Accelerate Compliance
Armor gives you the assurance needed to manage sophisticated payment applications with increased flexibility, scalability, and reliability.
Armor provides security and compliance benefits by mapping security controls to the PCI DSS framework, reducing scope, simplifying your auditing process, and lowering management costs.
Compliance Standards We Support



Easier PCI Cloud Compliance
Simplify the burden of PCI DSS compliance with Armor. Applications and data protected by Armor inherit compliance controls. This means easier PCI assessments and heightened security.
Why Armor for PCI compliance?
- PCI DSS 3.2.1-Compliant Solutions: Armor’s security solutions address numerous key controls in PCI DSS 3.2.1. This means that our solutions are configured to meet standards set by the PCI Security Council.
- Inherited Compliance Controls: Armor customers receive certification of compliance mapped against PCI DSS controls.
- PCI DSS Compliance Expertise: Cloud-ready organizations trust us to protect their customers’ payment card-related data at all costs.
Our purpose-built managed cloud security solutions were created to simplify compliance, minimizing PCI DSS-related anxiety, and preventing breaches of payment card information.
Inherited PCI DSS Controls
Armor’s security capabilities address numerous key controls in PCI DSS 3.2.1 as required by the PCI Security Standards Council. This allows organizations to accelerate their adherence to PCI DSS while streamlining reporting and attestation.
Click on the tabs below to see key PCI DSS controls addressed by our solutions:
Armor Anywhere - PCI Compliance Matrix
Armor Security Services | PCI DSS 3.2.1 Controls | Risk Mitigation |
Intrusion Detection/Prevention | 11.4 | Malicious allowed traffic |
Internal Network Vulnerability Scanning | 11.2.3 | Exploits due to missing patches or updates; improper network firewall configuration |
File Integrity Monitoring | 11.5 | Monitoring unauthorized changes to critical files |
OS Patching | 6.0, 6.2 | OS weaknesses |
Malware Protection | 5.1, 5.2, 5.3 | Compromise due to virus/malware infection |
Log & Data Management | 10.1, 10.2.2-10.2.7, 10.3, 10.5, 10.6, 10.7 | Detection of malicious activity |
Armor Anywhere with Secure Hosting - PCI Compliance Matrix
Armor Security Services | PCI DSS 3.2.1 Controls | Risk Mitigation |
IP Reputation Filtering | Security best practice | Activity from known bad sources |
DDoS Mitigation | Security best practice | Loss of availability due to high volume of malicious activity |
Web Application Firewall | 6.6 | Application layer flaws and exploits |
Intrusion Detection/Prevention | 11.4 | Malicious allowed traffic |
Network Firewall (Hypervisor-Based) | 1.1.5, 1.1.6, 1.1.7, 1.2.2, 1.2.3, 1.3.3, 1.3.5 | Unwanted network connectivity |
Secure Remote Access (Two-factor authentication) | 8.3 | Unauthorized remote use of administrative access |
Secure Remote Administrative Access | 2.3 | Disclosure of administrative credentials |
OS Patching | 6.1, 6.2 | OS weaknesses |
Malware Protection | 5.1, 5.2, 5.3 | Compromise due to virus/malware infection |
Log & Data Management | 10.1, 10.2.2-10.2.7, 10.3, 10.5, 10.6, 10.7 | Detection of malicious activity |
Physical Security | 9.1, 9.2, 9.3, 9.4 | Physical theft or compromise of data |