This page contains a Flash digital edition of a book.
September 2014 44 Bermuda:Re/insurance+ILS


machine learning, and continuous monitoring by security experts, Masergy delivers peace of mind to enterprise IT organisations.


The service allows a business to cost-effectively allocate internal resources while outsourcing network security requirements based on demand or priority. The service can effectively improve security efficacy and operational efficiency by eliminating improperly configured or unmonitored security systems. It also can reduce the cost of acquiring and training security staff.


“Masergy offers the optimum approach to the continuous monitoring of network security and adaptive information sharing between security applications and appliances. Our SaaS offering delivers actionable information and context to threats and early warnings,” said John Dumbleton, senior vice president of business development at Masergy.


“It provides regulatory compliance for all market segments from small to large enterprises, alleviating the complex business risk associated with storing, processing and transmitting critical user data. This is especially important with multinational businesses that have offices in Bermuda as well as companies headquartered here. Masergy offers its SaaS to customers globally and is pleased to partner with Logic in Bermuda,” he added.


Best practice


The market for telecom providers, internet service providers, security, consulting and technology companies to address these complex issues is growing. One provider in the market is Oxygen.


Richard Dennington, IT operations manager at Oxygen stated, “The importance of best practice IT security continues to grow year-on-year and the risk to financial institutions continues to increase. A security breach could lead to regulatory action as well as financial loss and adverse impact on business reputation.


“Oxygen specialises in providing customised secure server and desktop


environments hosted in a fully resilient Bermuda data centre. Our clients benefit from dedicated or shared secure managed environments while being able to access their systems 24 hours a day from anywhere in the world.”


“For the reinsurance industry, it is important to consider data loss


prevention (DLP). We recommend and implement systems to categorise data and report on, and optionally restrict, sensitive data leaving the company via email and removable media,” added Graham Turner, technical solutions architect at Oxygen.


Rich James, chief technology officer at Ignition Bermuda added, “A high level of end-to-end system security has been the overriding requirement from the new wave of insurance-linked securities (ILS) start-ups in Bermuda.


“By providing the Ignition rapid technology platform [RTP]—a start-up rapid package aimed at new firms locating in Bermuda—


our technology professionals can help them get their technology environment functioning very quickly and can support them as they expand, while offering them the many benefits of working with an experienced offshore technology leader.


“But again, security is key and must be demonstrable and built into the solution and platforms from the ground up.”


Data security is not an issue that companies can ignore, or become complacent about in the management of potential threats. The sophistication of cyber criminals will continue to increase and more countries will enact legislated policies that must be adhered to in order to protect an individual’s right to privacy. Companies must act now to ensure they are not leaving the door open to a data security breach. 


Richard Munday is vice president of international business for KeyTech. He can be contacted at: rjmunday@keytech.bm


“As it is likely the framework will be completed in 2015, companies should begin to develop the appropriate security and privacy policies to ensure compliance when the legislation is in place.”


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60