SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Excellence as Standard


How Nettitude can help with your PCI DSS ASV Vulnerability Scanning:

Vulnerability scanning is a key component within the PCI Data Security Standard. A malicious attack will very
often begin with a gentle and often remote probe of the security posture of an organisation. The publically
available perimeter of an organisation is by its nature potentially open to all kinds of sources of attacks. This
can then be the entry point for a full blown assault upon your network and/or data.

A strong security posture may change at any time as new vulnerabilities in operating systems are uncovered,
or when unchecked changes are implemented or even when a combination of a number of factors reveal an
unknown weakness that has existed all along.

The purpose of a Vulnerability Assessment is to be confidant on a regular basis that your systems and
infrastructure is well configured, well patched and well designed to prevent malicious attackers from having
an opportunity.

Nettitude is qualified as an Approved Scanning Vendor (ASV) to perform these Vulnerability Assessments.


WHAT DO THE PCI SECURITY STANDARDS COUNCIL SAY?

PCI DSS requires that if you transmit, process or store Card Holder Data then some form of Vulnerability Scan
will most probably need to be completed. Your Acquiring Bank/Payment Brands will advise you accordingly.

The requirement is found is Section 11 of the PCI DSS and consists of the following statement:

           11.2 Run internal and external network vulnerability scans at least quarterly and after any significant
           change in the network (such as new system component installations, changes in network topology,
           firewall rule modifications, product upgrades).


HOW DO I PERFORM EXTERNAL SCANNING?

The external scanning must be performed by an Approved Scanning Vendor (ASV) who has been authorised
and approved by the Security Standards Council (SSC). This accreditation is renewed each year and a list of
ASV’s published on the Councils website at: https://www.pcisecuritystandards.org/pdfs/asv_report.html

This scanning must be done every quarter and the reports will need to be submitted to your Acquiring
Bank/Card Brand along with your relevant Self Assessment Questionnaires (SAQ) or QSA Reports on
Compliance (ROC).

The report that you submit must come back with a clean passing result. It is essential that any vulnerabilities
that result in a failure are dealt with and rectified immediately so that a set of clean reports can be
maintained. Submitting less than 4 passing quarterly reports may lead to a non-compliance.
WHAT INFORMATION DO I NEED TO GATHER?

       ‱ Obtain a list of all Internet-facing Internet Protocol (IP) addresses and/or ranges. This must
         include all network components and devices that are involved in e-commerce transactions or retail
         transactions that use IP to transmit data over the Internet. This typically includes any routers,
         firewalls, load balancers, etc.
       ‱ If domain-based virtual hosting is employed, obtain a list of all domains to be scanned (For
         example if you have a number of hosted websites)
       ‱   If you have an IPS /IDS deployed then this must be set to allow testing traffic from the ASV to pass
           unrestricted.

The responsibility is on the merchant to provide this info to the ASV. If a breach takes place through neglect of
providing the correct or full range of required addresses/hosts then this liability will be down to the Merchant.

HOW CAN NETTITUDE HELP?

   ‱   Timely Service - Nettitude works closely with its customers to provide a helpful and timely service for
       ASV scanning. Work can be scheduled quickly and remediation assistance and re-scans provided where
       needed.
   ‱   Personal Service - Nettitude not only offers the required scanning services but also provides a hands
       on, personal approach to the testing.
   ‱   Professional Service - Very often first scans will result in a wide range of issues that need to be
       addressed. Remediation advice is contained in all Nettitude’s reports but you will also have direct
       access to the security consultant who oversaw your scan and produced your report.
   ‱   Thorough Service - During scanning if Nettitude comes across active IP addresses that were not
       originally provided by the customer, we will consult with the customer to determine if these IP
       addresses should be included.
   ‱   Qualified Service - Nettitude will then scan the provided list of active IP addresses and/or domains for
       known vulnerabilities and configuration issues and produce a report detailing the finding, PCI results
       and remediation advice.
   ‱   Complete Service - ASV scanning is only one small part of the whole PCI process to which Nettitude is
       very committed. You will be assured of qualified, professional, timely assistance with a personal
       approach to your needs.

INTERNAL SCANNING

Nettitude is also well placed to assist with internal scanning. This can be achieved though on site audits if
required or can be completed by internal staff if appropriately qualified. Nettitude can assist with advice,
installation of technologies and support of PCI approved scanning tools to assist with this task.

For further information please speak to your Account Manager, or contact Nettitude direct using the details
below:




              Nettitude Ltd, 1 Athena Court, Athena Drive, Tachbrook Park, Leamington Spa, CV34 6RT
                   : +44 (0) 870 3500075       : solutions@nettitude.com     : www.nettitude.com

Weitere Àhnliche Inhalte

Was ist angesagt?

NPC Support
NPC SupportNPC Support
NPC Support
Bobby James
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
doughold
 

Was ist angesagt? (20)

Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
 
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNowMeasuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
 
NPC Support
NPC SupportNPC Support
NPC Support
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
 
Large scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas HohnLarge scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas Hohn
 
vServe24/7 brochure
vServe24/7 brochurevServe24/7 brochure
vServe24/7 brochure
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
doinell.bautista
doinell.bautistadoinell.bautista
doinell.bautista
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 

Andere mochten auch (11)

DSS for a hospital chain
DSS for a hospital chainDSS for a hospital chain
DSS for a hospital chain
 
GDSS
GDSSGDSS
GDSS
 
Group decision support systems (gdss)
Group decision support systems (gdss)Group decision support systems (gdss)
Group decision support systems (gdss)
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Topic 8 expert system
Topic 8 expert systemTopic 8 expert system
Topic 8 expert system
 
6.expert systems
6.expert systems6.expert systems
6.expert systems
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Gdss gss and workgroups
Gdss gss and workgroupsGdss gss and workgroups
Gdss gss and workgroups
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

Ähnlich wie PCI DSS ASV Scanning from Nettitude

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
nerdsonsite
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
Gabrielle Curtis
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
Bryan Ferrario
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
Cybera Inc
 

Ähnlich wie PCI DSS ASV Scanning from Nettitude (20)

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
Jaxxon consulting presentation
Jaxxon consulting presentationJaxxon consulting presentation
Jaxxon consulting presentation
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 
Asapcom Brochure
Asapcom BrochureAsapcom Brochure
Asapcom Brochure
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 

KĂŒrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

KĂŒrzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

PCI DSS ASV Scanning from Nettitude

  • 1. Excellence as Standard How Nettitude can help with your PCI DSS ASV Vulnerability Scanning: Vulnerability scanning is a key component within the PCI Data Security Standard. A malicious attack will very often begin with a gentle and often remote probe of the security posture of an organisation. The publically available perimeter of an organisation is by its nature potentially open to all kinds of sources of attacks. This can then be the entry point for a full blown assault upon your network and/or data. A strong security posture may change at any time as new vulnerabilities in operating systems are uncovered, or when unchecked changes are implemented or even when a combination of a number of factors reveal an unknown weakness that has existed all along. The purpose of a Vulnerability Assessment is to be confidant on a regular basis that your systems and infrastructure is well configured, well patched and well designed to prevent malicious attackers from having an opportunity. Nettitude is qualified as an Approved Scanning Vendor (ASV) to perform these Vulnerability Assessments. WHAT DO THE PCI SECURITY STANDARDS COUNCIL SAY? PCI DSS requires that if you transmit, process or store Card Holder Data then some form of Vulnerability Scan will most probably need to be completed. Your Acquiring Bank/Payment Brands will advise you accordingly. The requirement is found is Section 11 of the PCI DSS and consists of the following statement: 11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). HOW DO I PERFORM EXTERNAL SCANNING? The external scanning must be performed by an Approved Scanning Vendor (ASV) who has been authorised and approved by the Security Standards Council (SSC). This accreditation is renewed each year and a list of ASV’s published on the Councils website at: https://www.pcisecuritystandards.org/pdfs/asv_report.html This scanning must be done every quarter and the reports will need to be submitted to your Acquiring Bank/Card Brand along with your relevant Self Assessment Questionnaires (SAQ) or QSA Reports on Compliance (ROC). The report that you submit must come back with a clean passing result. It is essential that any vulnerabilities that result in a failure are dealt with and rectified immediately so that a set of clean reports can be maintained. Submitting less than 4 passing quarterly reports may lead to a non-compliance.
  • 2. WHAT INFORMATION DO I NEED TO GATHER? ‱ Obtain a list of all Internet-facing Internet Protocol (IP) addresses and/or ranges. This must include all network components and devices that are involved in e-commerce transactions or retail transactions that use IP to transmit data over the Internet. This typically includes any routers, firewalls, load balancers, etc. ‱ If domain-based virtual hosting is employed, obtain a list of all domains to be scanned (For example if you have a number of hosted websites) ‱ If you have an IPS /IDS deployed then this must be set to allow testing traffic from the ASV to pass unrestricted. The responsibility is on the merchant to provide this info to the ASV. If a breach takes place through neglect of providing the correct or full range of required addresses/hosts then this liability will be down to the Merchant. HOW CAN NETTITUDE HELP? ‱ Timely Service - Nettitude works closely with its customers to provide a helpful and timely service for ASV scanning. Work can be scheduled quickly and remediation assistance and re-scans provided where needed. ‱ Personal Service - Nettitude not only offers the required scanning services but also provides a hands on, personal approach to the testing. ‱ Professional Service - Very often first scans will result in a wide range of issues that need to be addressed. Remediation advice is contained in all Nettitude’s reports but you will also have direct access to the security consultant who oversaw your scan and produced your report. ‱ Thorough Service - During scanning if Nettitude comes across active IP addresses that were not originally provided by the customer, we will consult with the customer to determine if these IP addresses should be included. ‱ Qualified Service - Nettitude will then scan the provided list of active IP addresses and/or domains for known vulnerabilities and configuration issues and produce a report detailing the finding, PCI results and remediation advice. ‱ Complete Service - ASV scanning is only one small part of the whole PCI process to which Nettitude is very committed. You will be assured of qualified, professional, timely assistance with a personal approach to your needs. INTERNAL SCANNING Nettitude is also well placed to assist with internal scanning. This can be achieved though on site audits if required or can be completed by internal staff if appropriately qualified. Nettitude can assist with advice, installation of technologies and support of PCI approved scanning tools to assist with this task. For further information please speak to your Account Manager, or contact Nettitude direct using the details below: Nettitude Ltd, 1 Athena Court, Athena Drive, Tachbrook Park, Leamington Spa, CV34 6RT : +44 (0) 870 3500075 : solutions@nettitude.com : www.nettitude.com