Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Trend Micro Security for Mac (TMSM) in PCI Compliant Environment

    • Updated:
    • 9 Jul 2018
    • Product/Version:
    • Trend Micro Security for Mac 3.0
    • Platform:
    • Macintosh El Capitan
    • Macintosh Leopard
    • Macintosh Lion
    • Macintosh Mavericks
    • Macintosh Mountain Lion
    • Macintosh Snow Leopard
    • MacOS Sierra
Summary

In May 2018, Payment Card Industry Data Security Standard (PCI DSS) version 3.2.1 was released and Trend Micro Security for Mac (TMSM) is compliant to all the PCI DSS requirements for anti-virus and anti-malware solutions as defined in PCI DSS Requirement 5, which states "Protect all systems against malware and regularly update anti-virus software or programs."

Details
Public

Trend Micro Security for Mac is compliant to the following PCI DSS requirements:

PCI DSS Requirement 5
Protect all systems against malware and regularly update anti-virus software or programs
Trend Micro Security for Mac Features
5.1. Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers).
5.1.1 Ensure that anti-virus programs are capable of detecting, removing, and protecting against all known types of malicious software.
5.1.2 For systems considered to be not commonly affected by malicious software, perform periodic evaluations to identify and evaluate evolving malware threats in order to confirm whether such systems continue to not require anti-virus software.
5.2 Ensure that all anti-virus mechanisms are maintained as follows:
  • Are kept current
  • Perform periodic scans
  • Generate audit logs which are retained per PCI DSS Requirement 10.7
5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period.
5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and known to all affected parties.
Premium
Internal
Rating:
Category:
Configure
Solution Id:
1120088
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.