I spent a few days in Grand Cayman with the McAfee team pictured below meeting with financial services organizations. As everyone knows, the Cayman Islands are a mecca for financial services and supporting industries such as legal, insurance, and consulting. Because of the sensitivity of the business in the Caymans in regards to customer privacy and confidentiality along with a rapid push towards highly automated, connected systems facilitating b2b and b2c self-service portals, these organizations are making a number of security investments to mitigate the inherent risks idacative to financial services organizations the world around.
McAfee secures some of the largest financial services organizations in the world and as such has created a number of specialized solutions that are purpose-built for these organizations. Within the Caymans however, there are obvious limitations in terms of resources around capital and operational expendutures. The islands themselves only have a population of around 55,000. Therefore, many of these organizations started with the pure basics – endpoint security and perimeter security. Solutions like anti-malware, firewalls, and IPS are as common in the Caymans as the rest of the world. Over the last few years, they have pushed towards solutions that provide greater control over their “crown jewels” – sensitive data, and have employed controls such as DLP , DAM, and SIEM.
Because of limited human resources, these data security controls would have been impractical in the face of daily fire fighting and supporting endpoint security concerns such as issues around malware and phishing scams. It is precisely this issue that makes McAfee Security Connected, centered around McAfee ePO, so powerful. The security and IT teams can centralize their endpoint, network, and data controls. They have a single location for management, analysis, and reporting. Best of all, they can manage issues by exception, allowing their small teams to remain effective while ensuring that additional security controls will act to enrich their current security framework without requiring an increase in resources. After all, with views like this, who wants to spend all day in front of a computer?