Compliance Endpoint Security Thought Leadership

Data Security Risk Mitigation in Financial Services

April 10, 2015

With the rapidly increasing interconnectivity of information, more endpoints than ever before are accessing the corporate network and the sensitive financial information therein. At the consumer perspective, the primary point of interaction has shifted from in-person to in-hand, as tablets and smartphones become the primary way financial services are conducted. While there have been incredible benefits from this technology transformation, sensitive data now resides beyond the bounds of traditional IT infrastructure: off the network and outside the organization’s control.

Cybercriminals view the valuable information that resides on each employee device as a prime target, and unfortunately malicious or negligent employee activity has become an increasing threat. All it takes is a single compromised endpoint to impact the entire organization and its customers.

In an article I contributed to TechZone360, Financial Services: Investing in Data Security Risk Mitigation, I talk about the importance of measurement as a means to management. The first step in mitigating data security risk requires measuring device activity and status, no matter where that device is or who is using it. So, how do you do this?

In the article, I go into great detail about the following risk mitigation process:

The regulatory landscape in the financial sector, which includes everything from the Gramm-Leach-Bliley Act to PC DSS and State laws, offers organizations a base minimum of security standards that must be met. Rather than constantly struggling to tweak security standards to match the shifting regulations, organizations can strive for a higher standard of security based upon their own risk standards, a position that will ride out many of the small tweaks happening in the regulatory landscape. Read more of my thoughts on securing data in the financial services here.

With Persistence technology by Absolute, organizations stay connected with each device in their deployment. This persistent connection allows them to monitor status and take proactive and reactive measures regardless of device location or user. Learn more about our solutions at

Compliance Endpoint Security Thought Leadership

Share this article

Financial Services