The Art of Compliance
We commissioned professional artists to create works of art inspired by PCI as a creative way to draw attention to the launch of Cisco Compliance Solution for PCI.
PCI Inspired Art
"Hacker" by Filip Yip
Transferring private and important data over the internet can expose users to the prying and hacking of ruthless cyber criminals. There is an urgent need for a comprehensive solution to secure the safe transmission of information from point A to B. This godsend will be the cavalier who fights hackers incessantly, and strives to slay the dragon who has been devouring the most valuable and vulnerable asset of all netizens.
"Opt in for Security" by Lance Jackson
As simple as clicking on a menu bar to take you to a new screen, a new place, it's a new way to gain security. I like the idea of a large simple silver menu bar. Opting in feels more positive than opting out, doesn't it? It is a digital world after all.
"Stack" by Lance Jackson
A stack of credit cards is complete tantalizing eye candy. Credit cars are American as apple pie and baseball. The bright pop-art colors are appropriately American. Knowing that the cards are secured wherever they are used is even more empowering.
"Secure Card" by Lance Jackson
Having your colorful, expressionistic, inner shopping self literally secured with chains and a lock says it all. You have the power to unlock it. No one else has that key.
"Network Neighborhood" by Sue Averell
While creating this painting I strove to combine my current theme of neighborhoods with that of data networks. It was important to me to be true to my style. Color and texture and an elevated view of the subject are some of the identifying characteristics of all my work.
"Secure Flight" by Randy South
The objective of the work is to show that despite the dangers of maintaining financial security, that freedom of commerce is still possible.
"THEY Don't Sleep at Night" by Larry Janoff
I visualize a hacker as a vicious creature. I thought it humorous to represent him as a weird, evil monster that is trying very hard to breach PCI Security, someone who never sleeps, day or night.
"Failed Breach" by Larry Janoff
I was raised before the computer era, so conceptualizing a breach in security brings to my mind "the olden tools" used by a thief in "the olden days". PCI is a difficult concept.
"Worldwide Data Safety System for CISCO" by Matt Foster
Since the subject is technical in nature, this project needed subtlety and a connection to human elements. The image was planned for a myriad of viewing possibilities and would also be viewed worldwide, it needed to illustrate the complex, layered concept of the product yet be simple.
I started with a dark background, adding a layer of semi-transparent red eyes representing the checks and balances of the program, and also doubling as "who else is looking" aspect. The lock is in the shape of the globe with the numbers being the security element. The keyhole is YOU-the user. The circle completes the world of secure data.
"Impenetrable Firewall" by Eric Thorsen
The sculpture of the fist attempting to break through the firewall, but being prevented from doing so illustrates the basic strength of the essential software called a firewall.
Personal computers and corporate computers alike require protection from predators, viruses and software created to gather such data for ill purposes such as stealing money, data, or personal identities.
"Information Lockdown" by Eric Thorsen
The credit card contained inside the lock illustrates how personal data can be withheld and protected from anyone not having the correct "key" or password. Restricting access to data with user ID's and passwords secure and lock doors where sensitive data is stored.
"Encrypted Data Crooks" by Nancy Nimoy
This piece is about Encrypted Data and the Bad Guys who steal it. When I thought of encrypted data, I thought of a human fingerprint and how it is literally a manifestation of what is inviolably unique about us. I thought, to depict one's interior and deeply personal DNA. To communicate how our uniqueness is so often diminished and violated and "stolen" these days, I used the universal symbol of Theft, the generic black-cloaked burglar. He lurks behind the scrim of a loosely drawn human profile, encroaching upon the imperfect water color of a human head with its fingerprint brain. Layers of my piece are deliberately transparent and overlapping to convey "intrusion".
A cacophony of numbers, letters, codes and secret passwords represent our pathetic defense against the onslaught of HTML bad guys trying to steal our encrypted data.
"Sanctuary" by Jerry Sprunger
The various components in this airbrushed painting serve to exhibit the security, service and reliability of Cisco's PCI solution.
The credit cards and sensitive data behind the firewall on top of the rock pillar are secure due to the inaccessibility provided by two firewalls and secure pathways.
The other globe-topped pillars in the background indicate the global coverage the systems offers.
The bright light on the horizon are indicative of a bright, secure and strong future.
"Opt in for security" by Lance Jackson
Shopping without information or a connection can be a dizzying, spinning experience. Why be sad or mad when you can be glad? By shopping on a secure networking you become a happy, smiling shopper. Being connected is the new shopping mantra.