Advisory Financial Services Client Story

Evaluating the Security of a (Bring Your Own Device) BYOD Program

A financial services Client was seeking validation of the policies and controls they had developed for a new Bring Your Own Device program prior to implementation company-wide.

USA
Financial Services

Practice Areas
  • Configuration Review


Our Client’s Challenge:

  • As a company that embraces new technologies and seeking ways to maintain competitiveness, our Client wanted to securely implement a Bring Your Own Device (BYOD) program.
  • This BYOD program introduced several new physical devices (laptops, mobile devices) that also included integration with cloud services. Adopting these technologies could open up new attack vectors and introduce new risks.
  • Our Client desired to assess and evaluate the risks of the BYOD implementation. The security assessment would be focused on verifying the proposed policies and to ensure that controls were sufficient to protect the Client from potential data breach, yet flexible enough to enable employees to work more effectively.

Our Approach:

  • Security Compass worked with our Client to understand the current BYOD policy and organizational best practices. A focus was then put on security testing and verifying the policies and controls of the BYOD program. This included testing of Windows 10 portable devices and associated applications, including tablets, laptops and numerous cloud services.

The Result:

  • Working together with our Client to measure the effectiveness of the current BYOD policy, Security Compass was able to identify and verify security gaps in the existing policy and provisioning of devices that could put our Client at increased risk. We found success in helping balance the security risks while supporting our Client’s operational goals, that enabled employees to use the tools they wanted to work effectively.
Our Client was able to implement their Bring Your Own Device program company-wide with confidence, knowing that the program’s policies and controls had been validated with Security Compass.

Back to Client Stories

Contact Us

You’re different, and we know it.

We are your guide to planning, assessing, and helping you build secure information systems to keep your business productive.

Contact us to find out how we can help you.

 
Mostly
Some of
 
(Choose One)
(All that apply)
Web Search
Online Ad
White Paper
Analyst Report
Trade Show
Worked With Us Elsewhere
Referral
Other

Security Compass Logo