With current PCIrequirements that are not easily met using PCAnywhere, STCR suggests that youupgrade to LogMeIn for ease of use and ease of complying with PCI remote accessrequirements. STCR's help desk will handle the individual users' loginsetup, distribution and changes, which will allow each remote user to have toindividual access therefore complying with another of the PCI requirements.
From the LogMeIn website help files regarding PCI:
Is LogMeIncompliant with PCI standards?
LogMeIn understands that security and adherence to PCI requirements arecritical, and we fully support our customers’ policies for ensuring theiradherence to PCI-DSS compliance.
Our remote connectivity services only maintains limited session data associatedwith remote computers and does not retain or store any information, includingany credit card data, from remote computers or any information transferredduring a remote access session. Additionally, we protect all informationtransmitted with full, end-to-end 256-bit SSL encryption, the same encryptionmethod endorsed by MasterCard, Visa and American Express. We also support PCIcompliance with centralized user management, two-factor authentication forstrong access control measures, and maintain secure physical and networksecurity, with ongoing security monitoring & testing.
From the LogMeIn website help files regarding PCI:
Is LogMeIncompliant with PCI standards?
LogMeIn understands that security and adherence to PCI requirements arecritical, and we fully support our customers’ policies for ensuring theiradherence to PCI-DSS compliance.
Our remote connectivity services only maintains limited session data associatedwith remote computers and does not retain or store any information, includingany credit card data, from remote computers or any information transferredduring a remote access session. Additionally, we protect all informationtransmitted with full, end-to-end 256-bit SSL encryption, the same encryptionmethod endorsed by MasterCard, Visa and American Express. We also support PCIcompliance with centralized user management, two-factor authentication forstrong access control measures, and maintain secure physical and networksecurity, with ongoing security monitoring & testing.