TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Case Studies

PCI complying

by Mark Rowe

SPIELO G2 (www.spielog2.com ) a service provider to the iGaming and sports betting sector announced a relationship with IT managed security services and anti-web scraping company Sentor (www.sentor.se )

Sentor has been selected to ensure that SPIELO G2โ€™s products are PCI compliant, by providing consultancy and IT security services. Cristian Brolin, Head of Data Centre Services at Spielo G2 said: โ€œThe requirements of PCI are there to improve security around the handling of credit cards for consumers in online transactions, but the amount of work needed for online businesses to implement and maintain compliance with the requirements can be immense. It made sense that we use specialists in this field. We have found the advice, guidance and the actual technical implementation that Sentor provides as a QSA (Qualified Security Assessor) has been invaluable. Sentor ensures that the systems we provide our iGaming and sports betting customers are of the highest quality and that from day one those businesses who use Spielo G2 solutions are protecting their customers and are fully PCI compliant. โ€œBy outsourcing security monitoring to a trusted third party, we are able to focus on our core business, whilst being assured that our clients get the best possible attention and security.โ€

About PCI Compliance

Briefly, the PCI Data Security Standard is a US-based security payment card industry standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. The standard generally requires companies handling retail transactions with payment cards to: build and maintain a secure network; protect cardholder data; have access control; regularly monitor and test networks; and ensure information security policies.

Related News

  • Case Studies

    AI round-up

    by Mark Rowe

    A stream of thousands of alerts from fragmented tools and disconnected data sources, and limited staff and resources, means cyber and info-security…

  • Case Studies

    Westminster After Dark

    by Mark Rowe

    Westminster City Council in central London has launched its first โ€˜Westminster After Darkโ€™ strategy. The document is out to consultation until June…