{"id":1959,"date":"2020-08-07T17:11:03","date_gmt":"2020-08-07T11:41:03","guid":{"rendered":"https:\/\/www.lemnisk.co\/blog\/?p=1959"},"modified":"2020-08-11T17:20:29","modified_gmt":"2020-08-11T11:50:29","slug":"evaluating-martech-vendor-readiness","status":"publish","type":"post","link":"https:\/\/www.lemnisk.co\/blog\/evaluating-martech-vendor-readiness\/","title":{"rendered":"Evaluating Martech Vendor Readiness: 7 Questions to Consider for Financial Marketers"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The current pandemic situation has given rise to an insurmountable number of martech vendors. As financial companies are forced to develop a rock-solid digital transformation strategy, it becomes important to choose the right vendors that can help them meet their business goals and objectives. Evaluating martech vendor readiness is a crucial aspect for any financial company and has to be done meticulously. However, in the rush to adopt a digital-first strategy, marketers often ignore a very important vendor capability &#8211; data security.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the past couple of years, there have been frequent reports about data security breaches in leading SaaS-based organizations. Just early this year, popular video conferencing platform, Zoom came under heavy criticism in the media for their security lapses. Similarly, any martech vendor in the world can have the same issues. <a href=\"https:\/\/www.lemnisk.co\/blog\/financial-sector-post-covid\/\" target=\"_blank\" rel=\"noopener\">The Banking, Financial Services, and Insurance (BFSI)<\/a> industries deal with very sensitive data. Hence, martech vendors need to undergo serious scrutiny regarding their ability to handle data privacy and security.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">We have compiled 7 questions for evaluating vendor readiness with respect to data security, privacy, and compliance:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><b>Evaluating Martech Vendor Readiness<\/b><\/h2>\n<p>&nbsp;<\/p>\n<h3><b>1. Security Policies<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1961\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/security-policies.jpeg\" alt=\"Evaluating Vendor Readiness: security policies\" width=\"500\" height=\"334\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>Are there comprehensive security policies in place at the leadership level to safeguard customer data?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Financial customer data is extremely valuable and should be treated with the utmost care. Trusting your data with a vendor is a huge decision and commitment. And decisions shouldn\u2019t be made only on the features offered by the vendor\u2019s martech solution. Financial marketers should first check if the vendor\u2019s leadership team have ensured adequate security policies in place.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>2. Incident Management &amp; Business Continuity Management<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1962\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/incident-management.jpeg\" alt=\"Evaluating Vendor Readiness: incident management\" width=\"500\" height=\"375\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>In the event of a security incident, are there appropriate management responsibilities and<\/b><\/p>\n<p><b>procedures in place?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Financial marketers should always assess a vendor\u2019s incident management capabilities. How do they react when there is a security breach? What will their first plans of action to mitigate threats? Do they have a good business continuity plan once the issue is resolved?<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>3. Asset Management<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1963\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/asset-management.jpeg\" alt=\"Evaluating vendor readiness: asset management\" width=\"500\" height=\"334\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>Has the customer data been classified in line with set expectations?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">How is the vendor going to handle your valuable customer data? What are the protocols involved? How are the assets going to be managed? Are there asset management plans or guidelines?<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>4. Communication Security<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1964\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/communication-security.jpeg\" alt=\"Evaluating vendor readiness: communication security\" width=\"500\" height=\"343\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>Do vendors have network controls &amp; information transfer policies and procedures in place?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Martech tools involve the transfer of data from one system to another. Vendors need to have network controls and information transfer policies in place when they share and feed this data across multiple technologies and systems.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>5. Access Control &amp; Cryptography<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1965\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/access-control.jpeg\" alt=\"Evaluating vendor readiness: access control\" width=\"500\" height=\"334\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>Is there effective and proper use of cryptography employed for customer information protection?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Cryptography basically involves the use of encryption to make the data more secure. When a martech vendor is handling sensitive client data, they need to ensure that<\/span> <span style=\"font-weight: 400;\">they use proper cryptography techniques to protect and safeguard their data.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>6. Third-Party VAPT<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1966\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/third-party-VAPT.jpeg\" alt=\"Evaluating vendor readiness: third-party VAPT\" width=\"500\" height=\"334\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><b>How frequently are Vulnerability Assessment &amp; Penetration Tests (VAPT) run on their systems and are there any available reports?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">VAPT tests point out the vulnerabilities in a technology infrastructure. The more frequent a martech vendor does these tests, the better is for them to iron out any security vulnerabilities. If such tests are done, financial marketers should always ask for test reports that they themselves can analyze and verify.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>7. Security Compliance<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1967\" src=\"https:\/\/www.lemnisk.co\/blog\/wp-content\/uploads\/2020\/08\/compliance.jpeg\" alt=\"Evaluating vendor readiness: compliance\" width=\"500\" height=\"281\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>Have vendors achieved security compliance (ISO 27001:2013 &amp; ISO 27018:2014)?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">If martech vendors have a security certification such as an\u00a0 ISO certification, it builds a lot of credibility for them and makes them more trustworthy. Financial marketers should always partner with a vendor who has their security compliance done from a reputed organization such as ISO.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>In Conclusion<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Financial marketers are under a lot of pressure to boost their digital revenue. To do it successfully, they need to invest in martech solutions from reliable vendors. Vendors are accountable for the data security standards demanded by the Financial Services industry. It\u2019s very important that they have satisfying answers to all the 7 questions mentioned in this article. These data security questions were carefully chosen to help financial marketers evaluate vendor readiness and select the right vendor for their business.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Lemnisk\u2019s Hybrid <a href=\"https:\/\/www.lemnisk.co\/customer-data-platform\/\" target=\"_blank\" rel=\"noopener\">Customer Data Platform<\/a> adheres to the GDPR guidelines of customer consent and the management of first-party data.\u00a0<\/span>Lemnisk is ISO 27001 certified and ISO 27018 compliance certified, accredited by BSI.\u00a0<span style=\"font-weight: 400;\">We value your privacy preferences and we make sure that your personal data is treated with the utmost security whenever you engage with us or use our technology.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.lemnisk.co\/contactus\/\" target=\"_blank\" rel=\"noopener\">Get in touch<\/a> with us to know more about how we can help your business.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h5>By Bijoy K.B | Senior Associate Marketing at Lemnisk<\/h5>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The current pandemic situation has given rise to an insurmountable number of martech vendors. As financial companies are forced to develop a rock-solid digital transformation strategy, it becomes important to choose the right vendors that can help them meet their business goals and objectives. Evaluating martech vendor readiness is a crucial aspect for any financial [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1973,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,156,155,65,154],"tags":[157,158,84,34,159],"class_list":["post-1959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-blogs","category-data-privacy","category-data-security","category-financial-marketing","category-martech-vendor","tag-data-privacy","tag-data-security","tag-financial-marketing","tag-martech","tag-martech-vendor"],"_links":{"self":[{"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/posts\/1959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/comments?post=1959"}],"version-history":[{"count":6,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/posts\/1959\/revisions"}],"predecessor-version":[{"id":1977,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/posts\/1959\/revisions\/1977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/media\/1973"}],"wp:attachment":[{"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/media?parent=1959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/categories?post=1959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lemnisk.co\/blog\/wp-json\/wp\/v2\/tags?post=1959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}