• JHC Figaro
  • JHC Neon
  • JHC Xenon
  • JHC Digitize
  • Careers
  • JHC Community
  • We have a responsibility to mitigate the data security risks our clients face

    We have a responsibility to mitigate the data security risks our clients face. Protecting client information is an obligation common to all financial institutions.

    Given that firms must never disclose the identities of their investors, regulators want to know what governance and cyber-resilient measures are in place. For that reason, most financial institutions now consider information security to be as important as its quality. Firms also understand that their existence and future success is as dependent on cyber security as it is on compliance, business development and talent.

    As new data-related regulatory requirements emerge, those regulations in themselves impact on the management and protection of data and raise new compliance issues. Having to submit frequent reports to regulators for example, heightens the chances of the information in those documents being exposed.

    JHC’s Figaro solution provides the software and services financial institutions need to ensure good data security throughout their business.

    Information security – JHC Figaro deployed solution

    To meet the fundamentals of good data security, Figaro provides:

    • Defined access to client accounts and data points
    • Tailored roles and permissions based on an individual’s position and responsibility within the organisation

    In addition, JHC ensures that the Figaro software’s security and management processes align with the following International Standards:

    • ISO 27001 & ISO 27002 (Information security management)
    • ISO22313&ISO22301 (Business continuity management)
    • BS 11200 (Crisis management)

    Information security – JHC Figaro managed service

    As part of its managed service, JHC has utilised Figaro’s capabilities to implement the following arrangements and mitigate data security risks. Users can also employ the same functionality to implement similar arrangements in-house:

    Secure Architecture
    Engineered to a 5-tier architecture, JHCs applications are distributed between network segments separated by firewalls and routers. A security boundary is maintained between the internal networks and external networks/internet.

    Physical Security
    Data is stored in two purpose-built datacentres within the UK, each of which is 100 miles apart, operates with authorised personnel and secure access controls and is certified to ISO/IEC 27001 best practice standards.

    Data Encryption
    All data transmitted over the internet is encrypted using HTTPS. In addition, all personally identifiable information (PII) will be encrypted to Advanced Encryption Standard (AES) 128-bit. Whilst at rest, PII data will be encrypted to AES 128-bit. PII data will continue to be encrypted to AES 128-bit during replication between datacentres for Disaster Recovery (DR) purposes.

    User Authentication
    Secure log-on procedures and controls prevent unauthorised access to client data and non-client data.

    Strategic Security Monitoring
    Our proactive and dynamic monitoring strategy incorporates procedures and controls which will detect security threats and issues as they happen.

    Intrusion Detection
    Independent penetration testing and vulnerability assessments is conducted every six months by an external and specialist firm. 

    Disaster Recovery (DR) & Testing
    We provide an identically configured mirrored infrastructure for the purposes of DR. Tests—including primary/secondary role swaps—are performed annually with requirement for client or end user involvement.

    Website Change Audit Records
    By preserving an audit trail of all website changes, firms comply with best practices and regulatory rules.

    DoS and DDoS Prevention/Mitigation
    JHC services are protected against both volumetric and application layer DoS and DDoS attacks.

     Back to Figaro