M5 for Finance

GigaOM says the financial services industry has been at the forefront of the BYOD/PC revolution, with more than 50% adoption of tablets. GigaOM cites the industry’s focus on productivity, end-user experience, and the desire for better visual presentations with clients as drivers of BYO growth.

Finance is an industry that is also unique in that it often employs “agents,” who are different from official employees or contractors. Agents often work remotely and although they may work exclusively for one company, they operate independently. Even given minimal-to-no tech support furnished by corporate IT, agents’ systems must still be secure, reliable, and comply fully with the regulatory requirements that govern the parent company.

Finance-specific concerns include:

  • Compliance and security. Regulatory agencies dictate financial organizations follow strict security and process guidelines to protect customer data and privacy. These checks and balances also protect against institution-based improprieties as defined by the SEC.
  • Limited-to-no local IT support. Agents and remote/mobile workers come to headquarters infrequently. Previously, it was not uncommon for laptops to be several software deployments behind those at headquarters.
  • Mobile agents. If an agent can’t access essential applications, services, and data, they can’t close business deals. The direct link between accessing data and revenue is clear.
  • User experience. Although the user experience is always important, in the finance sector it’s even more important because users are often delivering presentations to customers. The ability to present online or offline, including a rich multimedia experience, is essential to support sales efforts and ensure customer satisfaction.
  • Unknown, untrusted devices. Rogue users, accessing critical corporate infrastructure in an unauthorized fashion via insecure endpoints, are a constant threat.

The Solution: Moka5

Moka5 secures corporate access, increases user productivity, and simplifies IT management, even for the most complex scenarios in finance involving BYOD/PC employees and agents, mergers and acquisitions, remote or outsourced development, and other critical use cases.

Focus on protecting the data

Moka5 secures corporate access and intellectual property by focusing on protecting the corporate data, not the devices. The Moka5 solution is an encrypted, fully-managed corporate desktop running as an application on any computing device accessible from any network. Its secure container isolates the corporate OS, applications, and data from those on the host machines. Even in a BYOD/PC or contract workforce situation where IT traditionally has limited ability to manage computing devices or individual behavior, Moka5’s policy-based secure container ensures IT total control over who has access to corporate applications and data, and what they are – or are not – allowed to do with sensitive information (such as saving files on a USB or CD, or copy files from the corporate desktop to the personal host computer).

With the corporate workspace securely contained on the endpoint, Moka5 ensures multiple layers of protections and defenses around the data including:

  • Scanning the host for errant processes
  • Data encryption at rest and in transit
  • Authentication controls for virtual desktop access, including two-factor authentication
  • Remote access revocation or complete wipe of corporate workspace from a centralize console (in case of device theft or loss)
  • Automated disabling of peripherals (such as USB and CD drives)
  • Blocking network traffic from unauthorized devices
  • Enforcement of mobile-specific policies (keycodes or passwords, timeouts, etc.)

Reap capital and operational cost savings

Finance firms can realize significant CapEx savings by using Moka5. How?

  • By requiring contractors and remote employees to use their own computing devices. Through a BYOD/PC initiative with Moka5 as the underlying secure container technology, firms can save on hardware cost for every contractor they hire globally.
  • By reducing the budget needed to maintain a continually secure endpoint infrastructure. Secure, Moka5-driven application distribution, patch updates, OS migration, and other centralized endpoint management functionality drives security up and costs down. Critical to this efficient management approach is the Moka5 container technology that enables IT to run large updates just once on their golden image. The corporate OS and applications update automatically on every boot, so there’s no need for costly user-side visits.

Boost employee productivity

With layering to streamline image deployment, Moka5 accelerates employee on-boarding. By allowing IT or the user to “rejuvenate” an image in under a minute (in many cases), Moka5 further reduces time and productivity loss that might otherwise occur due to malware infection or other mishap. And thanks to Moka5′s offline capability, remote workers can operate within their secure enterprise workspaces anywhere, anytime.

Case Study

The IT team of a financial institution was chartered with improving IT efficiency, security, and productivity. As part of the organization’s server and desktop virtualization initiative, it explored both server-side and client-side desktop virtualization technologies in the hopes of eliminating the labor intensive upgrades and updates of OS, corporate applications, and security patches.

It soon became clear that server-side VDI (virtual desktop infrastructure) addressed neither their remote/branch deployment requirements nor budgetary constraints because of

  • Inconsistent network connectivity meant VDI users could not always access corporate applications, services, and data
  • The VDI infrastructure was complex and expensive, partly because it required frequent endpoint visits by the IT team. Scheduled hardware refresh and software upgrades added to the strain on an over-worked IT staff.

Moka5 client-side virtualization helped by:

  • Delivering security patch updates quickly and regularly to stop security breaches.
  • Giving remote business users access to corporate apps and data securely — both online and offline.
  • Reducing IT support time and the total cost of corporate application updates