Nov. 23, 2010
-- The Lowry, the prestigious arts centre based in Salford Quays, Greater Manchester has deployed a Payment Card Industry Data Security Standard (PCI: DSS) compliant Event Log Management Solution from IT and data security specialists Network Defence. The solution will allow The Lowry’s staff to closely monitor and log network access, helping the company meet PCI compliance guidelines and ensure customers’ data is secure.
To be PCI compliant companies are required to retain security log data for a year and store data online for a minimum of three months. The LogLogic solution, supplied and deployed by Network Defence, enables The Lowry to effectively collect and store activity logs from devices and servers, providing enhanced security to customers using The Lowry’s in-house ticket agency, Quaytickets.
With a robust method for collecting data logs, The Lowry is now able to meet PCI guidelines, protecting confidential customer information and avoiding substantial fines in the unlikely event of a data breach.
The solution, which also provides extensive reporting capabilities, was chosen for its simplicity, ease of use and minimal management requirement. This allows IT staff to redirect resources to other key areas of the business, increasing efficiency and saving costs.
Darren Mullin, IT Manager for The Lowry said: “Data security is a priority at The Lowry and this solution allows us to provide an additional layer of protection to customers using our services, as well as helping the centre to meet PCI compliance guidelines. LogLogic makes it easier for staff to identify potential network breaches, securing access to customers’ credit card details and confidential information.
“Network Defence has already helped The Lowry to ensure payment transactions are secure and reliable for all our customers. We required their expertise again to assist in the ongoing development of our network infrastructure to further enhance security at The Lowry.”
By continually monitoring network activity, LogLogic automatically identifies any attempt to compromise the network. It sends an instant alert to IT staff - accessible 24 hours a day - allowing them to deal with any potential breach immediately.