TMCnet News

Logicworks Launches PCI Compliance Cloud Solution
[September 21, 2010]

Logicworks Launches PCI Compliance Cloud Solution


Sep 21, 2010 (Close-Up Media via COMTEX) -- Logicworks, a provider of enterprise hosting and cloud solutions for high-availability applications and content, announced that it has received Level 1 Payment Card Industry (PCI) accreditation, the industry's highest level of certification, and is now offering an integrated hardware, software and professional services solution that enables customers to achieve complete PCI compliance in less time and at lower cost than ever before.



It's critical for companies that accept credit card payments to comply with PCI requirements, which cover 12 major categories, including encryption of credit-card data at the point-of-sale, during transmission to clearinghouses, and physical security of data centers where credit-card data are stored. Logicworks said its certification and solution addresses all 10 of the 10 requirements that a service provider can handle on behalf of a customer.

"We have leveraged our reputation for security, as well as our history and expertise working with customers to assemble the strongest PCI solution available," Kenneth Ziegler, Logicworks' president and COO. "This offering has the potential to transform compliance initiatives for mid-market retail, healthcare and financial services customers, allowing them to jump ahead of evolving compliance standards." The certification applies to Logicworks' entire network, hardware and security infrastructure and will be renewed annually by Trustwave who performs thousands of PCI audits annually including half the Fortune 500. In addition, Logicworks has teamed with Alert Logic and SpiderLabs to perform independent network scanning and security penetration testing of its infrastructure on a quarterly basis.


The Logicworks PCI solution covers both the on-boarding process, which includes the design and building of a PCI-compliant environment, as well as the ongoing maintenance process, which includes log review and management, vulnerability testing, intrusion detection and change management procedures.

((Comments on this story may be sent to [email protected]))

[ Back To TMCnet.com's Homepage ]