The increased scale and complexity of money laundering and terrorist financing activity is increasing the number of reporting entities considering automated AML solutions. Of these solutions, SaaS products are highly popular as they offer reporting entities many benefits, such as moving from CapEx to OpEx. However, from our experience in the AML compliance sector and with mission-critical banking systems, the one giant elephant in the room that comes up time and again is security.
Security is one of the critical due diligence criterion in the procurement process, which comes as no surprise considering the extreme sensitivity of the data and information that AML software processes. Just like with reporting entities having to demonstrate compliance, automated SaaS-based AML solutions can’t just say they’re secure – they need to prove it.
So how secure is Jade ThirdEye? Our two-fold approach to security has been giving enterprise businesses peace of mind for several years now, operating with best practices at both a product and an organisational level. We’re proud to announce that we’ve recently gained CyberEssentials Plus Certification, proving our commitment to robust product and organisational security practices our customers can rely on. Now we’ll explore these two approaches in further detail.
Jade ThirdEye provides reporting entities with an effective AML compliance solution that has a highly usable and contemporary interface, which is securely accessed through modern web browsers. Due to this approach, we ensure that modern security protocol and methods are leveraged at all times.
From a product perspective, Jade ThirdEye uses defence in-depth security strategy to protect your business and your customer data.
Environment security generally relates to security measures at a hosting level. While there are many facets to this, of which we’re happy to talk to you in more depth, we’ve gone into more detail with aspects and listed other measures below.
Network security usually relates to security measures that oversee the transiting of data to and within Jade ThirdEye Bureau. We’ve drilled into two aspects of network security and listed the rest.
Application security relates to preventing security vulnerabilities such as unauthorised access and modification. On top of best-practice development security design methodology, our below – two in more detail and the others listed.
It is all well and good to claim to have robust security in place, but as mentioned above, where is the proof? Jade ThirdEye undertakes rigorous third-party penetration testing every year, of which the latest test was
“Commendably, Lateral Security did not identify any vulnerabilities which are considered likely to lead directly to compromise of the solution or unauthorised modification to the underlying data.” Lateral Security, Nov 2019.
In summary, we have an active security programme that is built upon a foundation of continuous improvement. Both external audits (like the one performed by Lateral Security) and our testing enable us to reinforce our security and resilience. And this isn’t just something we do from a Jade ThirdEye perspective; it’s also something we do across the rest of our business. Which brings us to...
From an organisational perspective at Jade Software (the developer of Jade ThirdEye), we have been long-term partners with several large enterprises from highly regulated industries – from insurance to banking. Developing and supporting business-critical systems, we continually invest in leading security processes and tools to ensure our clients experience minimal disruption and exposure.
Jade is a GDPR-compliant business, with layers of best-practice security tools and processes in place to protect our and our clients’ businesses. This is well-summarised and exhibited through our recent Cyber Essentials Plus certification. After all, saying we’re secure is simply not enough.
Cyber Essentials Plus is a digital security accreditation process that demonstrates to businesses that all who hold such certification take cybersecurity seriously. Most importantly, the certification provides a high level of trust and reliability as it delivered by a third-party, independent auditor. While it is a standard set by the United Kingdom Government, Cyber Essentials Plus is relevant and applicable in other countries too.
There are five themes that Cyber Essentials Plus accreditation covers, and under each of which are several standards. At a high level, these themes are:
The five themes mentioned above are the ‘checks and balances’ that we use across our business. If you want to dive deeper into these themes to see what’s involved, learn more about Cyber Essentials here.
Whether you’re simply considering or are putting together a business case for an automated AML solution, SaaS delivery and product security will be a key part of your evaluation. With this in mind, think about how you might use the information above in your assessment and communications with stakeholders.
If you’re considering Jade ThirdEye to streamline your AML programme, you can be assured that we take all forms of security seriously. Ultimately, your business and customer data will be in safe hands.