Blog
Our vision is to revolutionize and automate the loan servicing workflow of the global financial community.
How Shaw Protects Customer Data
Shaw Systems protects customer data by utilizing an Enterprise Command Center and Information Security Office. We continue to invest in our cloud hosting services to support all our client's loan and financial operations.
Description automatically generatedShaw has established the SSA (Shaw Systems Associates) Enterprise Command Center to enhance our operational, security, and troubleshooting support for our clients. In addition, we have integrated with third-party service providers to expand our support solutions to our clients. “By leveraging these strategic partnerships, Shaw provides a seamless and integrated trust that combines Shaw’s industry leading loan processing platform knowledge with industry experts across Shaw’s environments to provide robust solutions.” explains Fred Coia, Shaw’s Chief Operating and Information Security Officer.
Shaw’s cloud-hosted deployment provides our clients with the most efficient and cost-effective solution. This offers each client a secure and single tenant model. This means they can stay up to date on current software releases and security patches that are related to their specific business. The solution ensures that their operations are available round the clock 24x7.
Benefits:
We have partnered with Microsoft Azure to provide information systems that are secure and protected.
Key Features:
Shaw Information Security – Protecting our client’s most valuable assets
Description automatically generatedShaw’s Information Security Officer is another area where Shaw invests our resources. Cybersecurity continues to be at the forefront of the financial services and banking industries. It requires specialized skills and total focus to stay ahead of the countless and ever-changing security risks.Shaw has partnered with Arctic Wolf Networks (“AWN”) to serve as a critical component of Shaw’s Information Security Center. AWN provides 24x7x365 monitoring and reporting on Shaw’s internal and Shaw’s clients’ hosted environments. Should an issue arise, AWN provides Shaw with round the clock detection, incident generation, triage, reporting, and escalation, and response if necessary.
Additional practices that Shaw uses under the guidance of Shaw’s Information Security Office include:
- VNet
- Resource Group
- Network Security Group (NSG)
- Application Security Group (ASG)
- Application Firewalls
- Not accessible to the internet
If you’d like to learn more about our cloud loan servicing software, or how we secure customer data, email us at solutions@shawsystems.com.