ITO America Business Technology Publication
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download


Under the Microscope- Enterprise Security System: A Good Investment for Financial Institutions

You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!

Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology

For financial services organizations, "sensitive information" encompasses a wide range of data, from personal and financial information relating to customers and employees, to strategic plans and intellectual property. A data breach, therefore, can not only lead to fines and other penalties imposed by regulators, it can also lead to lost business due to customer defection, diminished reputation, and the need to transfer resources from revenue generating activities to damage control.

The flip side of this is that effective data security, aside from being an essential business process, can also be a valuable business enabler, preserving and promoting growth. It's also extremely challenging to do, the primary reason being that sensitive data exists in various forms throughout the organization: in applications and databases, on servers and storage tapes, and on desktops and other endpoints, where it can be transformed and transmitted by employees, customers, partners, and third-party services providers.

For too long, vendors have been providing- and financial services organizations have been deploying- point solutions that are limited in scope and strategy. They may deliver a measure of security for files but they don't provide protection for the business as a whole. Ultimately, securing data effectively is not about firewalls or passwords; rather it's an information management process that takes a comprehensive, strategic view of your most important asset- your data- and helps you exploit its value more efficiently while ensuring it remains a competitive advantage rather than a potential liability.

Information Risk Control: A Strategy Approach Information Risk Control: A Strategy Approach
Scott Crawford, Managing Research Director, Security & Risk Management with Enterprise Management Associates, and Michael Song, RSA discuss the information risk challenge, and how taking a strategic approach can help organizations to take maximum advantage of the full set of tools at their disposal.