Our vision is to revolutionize and automate the loan servicing workflow of the global financial community.

How Shaw Protects Customer Data

Shaw Enterprise Command Center

Shaw Systems protects customer data by utilizing an Enterprise Command Center and Information Security Office. We continue to invest in our cloud hosting services to support all our client's loan and financial operations.

Description automatically generatedShaw has established the SSA (Shaw Systems Associates) Enterprise Command Center to enhance our operational, security, and troubleshooting support for our clients. In addition, we have integrated with third-party service providers to expand our support solutions to our clients. “By leveraging these strategic partnerships, Shaw provides a seamless and integrated trust that combines Shaw’s industry leading loan processing platform knowledge with industry experts across Shaw’s environments to provide robust solutions.” explains Fred Coia, Shaw’s Chief Operating and Information Security Officer.

Shaw’s cloud-hosted deployment provides our clients with the most efficient and cost-effective solution. This offers each client a secure and single tenant model. This means they can stay up to date on current software releases and security patches that are related to their specific business. The solution ensures that their operations are available round the clock 24x7.


  • 24 x 7 x 365 Enterprise Command Center Support and Monitoring
  • Industry and Shaw Certified Level 1, Level 2, and Level 3 Operations/Engineering Staff
  • Full End to End Support of hosted Spectrum Platform
  • Fully manage “End of Day” Cycles to ensure Clients are open for business 365 days a year
  • Service Level Agreements
  • Strategic Alliance and Third-Party Partner integration
  • Data Warehouse/Operational Data Store integration/Near Real Time Data
  • Client Specific/Single Tenant environments
  • Automated Job Scheduling/Monitoring/Reporting
  • Network segmentation providing secure access to/from Shaw and Client Networks
  • Near (Business) Real-Time Reporting
  • Securely hosted in the Azure Cloud

  • We have partnered with Microsoft Azure to provide information systems that are secure and protected.

    Key Features:

  • Capacity Management - On Demand Scalability and Elasticity
  • Rapid Environment Infrastructure and Applications Deployments
  • On-Demand Technology Upgrades
  • 24/7 Monitoring
  • High Availability/Disaster Recovery/Reliability
  • Tier 4 Data Center (Physical Security)
  • Multiple US Based Regions - High Availability/Disaster Recovery
  • Secure Data Access
  • Premium Data Storage

  • Shaw Information Security – Protecting our client’s most valuable assets

    Description automatically generatedShaw’s Information Security Officer is another area where Shaw invests our resources. Cybersecurity continues to be at the forefront of the financial services and banking industries. It requires specialized skills and total focus to stay ahead of the countless and ever-changing security risks.

    Shaw has partnered with Arctic Wolf Networks (“AWN”) to serve as a critical component of Shaw’s Information Security Center. AWN provides 24x7x365 monitoring and reporting on Shaw’s internal and Shaw’s clients’ hosted environments. Should an issue arise, AWN provides Shaw with round the clock detection, incident generation, triage, reporting, and escalation, and response if necessary.

    Additional practices that Shaw uses under the guidance of Shaw’s Information Security Office include:

  • Active Practicing of the Least Privilege Principle within Shaw’s Access Controls
  • Quarterly Access Reviews
  • Multi-Factor Authentication
  • Third-Party Service Provider review
  • Secure File Transport to/from
  • Single Tenant Client Environments in secure network segments with their own
    • VNet
    • Resource Group
    • Network Security Group (NSG)
    • Application Security Group (ASG)
    • Application Firewalls
    • Not accessible to the internet
  • Hardware, Database, File, and Transport Level Encryption
  • Update of Virtual Machines
  • Monthly patching schedules
  • Support Client’s Data Retention Policies
  • Azure Multi US Region deployments
  • Leverage Azure Recovery Services
  • Notification of changes to environment
  • Human Detection/Firewall in Shaw staff

  • If you’d like to learn more about our cloud loan servicing software, or how we secure customer data, email us at