Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Mehdi Daoudi, Yeshim Deniz

Related Topics: Cloud Security, Mobile IoT, Microservices Expo, Agile Computing, @CloudExpo, @DXWorldExpo

Cloud Security: Case Study

Creating Confidence in Mobility

It’s critical for businesses to remember that the most important thing is protecting their information

Every business wants to protect its confidential financial information. But for an organization like ours, financial information is our entire business. Over the course of a year, Broadridge handles millions of trades worth trillions of dollars, so it's easy to see how security must be intertwined in everything we do. It was foremost in our minds when we were spun off from our parent company in 2007, because we wanted to grow the business while retaining security as a priority. One data breach, or a few hours of downtime, would cost us millions.

We had a team of 55 IT professionals working together for the first couple of years to make sure that our core functions and sensitive information were fully protected. We had several different security solutions on our endpoints that didn't interact well, so we implemented new security software on all our endpoints, as well as encryption technology. These were all incremental steps toward embracing the latest trend: mobility.

It's obvious to businesses that mobility can no longer be ignored as a legitimate way to do business, evolving from just laptops to include smartphones and tablets, improving employee productivity and creating a competitive advantage. But we also recognized the real challenge: It's not about protecting the devices themselves, but the information we are using them to access. We needed to address this issue throughout the lifecycle of the devices. So we developed a mobile management strategy and began to allow the use of corporate-owned mobile devices for business use. We are using mobile management software, and we recently added data loss protection to our tablets, which gives us visibility into the information each device is accessing and to also enforce policies. With this first step taken, we're now looking at the possibility of allowing BYOD in the future.

As technology progresses and the data center adapts to changing requirements, it's critical for businesses to remember that the most important thing is protecting their information. At Broadridge we have taken a proactive approach to protection, first securing our infrastructure and then working to keep our information safe as it is used outside of our data center more and more. We are now executing a comprehensive mobile strategy incorporating security expertise from Symantec, combined with proactive policies. We can feel confident about the security of our customers' information while providing them with the improved service we achieve through mobility.

More Stories By Frank McGinnis

Frank McGinnis is the Vice President of Corporate Information Technology at Broadridge Financial Solutions. In this role, he has complete responsibility for the day to day and strategic management of Broadridge’s endpoint computing technologies.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Microservices Articles
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
As Enterprise business moves from Monoliths to Microservices, adoption and successful implementations of Microservices become more evident. The goal of Microservices is to improve software delivery speed and increase system safety as scale increases. Documenting hurdles and problems for the use of Microservices will help consultants, architects and specialists to avoid repeating the same mistakes and learn how and when to use (or not use) Microservices at the enterprise level. The circumstance w...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Containers, microservices and DevOps are all the rage lately. You can read about how great they are and how they’ll change your life and the industry everywhere. So naturally when we started a new company and were deciding how to architect our app, we went with microservices, containers and DevOps. About now you’re expecting a story of how everything went so smoothly, we’re now pushing out code ten times a day, but the reality is quite different.