Creating Confidence in Mobility
It’s critical for businesses to remember that the most important thing is protecting their information
By: Frank McGinnis
Apr. 29, 2013 09:00 AM
Every business wants to protect its confidential financial information. But for an organization like ours, financial information is our entire business. Over the course of a year, Broadridge handles millions of trades worth trillions of dollars, so it's easy to see how security must be intertwined in everything we do. It was foremost in our minds when we were spun off from our parent company in 2007, because we wanted to grow the business while retaining security as a priority. One data breach, or a few hours of downtime, would cost us millions.
We had a team of 55 IT professionals working together for the first couple of years to make sure that our core functions and sensitive information were fully protected. We had several different security solutions on our endpoints that didn't interact well, so we implemented new security software on all our endpoints, as well as encryption technology. These were all incremental steps toward embracing the latest trend: mobility.
It's obvious to businesses that mobility can no longer be ignored as a legitimate way to do business, evolving from just laptops to include smartphones and tablets, improving employee productivity and creating a competitive advantage. But we also recognized the real challenge: It's not about protecting the devices themselves, but the information we are using them to access. We needed to address this issue throughout the lifecycle of the devices. So we developed a mobile management strategy and began to allow the use of corporate-owned mobile devices for business use. We are using mobile management software, and we recently added data loss protection to our tablets, which gives us visibility into the information each device is accessing and to also enforce policies. With this first step taken, we're now looking at the possibility of allowing BYOD in the future.
As technology progresses and the data center adapts to changing requirements, it's critical for businesses to remember that the most important thing is protecting their information. At Broadridge we have taken a proactive approach to protection, first securing our infrastructure and then working to keep our information safe as it is used outside of our data center more and more. We are now executing a comprehensive mobile strategy incorporating security expertise from Symantec, combined with proactive policies. We can feel confident about the security of our customers' information while providing them with the improved service we achieve through mobility.
Reader Feedback: Page 1 of 1
SOA World Latest Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week