Wednesday 30 March 2011

Behind every Cloud...

There has been a lot of talk about the security of the cloud computing system. Industry experts believe that using the cloud system could give-way to large security issues if badly implemented. “If badly implemented” being the key point there. The eagerness to compete with other organisations is causing companies rush the implementation of the cloud system. Popularity of the cloud amongst established companies is expected to skyrocket over the next few years. So we could be hearing of this scenario a lot more often in the future due to rushed system implementation. All information presented here is © copyright Carkean Solutions Ltd., 2010 - Not to be used without our permission - The views expressed here are the views of an individual not the corporation


But fear not! Indulge yourself in the sweet advantages of the cloud because it is not the system that’s the issue. In fact many experts have stated that cloud computing can actually increase security. From my understanding, the cloud system is not easily contaminated by viruses due to it being a “real-time” system. This means that the cloud system is slightly above your current level of security in terms of keeping out data-corrupting diseases.

That’s all good, but what about keeping out spying eyes? Because It’s similar to storing your data in a real cloud; you no longer control exactly who can access your precious data because it is being stored ‘somewhere up there’. So most importantly; do not store data within the cloud system only the processing should take place in the cloud. Here at Carkean Solutions we can implement your system in that way, so that it is both safe and secure

So if you are thinking about adopting cloud computing, don’t let rumours of its poor security put you off - Thanks for reading and as always feel free to leave any comments.


All information presented here is © copyright Carkean Solutions Ltd., 2010 - Not to be used without our permission - The views expressed here are the views of an individual not the corporation

Wednesday 23 March 2011

Webinar: Cloud Based Strategy for Tackling Financial Crime

There was positive feedback from webinar with many in attendance.

The threats posed to the financial industry by organised crime in the areas of fraud and anti-money laundering are serious and increasing. In line with the FSA statutory objective on reducing financial crime, Carkean Solutions proposed solution is to use their Aquima product as an automated transaction monitoring solution which helps to assess the nature of the threat and potential responses from a fraud detection perspective.

Aquima’s solutions are to identify and prioritise the fraud and money laundering risks in four steps. The first step is the collection and filtering of data, the second step is the classification and Detection which gives an AML score representing the likelihood the account holder is involved in money laundering based on AML indicators. The third Step is Research and Mark which minimizes false flagging and puts all information in one place. The final Step is Report and Block where there is an automatic reporting and automatic blocking of transactions from perceived account holders who will be investigated by fraud teams.

The enhanced monitoring capability of Aquima will allow earlier and more reliable identification of transactions that warrants further investigation. There is significantly enhanced visibility of a variety of transactions including unusual high transactions and foreign transaction payments. This will free fraud teams from time consuming tasks looking for unusual activity and could instead focus on investigation of prioritised transactions.

There was of course questions about security since all this will be cloud based but I Can inform you there will be NO SENSITIVE CUSTOMER INFORMATION ON THE CLOUD, What will happen will be that the processing will take place in the cloud. Client information is in this case will be processed but not stored in the cloud. The connections to the cloud servers will be secured VPN (It encapsulates data transfers using a secure cryptographic method between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks) using HTTPS, so it will be perfectly secured.

Thank you for reading and we look forward to hearing from you!



All information presented here is © copyright Carkean Solutions Ltd., 2010 - Not to be used without our permission - The views expressed here are the views of an individual not the corporation