The Record - Issue 20: Spring 2021
90 www. t e c h n o l o g y r e c o r d . c om F E ATUR E “Cybercriminals deceive financial services in diverse ways to extract money and data. Instead of understanding this as a series of isolated attack vectors, organisations must conceptualise the bigger phenomenon of ‘cyber deception’ and then fortify a counter deception strategy that does more by identifying the adversary’s work at multiple stages and applying counter measures to reduce the likelihood that they’ll succeed. At Mimecast, this awareness informs the design and innovation behind our industry-leading open application programming interface (API) program. With over 100 APIs and our out-of-the-box integrations, we help establish a robust security architecture with greater efficiency and efficacy, intelligently delivering a counter deception strategy that leverages your Mimecast and Microsoft investments to make your systems smarter. At your organisation’s perimeter, within it and beyond it, we monitor cyber deception during its preparation, execution and exploitation phases, arming you with an integrated approach and enabling you to be more effective at counter deception.” “Maureen Data Systems (MDS) helps establish dynamic, cloud-based watchlist and blacklist solutions based on today’s modern workplace. It helps manage both warning notices and wanted lists, ensuring that high-quality data from these lists is leveraged throughout a company’s existing Microsoft Azure and Microsoft 365 investment. Armed with the capacity to process large amounts of data quickly (in real time or near-real time) will help financial services organisations to quickly flag suspicious transactions and to isolate them as they happen. Our solution easily integrates with KYC, anti-money laundering regulations, watchlist vendors, and provides tools for data scientists to create state-of-the-art machine learning models to prevent suspicious transactions. The solution also benefits from data security capabilities to encrypt data securely and prevent personally identifiable information data leaks. It also features data redundancy (replication of data among physical regions) to protect against both cyberattacks and physical damage to a data centre. Finally, the highly secure Azure Key Vault helps users to easily maintain control of keys that are used to secure applications running on the Azure cloud, protecting customer data.” Patrick Hall Applied Innovations Practice Lead at Maureen Data Systems Jules Martin Vice President, Ecosystem and Alliances at Mimecast
Made with FlippingBook
RkJQdWJsaXNoZXIy NzQ1NTk=