliance include:

  • A modern, cloud-native attack protection solution meant to replace legacy IDS and IPS controls.
  • Monitoring and protection for suspicious issues across the filesystem, user accounts, network, user behavior and configurations.
  • Protection and detection capabilities that exceed requirements for anti-virus covered by Security Rule 164.308(a)(5)(ii)(B).
  • Detailed information about post-compromise activity, to trace whether PHI was accessed.
  • Comprehensive audit capabilities.

Product Overview

Capsule8 is the industry’s only real-time, zero-day exploit detection platform purpose-built for Linux production systems in hybrid environments – whether multicloud, containerized, virtualized or bare metal.