Case Studies

Durham County Council chooses LogPoint to reduce costs

LogPoint's SIEM tool will also help the organisation deal with increasing IT demands

Durham County Council has implemented LogPoint's Security Information and Event Management (SIEM) tool to analyse threats in real time, while halving operational costs.

The council needed to ensure it complied with regulations, especially the NHS Information Governance Toolkit, Payment Card Industry (PCI) and BACS, ensuring customer data was protected, whatever happened.

To ensure the security solution could deal with a rapidly growing council, Durham County Council required a solution that was highly scalable, but also had the functionality of its legacy platform.

"The council's previous SIEM had a recurring issue with data loss," Graeme Stewart, managing director of LogPoint UK & Ireland, explained.

"By implementing updated SIEM technology, Durham County Council has been able to resolve the issue, which enables them to stay compliant with the many regulations they must adhere too. LogPoint's mission is also to make the benefits of SIEM felt beyond just compliance.

"Durham has been able to halve operational costs and can now facilitate new and easier ways of loading data logs. We look forward to supporting Durham County Council and continuing to drive efficiencies across the organisation into the future."

The council now has plans to roll out the solution to more systems, on top of the original 143 devices currently configured. This means more departments will need access, but that's not a problem, according to LogPoint, as the tool that ensures as many people as required can access it, without putting data at risk.

"Access to our previous SIEM was restricted to only two members of the technical services team," states Paul Woods, information security officer at Durham County Council.

"By utilising SIEM from LogPoint we have been able to open the door for other ICT areas, including the ICT service desk. They are now able to perform their own searches and follow up virus alerts. We can also trace the viruses back to the originating PC and identifying the alert trigger thus containing any virus threats."

Featured Resources

Five lessons learned from the pivot to a distributed workforce

Delivering continuity and scale with a remote work strategy

Download now

Connected experiences in a digital transformation

Enable businesses to meet the demands of the future

Download now

Simplify to secure

Reduce complexity by integrating your security ecosystem

Download now

Enhance the safety and security of your people, assets and operations

Enable a true vision of security with an engineered solution based on hyperconverged and storage platforms

Download now

Recommended

'Largest ever' Magecart hack compromises 2,000 online stores
hacking

'Largest ever' Magecart hack compromises 2,000 online stores

15 Sep 2020
Infocyte integrates with Palo Alto Networks Cortex XSOAR
cyber security

Infocyte integrates with Palo Alto Networks Cortex XSOAR

19 Aug 2020
Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
University of California gets fleeced by hackers for $1.14 million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020

Most Popular

Google Pixel 4a review: A picture-perfect package
Google Android

Google Pixel 4a review: A picture-perfect package

18 Sep 2020
Accenture ploughs $3 billion into cloud migration support group
digital transformation

Accenture ploughs $3 billion into cloud migration support group

17 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020