The Banking and Financial Services industry is an ever-changing landscape, responding to the demands of customers for mobility, stringent regulatory changes and the decline of physical banking facilities .

The innovative and versatile qualities of iQuila means it can support the ever-transforming landscape within the dynamic Banking and Financial Services industry.

Secure Admin PCs:

Data security is paramount in any sector, however none more essential than in Financial Services.
With iQuila, devices can be segmented to only communicate with other specific devices. This will allow a company to create a closed and securely encrypted circuit. This is possible due to macro-level configuration within the extremely powerful policy management function.

Business Continuity / Disaster Recover – Reduce your downtime:

Banks and Financial Institutions handle millions of transactions every day and a robust Business Continuity and Disaster Recovery policy is essential as even a short period of downtime can severely impact services resulting in loss of customer confidence.

By using iQuila Enterprise services can be maintained even when primary virtual/physical servers go offline. Because of the way the iQuila Protocol has been developed all physical and virtual servers are on the same IP segment and so if one data centre goes down, a replacement servers can be spun up immediately and automatically, without any loss of service.. Additionally, Servers and Data Centres around the world can be set to have “always-on” disaster recovery, ensuring unerring service for customers.

Mobile Banking Apps:

Working closely with Banking App developers, iQuila can help provide an additional layer of security to app connections, even when a customer is connected to open public networks or even rogue access points/hotspot. iQuila establishes a direct, encrypted tunnel between the app and the mobile banking server, ensuring complete data privacy and security, preventing Man in the Middle (MITM) attacks.

Secure end-point devices

There is a prevailing trend to allow for a more flexible, home based workforce. In industries such as financial services the data potentially being accessed can be highly sensitive and a company needs to know who is accessing that data and how. This cannot easily be monitored using legacy applications for home-based working.

But because iQuila stretches your LAN from head office to a device anywhere in the world, all the protections you have available to you to protect end-point devices at head office are extended over the VEN for remote workers making these devices as secure as if they were plugged into a LAN port at head office.

Because the connection is Layer 2 the connected devices are now subject to company Active Directory security protocols and are, in effect, part of the company LAN.
Further security measures can be enforced such as Certificate-based authorisation and device recognition using MAC address to ensure only specified devices connect to the system.
This setup will ensure that the home office environment has secure access to necessary data and that the VoIP telephone is an extension on the company exchange.

No more data breaches due to lost laptops:

To take this scenario a step further, if a laptop is configured to emulate a dumb terminal or thin client then the iQuila Bridge can be leveraged to provide a secure connection, via the laptop, to the LAN at Head Office allowing every resource available, in line with group policy, to a specific user. If a second iQuila Bridge is installed at the worker's home it will provide the same, completely secured, connection to the company LAN.

Because iQuila connects on Layer 2, this can be configured using MAC address so that only a specified device will be allowed access to the company network when plugged in to either iQuila Bridge. No other device plugged into the iQuila bridge will be able to access the network. And because the laptop has been configured to emulate a dumb terminal or thin client, when it is not connected to the iQuila Bridge at either end, it is completely void of data. This scenario now means that a lost device no longer constitutes a data breach, as the device itself contains no data at all.
By using the iQuila Bridge the remote worker can have both secure voice and data connections in their home. By plugging the end-point device into the data port of the iQuila Bridge and a VoIP telephone into the other port all communications are passed down a secure encrypted tunnel from the iQuila server to the iQuila bridge. This secures the connection from MITM & Rogue AP attacks; it also ensures the only Internet access for the device is filtered and protected in line with head office security policies.