How long does a PCI compliance scan take?

How long does a PCI compliance scan take?

What if the most critical question about your security posture is also the most misunderstood? Many business leaders assume that a compliance check is a quick, one-time event. The reality of protecting cardholder data is far more complex and continuous.

How long does a PCI compliance scan take?

We understand that organizations need clear timelines for operational planning. The actual duration of a vulnerability assessment is not a simple answer. It depends heavily on your network complexity, business size, and transaction volume.

This process is a cornerstone of a robust data security strategy. While the technical scan itself may be relatively swift, achieving full compliance involves a comprehensive, ongoing effort. We aim to demystify this timeline and provide authoritative guidance.

Our goal is to help you establish realistic expectations. This allows for effective resource allocation and seamless coordination with Approved Scanning Vendors (ASVs). Proper preparation is key to minimizing disruption and maintaining continuous protection.

Key Takeaways

  • The duration of a security scan varies significantly based on organizational factors.
  • Network complexity and business size are primary determinants of scan time.
  • Full Payment Card Industry Data Security Standard (PCI DSS) compliance is a multi-phase process.
  • Proper preparation of your IT environment can optimize the scanning procedure.
  • Understanding the timeline helps in planning quarterly vulnerability assessments effectively.
  • Collaboration with an Approved Scanning Vendor (ASV) is essential for accurate results.
  • The ultimate goal is continuous protection of sensitive payment information.

Understanding PCI Compliance and Vulnerability Scanning

At the core of every robust payment security strategy lies a dual focus on regulatory compliance and systematic vulnerability detection. We guide organizations through this essential pairing to establish comprehensive protection frameworks.

Overview of the PCI DSS Framework

The Payment Card Industry Data Security Standard represents a unified security framework developed by major payment card brands. This comprehensive set of standards protects sensitive payment information throughout the entire transaction lifecycle.

Established by the PCI Security Standards Council, the framework encompasses twelve core requirements organized into six logical groups. These requirements create a structured approach to securing cardholder data environments.

The Role of Vulnerability Scanning in Data Security

Vulnerability scanning serves as a critical component within the broader PCI DSS compliance program. This proactive security measure systematically examines network infrastructure and applications to identify potential weaknesses.

Regular assessment helps organizations detect configuration errors, missing patches, and security flaws before exploitation. The process aligns with Requirement 11.3 of the data security standard, mandating quarterly scans and assessments after significant network changes.

PCI DSS Requirement Category Security Objective Vulnerability Scanning Focus
Build and Maintain Secure Networks Firewall protection and system configurations Network perimeter and access points
Protect Cardholder Data Encryption and data storage security Data transmission and storage systems
Maintain Vulnerability Management Regular security updates and patches System vulnerabilities and patch levels
Implement Access Control Measures User authentication and authorization Access control configurations

This systematic approach ensures organizations maintain continuous protection against evolving threats in the payment card industry.

How long does a PCI compliance scan take?

Establishing realistic timeframes for security assessments requires understanding the distinction between technical scanning and comprehensive compliance. Many organizations focus solely on the active scanning period while overlooking the broader validation process.

The technical vulnerability scan typically completes within 30 to 90 minutes under optimal conditions. However, queue position with your scanning vendor and system readiness can extend this timeframe significantly.

Smaller businesses with straightforward network configurations may see assessments conclude in hours. Larger enterprises with complex payment environments often require several days for thorough examination.

We emphasize that achieving full PCI DSS compliance represents a multi-month journey encompassing all twelve requirements. The actual scanning represents just one component of this comprehensive process.

Strategic preparation before the formal assessment can dramatically reduce effective scanning time. Organizations that maintain current patches and proper configurations achieve passing results more efficiently.

Many companies now automate their compliance processes, cutting overall timeline by more than 50%. This approach streamlines quarterly vulnerability scans once initial compliance is established.

Key Factors Influencing Scan Duration

The efficiency of vulnerability scanning operations depends on several interconnected business factors. We help organizations understand how specific operational characteristics impact assessment timelines.

Proper planning requires recognizing these key determinants. Each element contributes to the overall timeframe for security validation.

Impact of Network Complexity and Business Size

Network architecture represents a primary factor in scanning duration. Organizations with extensive infrastructures face longer assessment periods.

Business size correlates directly with scanning requirements. Larger enterprises maintain more systems and endpoints requiring examination.

We guide companies through capacity planning based on their specific infrastructure. This enables accurate timeline estimation for security assessments.

Effects of Transaction Volume and System Changes

Transaction volume determines your merchant level classification under the PCI DSS framework. This classification influences scanning complexity and frequency.

Level 1 merchants processing over 6 million annual transactions face rigorous protocols. Level 4 businesses with fewer than 20,000 transactions have simplified but essential obligations.

Significant system changes trigger mandatory vulnerability scans beyond quarterly schedules. These include infrastructure modifications and data environment alterations.

We emphasize that proactive planning helps organizations manage these factors effectively. Understanding your specific operational parameters establishes realistic expectations for security validation processes.

Preparing Your Environment for a Successful Scan

Proactive preparation is the cornerstone of an efficient and successful vulnerability assessment. We guide organizations through essential pre-scan activities that validate your security posture and streamline the entire PCI DSS compliance process. A well-prepared environment significantly reduces assessment duration and increases the likelihood of achieving passing results on the first attempt.

preparing environment for PCI scan

The initial step involves a comprehensive scoping exercise. You must identify all systems and network segments involved in storing, processing, or transmitting cardholder data. This creates a clear inventory, ensuring no critical component is overlooked during the scanning process.

Ensuring Up-to-Date Patches and Security Configurations

Systematic patch management serves as a foundational preparation activity. Outdated software and missing operating system updates are among the most common sources of vulnerabilities identified during scans.

We help implement processes for timely security updates across all relevant systems. Addressing these known issues beforehand eliminates flags that would otherwise result in compliance failures, protecting your data proactively.

Configuring Firewalls and Intrusion Prevention Systems

Proper configuration of perimeter defenses is critical. Firewalls and intrusion prevention systems must be tuned to allow access for the scanning vendor’s IP addresses while maintaining robust defenses against unauthorized entry.

This balance ensures the assessment can proceed without compromising your network security. Verifying these settings aligns with specific PCI DSS requirements for access control and information protection.

Preparation Activity Primary Security Focus Impact on Scan Efficiency
Environment Scoping Identifying all cardholder data touchpoints Ensures complete assessment coverage
Patch Management Eliminating known software vulnerabilities Reduces findings requiring remediation
Firewall Configuration Balancing security with scanner access Prevents scan failures due to blocked access

This structured approach transforms the scanning process into a validation of your ongoing commitment to protecting sensitive information.

Implementing a Robust PCI DSS Scan Process

Implementing effective PCI DSS scanning processes involves coordinating multiple assessment types with specialized vendors. We help organizations establish comprehensive vulnerability management programs that address both internal and external security threats.

These systematic approaches transform technical scanning into strategic security initiatives. Proper implementation ensures continuous compliance with industry standards.

Differences Between Internal and External Scans

Internal and external vulnerability assessments serve distinct protective functions. External scanning examines publicly accessible systems from outside your network perimeter.

Internal assessment focuses on systems behind firewalls within your cardholder data environment. Each scan type identifies different categories of security weaknesses.

Scan Type Primary Focus Area Personnel Requirements
External Vulnerability Scan Public-facing IP addresses and network perimeters PCI SSC Approved Scanning Vendor (ASV)
Internal Vulnerability Scan Systems behind firewalls processing cardholder data Qualified internal staff or separate ASV

Engaging Approved Scanning Vendors (ASVs)

Engaging qualified ASVs provides access to specialized expertise and advanced scanning technologies. These vendors perform remote assessments using intelligent web vulnerability scanners.

We emphasize the importance of separation of duties between internal and external scanning providers. This ensures objective assessment perspectives throughout your compliance journey.

Successful vendor partnerships establish clear communication protocols for reporting and remediation. These relationships transform scanning from isolated events into integrated security programs.

Common Challenges and Remediation Strategies

Even with thorough preparation, organizations often encounter security gaps during vulnerability assessments that require strategic remediation. We help businesses navigate these challenges with systematic approaches that address both immediate findings and long-term security improvements.

PCI vulnerability remediation strategies

Identifying and Addressing Vulnerabilities

Vulnerability scan reports provide detailed documentation of security weaknesses requiring attention. These comprehensive documents include severity ratings, affected systems, and specific remediation guidance.

Common findings often include outdated software, missing patches, and insecure configurations. We guide businesses in establishing prioritized correction strategies that address critical risks first.

Formal vulnerability management processes ensure systematic tracking from detection through resolution. This approach provides necessary documentation for audit requirements and compliance validation.

Managing Failed Scan Outcomes and Corrective Actions

Failed assessment results represent significant business risks beyond mere compliance concerns. Financial penalties, processing restrictions, and increased scrutiny may follow unsuccessful scans.

The rescanning process allows validation of remediation efforts once corrections are complete. Approved Scanning Vendors conduct follow-up assessments to confirm vulnerability elimination.

We emphasize that businesses can contest results through formal exception processes when appropriate. However, such exceptions require thorough documentation and justification to demonstrate adequate risk mitigation.

Proactive security management extending beyond minimum PCI DSS requirements helps organizations avoid these scenarios. This approach reduces remediation cycles and protects against severe consequences including legal liability and reputational damage.

Strategies to Optimize Scan Time and Efficiency

Strategic timing transforms vulnerability scanning from an operational burden into a seamless security validation. We help organizations implement intelligent scheduling approaches that maintain compliance without disrupting critical business operations.

Proper planning ensures your payment systems continue processing card transactions smoothly during assessment periods. This balanced approach protects both security and business continuity.

Scheduling Scans to Minimize Business Disruption

Automation platforms revolutionize the PCI DSS compliance process. These tools reduce manual effort by more than 50% through continuous monitoring and evidence collection.

We recommend scheduling assessments during maintenance windows or low-traffic periods. This strategy minimizes performance impacts on systems handling customer transactions.

Multi-location businesses require coordinated scanning across all sites. Each location must complete quarterly assessments and submit documentation by established deadlines.

Partnering with experienced vendors ensures efficient execution and faster remediation cycles. These relationships support both security objectives and operational efficiency for your company.

Conclusion

Ultimately, successful payment card protection represents a continuous commitment rather than periodic compliance checks. We have examined how proper preparation and strategic implementation transform vulnerability scan activities from operational burdens into valuable security validations.

The benefits extend far beyond meeting PCI DSS requirements. Regular assessments provide critical visibility into potential weaknesses, enabling businesses to protect customer information proactively. This approach demonstrates serious commitment to data protection.

We encourage organizations to view security as an integral part of business operations. By establishing mature vulnerability scan processes, businesses safeguard not only cardholder data but also customer trust and brand reputation.

This comprehensive approach to payment security creates lasting value beyond minimum standards. It positions forward-thinking organizations for sustained success in an evolving threat landscape.

FAQ

What is the typical timeframe for a PCI DSS vulnerability scan?

The duration varies significantly based on network size and complexity. A standard external scan for a small to medium-sized business often completes within 2 to 4 hours. Larger enterprise environments with extensive infrastructure can require 24 to 48 hours or more for a comprehensive assessment.

How does the Payment Card Industry Data Security Standard (PCI DSS) impact our scanning requirements?

The PCI DSS framework mandates quarterly external vulnerability scans by an Approved Scanning Vendor (ASV) and internal scans for all systems in the cardholder data environment. These requirements are essential for validating that your security controls effectively protect sensitive payment card information.

What factors most influence the length of a PCI compliance scan?

Key factors include the number of internet-facing Internet Protocol (IP) addresses, network segmentation effectiveness, system types, and the volume of card transactions processed. Recent infrastructure changes can also extend scanning time as new assets require assessment.

Can we perform our own PCI compliance scans internally?

While internal scans are a requirement, external scans must be conducted by a PCI SSC-approved ASV to validate compliance. Internal scans help identify vulnerabilities, but only an ASV can provide the official attestation of compliance required by payment card brands.

What happens if our initial PCI scan fails?

A failed scan indicates identified vulnerabilities that must be remediated. You will receive a detailed report from the ASV outlining the issues. After applying patches or configuration changes, a re-scan is necessary to confirm the vulnerabilities are resolved and to achieve a passing status.

How can we prepare our systems to ensure a faster, successful scan?

Proactive preparation is crucial. Ensure all systems have up-to-date security patches, configure firewalls to allow scanning traffic, and maintain accurate network documentation. A well-prepared environment reduces scan time and increases the likelihood of a passing result on the first attempt.

What if the most critical question about your security posture is also the most misunderstood? Many business leaders assume that a compliance check is a quick, one-time event. The reality of protecting cardholder data is far more complex and continuous.

How long does a PCI compliance scan take?

We understand that organizations need clear timelines for operational planning. The actual duration of a vulnerability assessment is not a simple answer. It depends heavily on your network complexity, business size, and transaction volume.

This process is a cornerstone of a robust data security strategy. While the technical scan itself may be relatively swift, achieving full compliance involves a comprehensive, ongoing effort. We aim to demystify this timeline and provide authoritative guidance.

Our goal is to help you establish realistic expectations. This allows for effective resource allocation and seamless coordination with Approved Scanning Vendors (ASVs). Proper preparation is key to minimizing disruption and maintaining continuous protection.

Key Takeaways

  • The duration of a security scan varies significantly based on organizational factors.
  • Network complexity and business size are primary determinants of scan time.
  • Full Payment Card Industry Data Security Standard (PCI DSS) compliance is a multi-phase process.
  • Proper preparation of your IT environment can optimize the scanning procedure.
  • Understanding the timeline helps in planning quarterly vulnerability assessments effectively.
  • Collaboration with an Approved Scanning Vendor (ASV) is essential for accurate results.
  • The ultimate goal is continuous protection of sensitive payment information.

Understanding PCI Compliance and Vulnerability Scanning

At the core of every robust payment security strategy lies a dual focus on regulatory compliance and systematic vulnerability detection. We guide organizations through this essential pairing to establish comprehensive protection frameworks.

Overview of the PCI DSS Framework

The Payment Card Industry Data Security Standard represents a unified security framework developed by major payment card brands. This comprehensive set of standards protects sensitive payment information throughout the entire transaction lifecycle.

Established by the PCI Security Standards Council, the framework encompasses twelve core requirements organized into six logical groups. These requirements create a structured approach to securing cardholder data environments.

The Role of Vulnerability Scanning in Data Security

Vulnerability scanning serves as a critical component within the broader PCI DSS compliance program. This proactive security measure systematically examines network infrastructure and applications to identify potential weaknesses.

Regular assessment helps organizations detect configuration errors, missing patches, and security flaws before exploitation. The process aligns with Requirement 11.3 of the data security standard, mandating quarterly scans and assessments after significant network changes.

PCI DSS Requirement Category Security Objective Vulnerability Scanning Focus
Build and Maintain Secure Networks Firewall protection and system configurations Network perimeter and access points
Protect Cardholder Data Encryption and data storage security Data transmission and storage systems
Maintain Vulnerability Management Regular security updates and patches System vulnerabilities and patch levels
Implement Access Control Measures User authentication and authorization Access control configurations

This systematic approach ensures organizations maintain continuous protection against evolving threats in the payment card industry.

How long does a PCI compliance scan take?

Establishing realistic timeframes for security assessments requires understanding the distinction between technical scanning and comprehensive compliance. Many organizations focus solely on the active scanning period while overlooking the broader validation process.

The technical vulnerability scan typically completes within 30 to 90 minutes under optimal conditions. However, queue position with your scanning vendor and system readiness can extend this timeframe significantly.

Smaller businesses with straightforward network configurations may see assessments conclude in hours. Larger enterprises with complex payment environments often require several days for thorough examination.

We emphasize that achieving full PCI DSS compliance represents a multi-month journey encompassing all twelve requirements. The actual scanning represents just one component of this comprehensive process.

Strategic preparation before the formal assessment can dramatically reduce effective scanning time. Organizations that maintain current patches and proper configurations achieve passing results more efficiently.

Many companies now automate their compliance processes, cutting overall timeline by more than 50%. This approach streamlines quarterly vulnerability scans once initial compliance is established.

Key Factors Influencing Scan Duration

The efficiency of vulnerability scanning operations depends on several interconnected business factors. We help organizations understand how specific operational characteristics impact assessment timelines.

Proper planning requires recognizing these key determinants. Each element contributes to the overall timeframe for security validation.

Impact of Network Complexity and Business Size

Network architecture represents a primary factor in scanning duration. Organizations with extensive infrastructures face longer assessment periods.

Business size correlates directly with scanning requirements. Larger enterprises maintain more systems and endpoints requiring examination.

We guide companies through capacity planning based on their specific infrastructure. This enables accurate timeline estimation for security assessments.

Effects of Transaction Volume and System Changes

Transaction volume determines your merchant level classification under the PCI DSS framework. This classification influences scanning complexity and frequency.

Level 1 merchants processing over 6 million annual transactions face rigorous protocols. Level 4 businesses with fewer than 20,000 transactions have simplified but essential obligations.

Significant system changes trigger mandatory vulnerability scans beyond quarterly schedules. These include infrastructure modifications and data environment alterations.

We emphasize that proactive planning helps organizations manage these factors effectively. Understanding your specific operational parameters establishes realistic expectations for security validation processes.

Preparing Your Environment for a Successful Scan

Proactive preparation is the cornerstone of an efficient and successful vulnerability assessment. We guide organizations through essential pre-scan activities that validate your security posture and streamline the entire PCI DSS compliance process. A well-prepared environment significantly reduces assessment duration and increases the likelihood of achieving passing results on the first attempt.

preparing environment for PCI scan

The initial step involves a comprehensive scoping exercise. You must identify all systems and network segments involved in storing, processing, or transmitting cardholder data. This creates a clear inventory, ensuring no critical component is overlooked during the scanning process.

Ensuring Up-to-Date Patches and Security Configurations

Systematic patch management serves as a foundational preparation activity. Outdated software and missing operating system updates are among the most common sources of vulnerabilities identified during scans.

We help implement processes for timely security updates across all relevant systems. Addressing these known issues beforehand eliminates flags that would otherwise result in compliance failures, protecting your data proactively.

Configuring Firewalls and Intrusion Prevention Systems

Proper configuration of perimeter defenses is critical. Firewalls and intrusion prevention systems must be tuned to allow access for the scanning vendor’s IP addresses while maintaining robust defenses against unauthorized entry.

This balance ensures the assessment can proceed without compromising your network security. Verifying these settings aligns with specific PCI DSS requirements for access control and information protection.

Preparation Activity Primary Security Focus Impact on Scan Efficiency
Environment Scoping Identifying all cardholder data touchpoints Ensures complete assessment coverage
Patch Management Eliminating known software vulnerabilities Reduces findings requiring remediation
Firewall Configuration Balancing security with scanner access Prevents scan failures due to blocked access

This structured approach transforms the scanning process into a validation of your ongoing commitment to protecting sensitive information.

Implementing a Robust PCI DSS Scan Process

Implementing effective PCI DSS scanning processes involves coordinating multiple assessment types with specialized vendors. We help organizations establish comprehensive vulnerability management programs that address both internal and external security threats.

These systematic approaches transform technical scanning into strategic security initiatives. Proper implementation ensures continuous compliance with industry standards.

Differences Between Internal and External Scans

Internal and external vulnerability assessments serve distinct protective functions. External scanning examines publicly accessible systems from outside your network perimeter.

Internal assessment focuses on systems behind firewalls within your cardholder data environment. Each scan type identifies different categories of security weaknesses.

Scan Type Primary Focus Area Personnel Requirements
External Vulnerability Scan Public-facing IP addresses and network perimeters PCI SSC Approved Scanning Vendor (ASV)
Internal Vulnerability Scan Systems behind firewalls processing cardholder data Qualified internal staff or separate ASV

Engaging Approved Scanning Vendors (ASVs)

Engaging qualified ASVs provides access to specialized expertise and advanced scanning technologies. These vendors perform remote assessments using intelligent web vulnerability scanners.

We emphasize the importance of separation of duties between internal and external scanning providers. This ensures objective assessment perspectives throughout your compliance journey.

Successful vendor partnerships establish clear communication protocols for reporting and remediation. These relationships transform scanning from isolated events into integrated security programs.

Common Challenges and Remediation Strategies

Even with thorough preparation, organizations often encounter security gaps during vulnerability assessments that require strategic remediation. We help businesses navigate these challenges with systematic approaches that address both immediate findings and long-term security improvements.

PCI vulnerability remediation strategies

Identifying and Addressing Vulnerabilities

Vulnerability scan reports provide detailed documentation of security weaknesses requiring attention. These comprehensive documents include severity ratings, affected systems, and specific remediation guidance.

Common findings often include outdated software, missing patches, and insecure configurations. We guide businesses in establishing prioritized correction strategies that address critical risks first.

Formal vulnerability management processes ensure systematic tracking from detection through resolution. This approach provides necessary documentation for audit requirements and compliance validation.

Managing Failed Scan Outcomes and Corrective Actions

Failed assessment results represent significant business risks beyond mere compliance concerns. Financial penalties, processing restrictions, and increased scrutiny may follow unsuccessful scans.

The rescanning process allows validation of remediation efforts once corrections are complete. Approved Scanning Vendors conduct follow-up assessments to confirm vulnerability elimination.

We emphasize that businesses can contest results through formal exception processes when appropriate. However, such exceptions require thorough documentation and justification to demonstrate adequate risk mitigation.

Proactive security management extending beyond minimum PCI DSS requirements helps organizations avoid these scenarios. This approach reduces remediation cycles and protects against severe consequences including legal liability and reputational damage.

Strategies to Optimize Scan Time and Efficiency

Strategic timing transforms vulnerability scanning from an operational burden into a seamless security validation. We help organizations implement intelligent scheduling approaches that maintain compliance without disrupting critical business operations.

Proper planning ensures your payment systems continue processing card transactions smoothly during assessment periods. This balanced approach protects both security and business continuity.

Scheduling Scans to Minimize Business Disruption

Automation platforms revolutionize the PCI DSS compliance process. These tools reduce manual effort by more than 50% through continuous monitoring and evidence collection.

We recommend scheduling assessments during maintenance windows or low-traffic periods. This strategy minimizes performance impacts on systems handling customer transactions.

Multi-location businesses require coordinated scanning across all sites. Each location must complete quarterly assessments and submit documentation by established deadlines.

Partnering with experienced vendors ensures efficient execution and faster remediation cycles. These relationships support both security objectives and operational efficiency for your company.

Conclusion

Ultimately, successful payment card protection represents a continuous commitment rather than periodic compliance checks. We have examined how proper preparation and strategic implementation transform vulnerability scan activities from operational burdens into valuable security validations.

The benefits extend far beyond meeting PCI DSS requirements. Regular assessments provide critical visibility into potential weaknesses, enabling businesses to protect customer information proactively. This approach demonstrates serious commitment to data protection.

We encourage organizations to view security as an integral part of business operations. By establishing mature vulnerability scan processes, businesses safeguard not only cardholder data but also customer trust and brand reputation.

This comprehensive approach to payment security creates lasting value beyond minimum standards. It positions forward-thinking organizations for sustained success in an evolving threat landscape.

FAQ

What is the typical timeframe for a PCI DSS vulnerability scan?

The duration varies significantly based on network size and complexity. A standard external scan for a small to medium-sized business often completes within 2 to 4 hours. Larger enterprise environments with extensive infrastructure can require 24 to 48 hours or more for a comprehensive assessment.

How does the Payment Card Industry Data Security Standard (PCI DSS) impact our scanning requirements?

The PCI DSS framework mandates quarterly external vulnerability scans by an Approved Scanning Vendor (ASV) and internal scans for all systems in the cardholder data environment. These requirements are essential for validating that your security controls effectively protect sensitive payment card information.

What factors most influence the length of a PCI compliance scan?

Key factors include the number of internet-facing Internet Protocol (IP) addresses, network segmentation effectiveness, system types, and the volume of card transactions processed. Recent infrastructure changes can also extend scanning time as new assets require assessment.

Can we perform our own PCI compliance scans internally?

While internal scans are a requirement, external scans must be conducted by a PCI SSC-approved ASV to validate compliance. Internal scans help identify vulnerabilities, but only an ASV can provide the official attestation of compliance required by payment card brands.

What happens if our initial PCI scan fails?

A failed scan indicates identified vulnerabilities that must be remediated. You will receive a detailed report from the ASV outlining the issues. After applying patches or configuration changes, a re-scan is necessary to confirm the vulnerabilities are resolved and to achieve a passing status.

How can we prepare our systems to ensure a faster, successful scan?

Proactive preparation is crucial. Ensure all systems have up-to-date security patches, configure firewalls to allow scanning traffic, and maintain accurate network documentation. A well-prepared environment reduces scan time and increases the likelihood of a passing result on the first attempt.

Ready to Simplify Your Security?

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.