Raymond James’ robust, best of breed Information Technology Security Standards – incorporating hardware, software and resources – are mandated by the Raymond James Financial global business.
24/7 Cyber Threat Centre
Monitoring and blocking malicious and suspicious activity, triggering immediate intervention and remediation. In addition, this monitoring filters down to those branches who utilise the Raymond James network equipment.
Regular Vulnerability and Penetration tests
To scan the Raymond James network from the internet, wireless connections and internally, looking for potential weak points in the systems.
Next Generation Firewalls
Application responsive with built-in threat prevention.
External and Internal Intrusion Detection Systems
Monitoring in real time, for suspicious and/or malicious traffic.
Thorough Vendor Risk Assessments
Performed locally, in collaboration with the US, in order to vet any vendors with whom we intend to conduct business.
Key technology assets are hosted and protected within the Raymond James Private Cloud and the associated data is managed by Raymond James IT.
Two Co-location Datacentres
Hosted in managed serviced data centres, with redundant power and cooling. The data centres being off-site means that should a location encounter any problem, it is dealt with in isolation; I.E: either IT systems OR workplace recovery.
Regular Disaster Recovery and Workplace Recovery
Tests are conducted where we simulate a data centre or office becoming unavailable, thus ensuring that there is minimal interruption to business systems.
Multiple Workplace Recovery Locations around the UK
Which provide temporary office space along with all the business tools required for Raymond James to fully operate.
IT Support Staff and Technical Expertise
Consisting of Support, Infrastructure and Development teams, as well as Application Administrators, Business Analysts, Project Managers and Security Officers.
Programme Delivery Board
Meets regularly to prioritise and plan key business projects, in order to deliver enhancements and efficiencies both internally and externally.
Proactive Monitoring
Our technological systems are monitored 24 hours a day, 365 days a year, for signs of tampering or unauthorised activity. We employ the use of encryption, virtual private networks, penetration/vulnerability testing, and the latest firewall and antivirus technology. Email monitoring is also utilised for regulatory and compliance purposes in order to protect our clients. We also maintain strict controls to limit and monitor employee access to our systems.
Our information technology professionals constantly research and develop enhancements to keep us at the vanguard of data security.
Raymond James Infrastructure
The world of technology is rapidly evolving and Raymond James has dedicated teams in our service and cyber security centres at our parent company in the U.S., Raymond James Financial.
Businesses and individuals are facing an increased number of cyber threats on a daily basis. The rigorous measures we have in place allow Raymond James to proactively detect and anticipate cyber threats before they become issues, so that we can protect both you and your clients from fraud, data theft and ransomware.
The following video highlights the strength of our infrastructure and cyber security within our parent company, in the U.S. as well as Canada.