Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

TransUnion Hong Kong steps up security

Zafar Anjum | March 14, 2012
Turns to LogRhythm to manage insider threats.

TransUnion, Hong Kong's only credit reference agency, has announced that it has deployed LogRhythm's log management solution to help improve the security of its IT operations.

TransUnion said that it is using LogRhythm to monitor user activity on its network, ensuring unauthorised employees cannot access confidential customer information and that IT administrators do not abuse their access privileges.

TransUnion Hong Kong serves about 99 member companies, helping more than 4.3 million consumers understand their credit ratings. 

"TransUnion is entrusted with an enormous amount of valuable consumer information, and our reputation is staked on our ability to keep it safe," said Johnny Wong, IT manager of TransUnion Hong Kong. "LogRhythm's power to both identify and remediate unauthorised user activity plays a critical role in securing this data".

Critically important to TransUnion Hong Kong is LogRhythm's ability to independently and automatically capture and act upon log data associated with administrator activity, LogRhythm said in a statement. LogRhythm said its solution can automatically access privileged user log data without relying on the user itself for collection, and also provides an encrypted digital chain-of-custody that makes it impossible for administrators to tamper with records or hide unauthorised activity.  Besides, LogRhythm's Intelligent IT Search can instantly run user-level investigations to identify behaviour-based patterns.

"With high profile hacking collectives making the headlines on a seemingly daily basis, it's sometimes easy for businesses to overlook the threat posed from within," said David Cheng, general manager Asia Pacific at LogRhythm. "All organisations must take extra care to keep their own houses in order, preventing all unauthorised personnel from accessing confidential data, whether it be a rogue employee trying to steal information for financial gain, or simply a member of staff who innocently stumbled across files by mistake."


Sign up for Computerworld eNewsletters.