SlideShare a Scribd company logo
1 of 8
Download to read offline
Trust. The platform for
business innovation.
ADP Global Security
HR. Payroll. Benefits.
2
The business operations
protection you need,
from the partner you trust.
These days, every business is — in either theory or practice — a global business. Thanks to the
combination of an increasingly borderless economy and technology tools that become more
sophisticated by the day, companies of all sizes can take advantage of growth opportunities
regardless of geography.
With expanded reach comes expanded risk. You need to be on top of issues like data security,
privacy, fraud, crisis management, and protection of your intellectual property — or find a
trusted partner to help keep you safe and compliant.
At ADP, there is simply no higher priority than the privacy and security of our clients’ data.
But we also recognize the fine line between protected and restricted. Because what good is
business protection if it limits your growth?
That’s why we work hard to provide a trusted environment that gives you the freedom to help
you grow, to pursue your strategic goals, and to do business anywhere and any time, knowing
that we’re here to protect your vital information.
Protection of your business operations. It’s ingrained in every process, every service, every tool
that ADP offers around the world, and just one more way we’ve earned the trust of companies
large and small for more than 60 years.
3
In 2010, the Secret Service arrested more than 1,200
suspects for cybercrime violations, involving over $500
million in actual fraud loss and preventing approximately
$7 billion in additional losses.
Source: Verizon 2011 Data Breach Investigations Report
4
Over the last 60-plus years, ADP has helped countless businesses concentrate on what they do best.
Companies around the world have entrusted us with their mission-critical functions, knowing that we
have the people, the processes, the technologies and the commitment in place to do right by them, 24/7.
With security, risk and privacy concerns so prevalent,
ADP clients know they can trust in the ever-evolving
tools, technologies and safeguards we have in place to
help protect their business. We take a multidisciplinary
approach to continually enhancing and refining the
trusted business outsourcing platform you’ve relied on
for more than half a century, so you can look forward
rather than over your shoulder.
ADP’s global security practice areas include:
• Cyber and information security
• Global privacy and data protection
• Operational risk management
• Controls assurance
• Client security management
• Workforce protection
• Business resilience
• Third-party management
• Security testing and analysis
• Credential assurance
• Fraud and diversion management
• Critical incident response
• Awareness and training
By embedding multiple layers of protection into
ADP products and business processes as well as our
infrastructure, we help ensure that security remains
an integral part of our business…and yours.
Though often mentioned in
the context of IT, it’s actually
much more. Here’s how IBM
defines business resilience:
Why should your organization
settle for anything less?
Source: Robin Gaddum, IBM Global Services,
continuitycentral.com
“The ability of an organization’s
business operations to rapidly
adapt and respond to internal
or external dynamic changes –
opportunities, demands,
disruptions or threats – and
continue operations with limited
impact to the business.”
What is
business
resilience?
A multi-disciplinary approach
to protecting your interests.
5
“Companies should be able to plug into and leverage
repeatable cost effective solutions so that we don’t have
to continually reinvent things.”
Craig Shumard, Former Chief Information Security Officer, CIGNA Corporation
Source: Security for Business Innovation Council, Charting the Path: Enabling the “Hyper-Extended” Enterprise in the Face of Unprecedented Risk
As one of the world’s largest providers of business outsourcing solutions, ADP takes a leadership
role when it comes to data security, privacy and risk mitigation. ADP is active in many security
organizations worldwide, including:
• E-Fraud Network
• FBI InfraGard
• Financial Services Information Sharing and Analysis Center
• Global Center for Threat, Risk and Vulnerability
• High Technology Crime Investigation Association
• Information Risk Executive Council
• Information Security Sharing Forum
• Information Systems Audit and Control Association
• Information Systems Security Association
• International Association of Privacy Professionals
• International Security Managers Association
• National Cyber-Forensics and Training Alliance
• National Cyber Security Alliance
• Security for Business Innovative Council
• USSS Electronic Crimes Task Force
By forging powerful alliances with law enforcement, government agencies, leading security
organizations and professional associations, ADP remains at the forefront of security and privacy
developments, as well as the latest trends and security threats.
We also honor our longstanding commitment to corporate responsibility, contributing our
knowledge to improving data security for all and sharing our expertise with the global community:
• “Cyber smarts” youth programs
• Higher education security career initiatives
• Small business cyber security awareness forums
• Community sessions on personal privacy protection
Driving innovation
around the globe.
“. . . All-encompassing software-driven
systems [are] great tools if you’ve got the
management processes underneath them.”
David Kent, Vice President, Global Risk and Business Resources, Genzyme
Source: Security for Business Innovation Council, When Advanced Persistent Threats Go Mainstream
Our view is that business operations protection
should never limit your opportunities. Instead,
it should facilitate them — giving you the
freedom to confidently explore new markets,
cultivate new partners, and stretch beyond
your usual boundaries.
So, how does ADP turn security into
opportunity? By channeling our global reach,
multi-disciplinary mindset and pursuit of
innovation into the development of game-
changing security platforms, protection
programs and control models. We’ve invested
millions in multi-layered initiatives that seek
to provide the highest levels of protection,
including the launching of our Trusted
Platform Security Initiative (TPSI).
ADP’s largest single security investment to
date, TPSI combines global and integrated
deployments of a Security Information and
Event Management (SIEM) solution with
leading-edge technology and a security data
warehouse, for data analysis and correlation.
By partnering with ADP, your organization gains
the advantages of industry-leading advanced
platform defense, intelligent detection,
automated data protection, fraud defense,
and identity and access management.
Where others see barriers to doing
business, we see opportunities to grow.
6
7
Security: The catalyst for
organizational growth.
If you’ve done business with ADP for any length
of time, you know that we never rest on our
laurels. We’re constantly looking for new ways
to enhance our platforms and drive market
innovation, helping to serve as the springboard
for your success.
When it comes to integrated business protection,
ADP offers an unparalleled organization-wide
focus you simply won’t find anywhere else.
Establishing and maintaining the trust and
confidence of our clients is foundational to our
business model — one we’ve excelled at for
60-plus years in more than 100 countries for
hundreds of thousands of clients. From our
leadership to our infrastructure, our knowledge
base to our technology, our people to our processes,
ADP clients enjoy a singular level of comfort
when pursuing even the most far-flung business
opportunities. We’re delighted you’re along for the
ride, and look forward to helping you capitalize on
your next big opportunity with confidence.
Every security program is only as strong as the people running it. That’s
why ADP clients around the globe know they’re in the best possible hands
when it comes to the protection of important information.
We’ve made security, privacy and risk mitigation integral parts of ADP’s
fiber — those factors are included in our corporate culture and our
business practices — without sacrificing our agility or ability to help
deliver on our promises.
Our internal training is an ongoing program that helps to ensure every
ADP associate worldwide is conversant in the latest information security
and privacy guidelines and secure development practices.
Ensuring your success
is in our DNA.
About ADP:
Automatic Data Processing, Inc. (NASDAQ: ADP), with about $10 billion in revenues and approximately
570,000 clients, is one of the world’s largest providers of business outsourcing solutions. Leveraging
over 60 years of experience, ADP offers a wide range of human resource, payroll, tax and benefits
administration solutions from a single source. ADP’s easy-to-use solutions for employers provide
superior value to companies of all types and sizes. ADP is also a leading provider of integrated
computing solutions to auto, truck, motorcycle, marine, recreational vehicle, and heavy equipment
dealers throughout the world. For more information about ADP or to contact a local ADP sales office,
reach us at 1.800.CALL.ADP (1.800.225.5237) or visit the company’s web site at ADP.com.
ADP and the ADP logo are registered trademarks of ADP, Inc. In the business of your success is a service mark of ADP, Inc.
©2012, ADP, Inc. All other trademarks and service marks are the property of their respective owners.
Automatic Data Processing, Inc.
One ADP Boulevard
Roseland, NJ 07068
adp.com
Toll Free: 1.800.CALL.ADP (1.800.225.5237)
04-3665

More Related Content

What's hot

Navigate LLC Overview
Navigate LLC OverviewNavigate LLC Overview
Navigate LLC Overview
Sarah Carroll
 

What's hot (20)

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Introduction to nudging in IT
Introduction to nudging in ITIntroduction to nudging in IT
Introduction to nudging in IT
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Navigate LLC Overview
Navigate LLC OverviewNavigate LLC Overview
Navigate LLC Overview
 
The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
T-Bytes Agile & AI Operations
T-Bytes Agile & AI OperationsT-Bytes Agile & AI Operations
T-Bytes Agile & AI Operations
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introduction
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 

Viewers also liked

天冷就回來
天冷就回來天冷就回來
天冷就回來
I3YEO
 
Creation of film poster
Creation of film posterCreation of film poster
Creation of film poster
harrietmedia
 
GI2010 symposium-vohnout (nn+metaschool)
GI2010 symposium-vohnout (nn+metaschool)GI2010 symposium-vohnout (nn+metaschool)
GI2010 symposium-vohnout (nn+metaschool)
IGN Vorstand
 
Super stream factsheet
Super stream factsheetSuper stream factsheet
Super stream factsheet
Nathan Gazzard
 
GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)
GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)
GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)
IGN Vorstand
 

Viewers also liked (20)

عرض سيد للمقدمة المصورة
عرض سيد للمقدمة المصورةعرض سيد للمقدمة المصورة
عرض سيد للمقدمة المصورة
 
Hoffmann ppt gi2011_x-border-sdi-analysis+challenges_final
Hoffmann ppt gi2011_x-border-sdi-analysis+challenges_finalHoffmann ppt gi2011_x-border-sdi-analysis+challenges_final
Hoffmann ppt gi2011_x-border-sdi-analysis+challenges_final
 
Swt qt econ-2010
Swt qt econ-2010Swt qt econ-2010
Swt qt econ-2010
 
天冷就回來
天冷就回來天冷就回來
天冷就回來
 
6 Ways to Make Your Next Website the Best Ever with Sara Isenberg
6 Ways to Make Your Next Website the Best Ever with Sara Isenberg6 Ways to Make Your Next Website the Best Ever with Sara Isenberg
6 Ways to Make Your Next Website the Best Ever with Sara Isenberg
 
Creation of film poster
Creation of film posterCreation of film poster
Creation of film poster
 
GI2016 ppt schiller kostenkalkül
GI2016 ppt schiller kostenkalkülGI2016 ppt schiller kostenkalkül
GI2016 ppt schiller kostenkalkül
 
GI2014 ppt mayer oissach dresden_mayer
GI2014 ppt mayer oissach dresden_mayerGI2014 ppt mayer oissach dresden_mayer
GI2014 ppt mayer oissach dresden_mayer
 
GI2014 ppt furdik_juraj 140425prezentacia drazdany
GI2014 ppt furdik_juraj 140425prezentacia drazdanyGI2014 ppt furdik_juraj 140425prezentacia drazdany
GI2014 ppt furdik_juraj 140425prezentacia drazdany
 
GI2010 symposium-vohnout (nn+metaschool)
GI2010 symposium-vohnout (nn+metaschool)GI2010 symposium-vohnout (nn+metaschool)
GI2010 symposium-vohnout (nn+metaschool)
 
GI2012 hoffmann-oddp
GI2012 hoffmann-oddpGI2012 hoffmann-oddp
GI2012 hoffmann-oddp
 
GI2016 ppt böhm saxonian_gdi_1_grenze_hi_hedo
GI2016 ppt böhm saxonian_gdi_1_grenze_hi_hedoGI2016 ppt böhm saxonian_gdi_1_grenze_hi_hedo
GI2016 ppt böhm saxonian_gdi_1_grenze_hi_hedo
 
LEAN_Introduktion til værdistrømsanalyser
LEAN_Introduktion til værdistrømsanalyserLEAN_Introduktion til værdistrømsanalyser
LEAN_Introduktion til værdistrømsanalyser
 
Service zen1
Service zen1Service zen1
Service zen1
 
Charvat ppt gi2011_the pyramid or spider network_final
Charvat ppt gi2011_the pyramid or spider network_finalCharvat ppt gi2011_the pyramid or spider network_final
Charvat ppt gi2011_the pyramid or spider network_final
 
Super stream factsheet
Super stream factsheetSuper stream factsheet
Super stream factsheet
 
GI2013 ppt charvat&team-agri_x_change_strategy_for_agri_food_sector
GI2013 ppt charvat&team-agri_x_change_strategy_for_agri_food_sectorGI2013 ppt charvat&team-agri_x_change_strategy_for_agri_food_sector
GI2013 ppt charvat&team-agri_x_change_strategy_for_agri_food_sector
 
GI2013 ppt andreopoulos+kazakis_v2 the+sustainable+future+eco+landmarks
GI2013 ppt andreopoulos+kazakis_v2 the+sustainable+future+eco+landmarksGI2013 ppt andreopoulos+kazakis_v2 the+sustainable+future+eco+landmarks
GI2013 ppt andreopoulos+kazakis_v2 the+sustainable+future+eco+landmarks
 
GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)
GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)
GI2010 symposium-klosa (explorers pal-amateurvermessungstechnik_osm)
 
GI2016 final programm & proceedings of abstracts & summaries
GI2016 final programm & proceedings of abstracts & summariesGI2016 final programm & proceedings of abstracts & summaries
GI2016 final programm & proceedings of abstracts & summaries
 

Similar to Adp global security trust the platform for business innovation

COMPANY PROFILE
COMPANY PROFILECOMPANY PROFILE
COMPANY PROFILE
Om Kumar
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
ethnos
 

Similar to Adp global security trust the platform for business innovation (20)

Protection You Need from the Partner You Trust
Protection You Need from the Partner You TrustProtection You Need from the Partner You Trust
Protection You Need from the Partner You Trust
 
MindSHARE: Staying Secure Online
MindSHARE: Staying Secure OnlineMindSHARE: Staying Secure Online
MindSHARE: Staying Secure Online
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
 
Brochure cott group
Brochure cott groupBrochure cott group
Brochure cott group
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
c~Sharpe Security Services
c~Sharpe Security Servicesc~Sharpe Security Services
c~Sharpe Security Services
 
COMPANY PROFILE
COMPANY PROFILECOMPANY PROFILE
COMPANY PROFILE
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Fiddich: Helping Businesses Grow
Fiddich:   Helping Businesses GrowFiddich:   Helping Businesses Grow
Fiddich: Helping Businesses Grow
 
Fiddich: Helping Businesses Grow
Fiddich:   Helping Businesses GrowFiddich:   Helping Businesses Grow
Fiddich: Helping Businesses Grow
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Bigradap Digital Profile
Bigradap Digital ProfileBigradap Digital Profile
Bigradap Digital Profile
 
Case Study - Digital HRMS a customizable & modular HR platform to drive your ...
Case Study - Digital HRMS a customizable & modular HR platform to drive your ...Case Study - Digital HRMS a customizable & modular HR platform to drive your ...
Case Study - Digital HRMS a customizable & modular HR platform to drive your ...
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
profile
profileprofile
profile
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptx
 

More from Nathan Gazzard

Infographs wg adp_national_employer_advice_line_report_october 2013
Infographs wg adp_national_employer_advice_line_report_october 2013Infographs wg adp_national_employer_advice_line_report_october 2013
Infographs wg adp_national_employer_advice_line_report_october 2013
Nathan Gazzard
 
Deloitte report workplace_of_the_future_jul2013
Deloitte report workplace_of_the_future_jul2013Deloitte report workplace_of_the_future_jul2013
Deloitte report workplace_of_the_future_jul2013
Nathan Gazzard
 
Using the lessons of golf to develop a financial strategy for 2013 and beyond
Using the lessons of golf to develop a financial strategy for 2013 and beyondUsing the lessons of golf to develop a financial strategy for 2013 and beyond
Using the lessons of golf to develop a financial strategy for 2013 and beyond
Nathan Gazzard
 
Mgi disruptive technologies_executive_summary_may2013
Mgi disruptive technologies_executive_summary_may2013Mgi disruptive technologies_executive_summary_may2013
Mgi disruptive technologies_executive_summary_may2013
Nathan Gazzard
 
Hr business-process-outsourcing
Hr business-process-outsourcingHr business-process-outsourcing
Hr business-process-outsourcing
Nathan Gazzard
 
Payforce implementation methodology overview1
Payforce implementation methodology overview1Payforce implementation methodology overview1
Payforce implementation methodology overview1
Nathan Gazzard
 
Big picture 2nd airport
Big picture 2nd airportBig picture 2nd airport
Big picture 2nd airport
Nathan Gazzard
 

More from Nathan Gazzard (12)

Infographs wg adp_national_employer_advice_line_report_october 2013
Infographs wg adp_national_employer_advice_line_report_october 2013Infographs wg adp_national_employer_advice_line_report_october 2013
Infographs wg adp_national_employer_advice_line_report_october 2013
 
Deloitte report workplace_of_the_future_jul2013
Deloitte report workplace_of_the_future_jul2013Deloitte report workplace_of_the_future_jul2013
Deloitte report workplace_of_the_future_jul2013
 
Using the lessons of golf to develop a financial strategy for 2013 and beyond
Using the lessons of golf to develop a financial strategy for 2013 and beyondUsing the lessons of golf to develop a financial strategy for 2013 and beyond
Using the lessons of golf to develop a financial strategy for 2013 and beyond
 
Mgi disruptive technologies_executive_summary_may2013
Mgi disruptive technologies_executive_summary_may2013Mgi disruptive technologies_executive_summary_may2013
Mgi disruptive technologies_executive_summary_may2013
 
Adp payroll 1 pager
Adp payroll  1 pager Adp payroll  1 pager
Adp payroll 1 pager
 
Hr business-process-outsourcing
Hr business-process-outsourcingHr business-process-outsourcing
Hr business-process-outsourcing
 
Adp the big picture
Adp the big pictureAdp the big picture
Adp the big picture
 
The big picture
The big pictureThe big picture
The big picture
 
The big picture
The big pictureThe big picture
The big picture
 
Payforce implementation methodology overview1
Payforce implementation methodology overview1Payforce implementation methodology overview1
Payforce implementation methodology overview1
 
Big picture 2nd airport
Big picture 2nd airportBig picture 2nd airport
Big picture 2nd airport
 
Pwc tco 2011
Pwc tco 2011Pwc tco 2011
Pwc tco 2011
 

Adp global security trust the platform for business innovation

  • 1. Trust. The platform for business innovation. ADP Global Security HR. Payroll. Benefits.
  • 2. 2 The business operations protection you need, from the partner you trust. These days, every business is — in either theory or practice — a global business. Thanks to the combination of an increasingly borderless economy and technology tools that become more sophisticated by the day, companies of all sizes can take advantage of growth opportunities regardless of geography. With expanded reach comes expanded risk. You need to be on top of issues like data security, privacy, fraud, crisis management, and protection of your intellectual property — or find a trusted partner to help keep you safe and compliant. At ADP, there is simply no higher priority than the privacy and security of our clients’ data. But we also recognize the fine line between protected and restricted. Because what good is business protection if it limits your growth? That’s why we work hard to provide a trusted environment that gives you the freedom to help you grow, to pursue your strategic goals, and to do business anywhere and any time, knowing that we’re here to protect your vital information. Protection of your business operations. It’s ingrained in every process, every service, every tool that ADP offers around the world, and just one more way we’ve earned the trust of companies large and small for more than 60 years.
  • 3. 3 In 2010, the Secret Service arrested more than 1,200 suspects for cybercrime violations, involving over $500 million in actual fraud loss and preventing approximately $7 billion in additional losses. Source: Verizon 2011 Data Breach Investigations Report
  • 4. 4 Over the last 60-plus years, ADP has helped countless businesses concentrate on what they do best. Companies around the world have entrusted us with their mission-critical functions, knowing that we have the people, the processes, the technologies and the commitment in place to do right by them, 24/7. With security, risk and privacy concerns so prevalent, ADP clients know they can trust in the ever-evolving tools, technologies and safeguards we have in place to help protect their business. We take a multidisciplinary approach to continually enhancing and refining the trusted business outsourcing platform you’ve relied on for more than half a century, so you can look forward rather than over your shoulder. ADP’s global security practice areas include: • Cyber and information security • Global privacy and data protection • Operational risk management • Controls assurance • Client security management • Workforce protection • Business resilience • Third-party management • Security testing and analysis • Credential assurance • Fraud and diversion management • Critical incident response • Awareness and training By embedding multiple layers of protection into ADP products and business processes as well as our infrastructure, we help ensure that security remains an integral part of our business…and yours. Though often mentioned in the context of IT, it’s actually much more. Here’s how IBM defines business resilience: Why should your organization settle for anything less? Source: Robin Gaddum, IBM Global Services, continuitycentral.com “The ability of an organization’s business operations to rapidly adapt and respond to internal or external dynamic changes – opportunities, demands, disruptions or threats – and continue operations with limited impact to the business.” What is business resilience? A multi-disciplinary approach to protecting your interests.
  • 5. 5 “Companies should be able to plug into and leverage repeatable cost effective solutions so that we don’t have to continually reinvent things.” Craig Shumard, Former Chief Information Security Officer, CIGNA Corporation Source: Security for Business Innovation Council, Charting the Path: Enabling the “Hyper-Extended” Enterprise in the Face of Unprecedented Risk As one of the world’s largest providers of business outsourcing solutions, ADP takes a leadership role when it comes to data security, privacy and risk mitigation. ADP is active in many security organizations worldwide, including: • E-Fraud Network • FBI InfraGard • Financial Services Information Sharing and Analysis Center • Global Center for Threat, Risk and Vulnerability • High Technology Crime Investigation Association • Information Risk Executive Council • Information Security Sharing Forum • Information Systems Audit and Control Association • Information Systems Security Association • International Association of Privacy Professionals • International Security Managers Association • National Cyber-Forensics and Training Alliance • National Cyber Security Alliance • Security for Business Innovative Council • USSS Electronic Crimes Task Force By forging powerful alliances with law enforcement, government agencies, leading security organizations and professional associations, ADP remains at the forefront of security and privacy developments, as well as the latest trends and security threats. We also honor our longstanding commitment to corporate responsibility, contributing our knowledge to improving data security for all and sharing our expertise with the global community: • “Cyber smarts” youth programs • Higher education security career initiatives • Small business cyber security awareness forums • Community sessions on personal privacy protection Driving innovation around the globe.
  • 6. “. . . All-encompassing software-driven systems [are] great tools if you’ve got the management processes underneath them.” David Kent, Vice President, Global Risk and Business Resources, Genzyme Source: Security for Business Innovation Council, When Advanced Persistent Threats Go Mainstream Our view is that business operations protection should never limit your opportunities. Instead, it should facilitate them — giving you the freedom to confidently explore new markets, cultivate new partners, and stretch beyond your usual boundaries. So, how does ADP turn security into opportunity? By channeling our global reach, multi-disciplinary mindset and pursuit of innovation into the development of game- changing security platforms, protection programs and control models. We’ve invested millions in multi-layered initiatives that seek to provide the highest levels of protection, including the launching of our Trusted Platform Security Initiative (TPSI). ADP’s largest single security investment to date, TPSI combines global and integrated deployments of a Security Information and Event Management (SIEM) solution with leading-edge technology and a security data warehouse, for data analysis and correlation. By partnering with ADP, your organization gains the advantages of industry-leading advanced platform defense, intelligent detection, automated data protection, fraud defense, and identity and access management. Where others see barriers to doing business, we see opportunities to grow. 6
  • 7. 7 Security: The catalyst for organizational growth. If you’ve done business with ADP for any length of time, you know that we never rest on our laurels. We’re constantly looking for new ways to enhance our platforms and drive market innovation, helping to serve as the springboard for your success. When it comes to integrated business protection, ADP offers an unparalleled organization-wide focus you simply won’t find anywhere else. Establishing and maintaining the trust and confidence of our clients is foundational to our business model — one we’ve excelled at for 60-plus years in more than 100 countries for hundreds of thousands of clients. From our leadership to our infrastructure, our knowledge base to our technology, our people to our processes, ADP clients enjoy a singular level of comfort when pursuing even the most far-flung business opportunities. We’re delighted you’re along for the ride, and look forward to helping you capitalize on your next big opportunity with confidence. Every security program is only as strong as the people running it. That’s why ADP clients around the globe know they’re in the best possible hands when it comes to the protection of important information. We’ve made security, privacy and risk mitigation integral parts of ADP’s fiber — those factors are included in our corporate culture and our business practices — without sacrificing our agility or ability to help deliver on our promises. Our internal training is an ongoing program that helps to ensure every ADP associate worldwide is conversant in the latest information security and privacy guidelines and secure development practices. Ensuring your success is in our DNA.
  • 8. About ADP: Automatic Data Processing, Inc. (NASDAQ: ADP), with about $10 billion in revenues and approximately 570,000 clients, is one of the world’s largest providers of business outsourcing solutions. Leveraging over 60 years of experience, ADP offers a wide range of human resource, payroll, tax and benefits administration solutions from a single source. ADP’s easy-to-use solutions for employers provide superior value to companies of all types and sizes. ADP is also a leading provider of integrated computing solutions to auto, truck, motorcycle, marine, recreational vehicle, and heavy equipment dealers throughout the world. For more information about ADP or to contact a local ADP sales office, reach us at 1.800.CALL.ADP (1.800.225.5237) or visit the company’s web site at ADP.com. ADP and the ADP logo are registered trademarks of ADP, Inc. In the business of your success is a service mark of ADP, Inc. ©2012, ADP, Inc. All other trademarks and service marks are the property of their respective owners. Automatic Data Processing, Inc. One ADP Boulevard Roseland, NJ 07068 adp.com Toll Free: 1.800.CALL.ADP (1.800.225.5237) 04-3665