Accountancy firm standardises extranet on Autonomy

Accountancy firm BDO Stoy Hayward has selected enterprise data search firm Autonomy to standardise its entire corporate extranet.

Accountancy firm BDO Stoy Hayward has selected enterprise data search firm Autonomy to standardise its entire corporate extranet. 

The move means that BDO will extend the use of Autonomy technology across its corporate applications.

The company already uses Autonomy for its corporate intranet, connecting 3,000 users in 600 offices worldwide.

Autonomy’s core technology is based on an Intelligent Data Operating Layer, a single platform that enables enterprises to understand the meaning and context of any piece of corporate information, whatever its format.

The infrastructure layer automatically analyses data in 300 different formats, including text, voice and video.

This allows Autonomy to link the various different file and print systems of BDO’s regional offices, integrating the data and allowing users to search 1 terabyte of information held in enterprise repositories.

BDO’s risk management department also uses Autonomy to index eight million corporate documents and automatically check for conflicts of interest.

The accountancy firm’s head of technology Graham Knight said, “We were looking for an instant response, which is what Autonomy gives us, enabling us to work much more flexibly and at speed.

“Speed of access to content, within a secure environment and wherever we are working from is one of the key benefits we have experienced using Autonomy.”


Vote for your IT greats

Who have been the most influential people in IT in the past 40 years? The greatest organisations? The best hardware and software technologies? As part of Computer Weekly’s 40th anniversary celebrations, we are asking our readers who and what has really made a difference?

Vote now at:



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...