Information technology, system resiliency and security

Our robust, best-of-breed information technology security standards – incorporating hardware, software and resources – are mandated by the Raymond James Financial global business.

Key features include:

24/7 cyber threat centre

Monitoring and blocking malicious and suspicious activity, triggering immediate intervention and remediation, including any branches that use the Raymond James network equipment.

Regular vulnerability and penetration tests

To scan the Raymond James network from the internet, wireless connections and internally, looking for potential weak points in the systems.

Next-generation firewalls

Application-responsive with built-in threat prevention.

External and internal intrusion detection systems

Real-time monitoring for suspicious or malicious traffic.

Thorough vendor risk assessments

Performed locally, in collaboration with the US, to vet any vendors with whom we intend to conduct business.

Key technology assets are hosted and protected within the Raymond James Private Cloud and the associated data is managed by Raymond James IT.

This is supported by:

Two co-location datacentres

Hosted in managed data centres, with redundant power and cooling. These centres are off-site meaning that if a location encounters any problem, it’s dealt with in isolation; either IT systems or workplace recovery.

Regular disaster recovery and workplace recovery

We conduct tests to simulate a data centre or office becoming unavailable, ensuring minimal interruption to business systems.

Multiple workplace recovery locations around the UK

These workplace recovery locations provide temporary office space, along with all the business tools required for Raymond James to fully operate.

IT support staff and technical expertise

Including support, infrastructure and development teams, as well as application administrators, business analysts, project managers and security officers.

Programme Delivery Board

The Board meets regularly to prioritise and plan key business projects, enabling us to deliver enhancements and efficiencies both internally and externally.

Proactive monitoring

Our technological systems are monitored 24 hours a day, 365 days a year, for signs of tampering or unauthorised activity. We use encryption, virtual private networks, penetration/vulnerability testing, and the latest firewall and antivirus technology. We also use email monitoring for regulatory and compliance purposes, while maintaining strict controls to limit and monitor employee access to our systems.

Our information technology professionals constantly research and develop enhancements to keep us at the vanguard of data security. 

Raymond James infrastructure

The world of technology is rapidly evolving and Raymond James has dedicated teams in our service and cyber security centres at our parent company in the US, Raymond James Financial.

Businesses and individuals are facing an increased number of cyber threats on a daily basis. The rigorous measures we have in place allow Raymond James to proactively detect and anticipate cyber threats before they become issues, so we can protect both you and your clients from fraud, data theft and ransomware.

Take a look inside Raymond James’ cyber threat centre below.

Back to Our proposition