Eze Castle Integration Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Cloud Computing RSS

Tech for Hedge Fund Startups: Mistakes to Avoid and Guidance for Success

By Zorela Georgescu ,
Thursday, April 28th, 2016

The financial services industry is currently under tremendous pressure to meet both investor and due diligence requirements. Thus, it is increasingly important to maximize technology to meet these pressures. To conclude our six-part hedge fund launch webinar series, we spoke with Eze Castle Integration’s own managing director Vinod Paul, who shared insights about current IT challenges and demands and how today’s hedge funds can employ best practices for operational excellence.

Key Priorities for New Managers

Paul defined cybersecurity and scalability as two primary technology considerations for new managers. You must first understand your firm’s specific vulnerabilities and exposures. One of the most common mistakes new launches make, according to Paul, is assuming that they only require the basic bare minimum in terms of technology. He urges new managers to pick an IT solution with operational growth in mind -- considering the business not at the onset, but in three to five years.

Service Provider Selection Criteria

Paul continued to place emphasis on customized IT, stating that when it comes to outsourcing, it is imperative that a firm carries out proper due diligence in choosing a provider to meet the firm’s unique needs. “You want enter into a true partnership that offers open lines of communication, flexibility, and ultimately, trust and accountability,” he said. Brand and reputation, long lasting relationships with clients, and industry experience are some of criteria Paul feels are most important when selecting a service provider. “Don’t step in to it with the attitude that a current provider is good enough, for right now,” he cautioned. The service provider should not only address day-to-day operations but also anticipate potential problems down the road.

Categorized under: Launching A Hedge Fund  Cloud Computing  Security  Hedge Fund Operations  Infrastructure  Outsourcing  Trends We're Seeing 



What Is Multi-Factor Authentication, and How Can I Use It?

By Mary Beth Hamilton,
Tuesday, April 12th, 2016

The official definition given in TechTarget’s IT Dictionary reads: “Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users’ information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.”

password requiredAt the heart of authentication is controlling access to ensure individuals only access the information they need. With stories of password compromises becoming more common it is important to understand the types of authentication factors available and good computing practices.
 
As part of Information Security Planning, firms should also identify applications, services or websites that require at least one level of authentication (e.g. password protection, PC certificate, or security tokens) as well as any that may require multi-factor authentication.

Following are the three commonly used authentication factors:

Categorized under: Security  Cloud Computing 



What is Active Threat Protection? Stopping Advanced Persistent Threats

By Mary Beth Hamilton,
Tuesday, March 8th, 2016

According to TechTarget’s SearchSecurity, “an advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.” As with most sophisticated cybersecurity attacks, the goal of the intruder is to capture valuable information and steal data. APT intrusions are often focused on high-value information and sectors such as the financial industry.

The cybersecurity landscape is constantly changing and today the cyber threat actors range from organized crime to state sponsors.

How do hackers gain access?

When it comes to advanced persistent threats, the cyber criminals often use targeted social engineering tactics including spear phishing. In a spear phishing incident, criminals target specific companies or individuals and conduct background research to compile employee names, titles and contact information. Social networks are common resources crawled for this information. Obtaining such details and observing communications provides criminals with the tools to mirror email addresses, website URLs and dialect. The end result is the criminal’s identity masqueraded as a legitimate, trustworthy source.

How can you defend against Advanced Persistent Threats?

Categorized under: Security  Launching A Hedge Fund  Cloud Computing  Trends We're Seeing  Videos And Infographics 



How to Launch a Hedge Fund: Cap Intro, Legal & Tech Tips

By Zorela Georgescu,
Thursday, March 3rd, 2016

Successfully launching a hedge fund is a complex endeavor. Not only must emerging managers evaluate traditional deployment strategies, but consider current factors influencing the financial landscape.Hedge Fund Launch Webinar Series

Last week, Eze Castle Integration presented a webinar, “How to Launch a Hedge Fund,” featuring an expert panel that addressed some critical areas for consideration, notably capital introduction, legal and technology. There was quite a bit of content discussed during the 1-hour event, so we’ve pulled out some key takeaways.

Click here or scroll down to watch the webcast in its entirety.

Capital Raising (Paul Schultz, Director of Capital Introduction, Wells Fargo Prime Services)

  • Examine both content and context, i.e. cash inflows and outflows as well as the “big picture” that accounts for volatility

  • Be aware of the kinds of investors coming into the hedge fund space. Large and institutional pension plans are currently the largest investor base.

  • Be prepared when speaking to investors. Target those who have a history of being receptive to founder share class and who may offer lower management and performance fees.

  • Show investors that you have a 3+ year budget for working capital without any performance fees.

  • Have a well thought-out blueprint. Clarity and intention make all the difference.

Categorized under: Launching A Hedge Fund  Cloud Computing  Security  Disaster Recovery  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Business Continuity Planning  Trends We're Seeing  Videos And Infographics 



Hedge Fund Technology Tips for New Startups, Part 2

By Kaleigh Alessandro,
Tuesday, February 23rd, 2016

The following is the second excerpt from our new whitepaper, Launching a Hedge Fund: 10 Keys to Success. Don't forget to visit Hedge IT on Thursday as we reveal the last of our key considerations for starting a hedge fund.

To read part one, click here

Develop an IT budget for your first 2-3 years.

Operating capital may be limited in the first few years after your launch, so careful budgeting and long range planning will serve your firm well. Your information technology budget should include priorities and figures for at least two to three years, including infrastructure/hardware and software requirements. Some questions you’ll want to consider:

  • How many offices are you launching with? Do you plan to open additional offices in the near future?

  • How many users do you have on day one? How many can you expect to have in years 2 and 3?

  • Where are your offices located? Are there cost differences between domestic and international offices?

  • What are your trading practices and how does this impact your budget?

  • What kinds of systems do you need? (Order Management, Portfolio Accounting, Risk Management, CRM, etc.)

Ensure your technology budget coincides with your firm’s growth plan. Do you expect to grow quickly? Open new offices? Expand internationally? You will need to account for these changes.

Understand hedge fund regulations and how they affect your firm.

Governmental oversight of the financial industry has evolved dramatically in the last decade. Hedge funds, private equity firms and registered investment advisers now operate in a world where they are beholden to regulatory bodies with growing expectations and requirements. When launching your hedge fund, you’ll need to be clear up front with any responsibilities you may have to any applicable agencies – in the United States, that means the Securities and Exchange Commission (SEC). Are you required to register? If so, represent your firm accurately and be descriptive of your operations. If not forthcoming, you may open up your firm to serious regulatory and criminal prosecution.

Categorized under: Launching A Hedge Fund  Cloud Computing  Security  Disaster Recovery  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Business Continuity Planning  Software  Trends We're Seeing 



10 Keys to Launching a Hedge Fund: A Video Premiere

By Kaleigh Alessandro,
Tuesday, February 16th, 2016

Today's hedge funds are facing an environment defined by regulatory pressure, investor demands and fierce competition. For hedge fund startups, the challenges are even greater, so too are the demands. Successfully operating a new startup beyond the first year is a feat many managers struggle to accomplish, therefore it's critical for emerging managers to gain a full understanding of the industry that awaits them and the hurdles they should expect to face.
 
While the list of considerations is surely long for new managers, we've whittled it down to 10 Keys to Launching a Hedge Fund Successfully - a guide for new startups to use when setting off on their new journey.
 
Take a look at our latest video for a quick look at our 10 Keys to Success. And be sure to come back to Hedge IT later this week when we'll be sharing an excerpt from our brand new whitepaper on the same topic!
 

 

Categorized under: Launching A Hedge Fund  Cloud Computing  Security  Disaster Recovery  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Business Continuity Planning  Trends We're Seeing 



IT Security Dos and Don'ts to Live By

By Kaleigh Alessandro,
Tuesday, January 12th, 2016

We spend a lot of time educating our clients about security best practices and encouraging them to implement comprehensive security policies and procedures to mitigate risk and protect both the firm and its employees. And for good reason. Data breaches continue to wreak havoc for businesses, and the cost is steadily rising. According to the Ponemon Institute, the total average cost of a data breach is now $3.8 million, up from $3.5 million in 2014.

IT security best practices ebook

While companywide policies should reflect long-range expectations and corporate best practices, they should also include tactical recommendations that employees can follow to ensure they are complying with the company’s overall risk strategy. In addition to providing employees with security best practices they should follow, don’t forget to also include a list of actions they should not. Here are just a few pieces of advice we regularly offer our investment firm clients. You can download our full IT Security Dos & Don'ts eBook by clicking here

DO:

  • Lock your computer and mobile phone(s) when you leave your desk and/or office

  • Use care when entering passwords in front of others

  • Create and maintain strong passwords and change them every 60-90 days (We recommend a combination of lowercase & uppercase letters and special characters)

Categorized under: Security  Cloud Computing  Disaster Recovery  Hedge Fund Operations  Infrastructure  Communications  Business Continuity Planning  Trends We're Seeing 



IT Security Dos and Dont's: A Best Practice Guide (Video)

By Kaleigh Alessandro,
Tuesday, December 29th, 2015

If you’re a loyal Hedge IT reader, you may remember we highlighted a few simple dos and don’ts that, when utilized, can go a long way in shoring up your firm’s security. To make it easy, we’ve put these tips together into a video. Take a look below and discover a vast range of security tips and tricks from email encryption to proper security measures for protecting computers and mobile devices. 

 

Categorized under: Videos And Infographics  Cloud Computing  Security  Disaster Recovery  Hedge Fund Operations  Infrastructure  Communications  Business Continuity Planning  Trends We're Seeing 



Four Hedge Fund IT Mistakes to Avoid in 2016 (Tech Tips Video)

By Mary Beth Hamilton,
Tuesday, December 22nd, 2015

Welcome back for our monthly Eze Tech Tips Video.

2016 is just around the corner, which means we’re entering resolution time and the hedge fund launch season. So, here’s our list of the top four hedge fund IT mistakes you need to resolve not to make in 2016.


 

Categorized under: Launching A Hedge Fund  Cloud Computing  Hedge Fund Operations  Trends We're Seeing  Videos And Infographics 



Examining the Changing Role of the Hedge Fund CTO

By Kaleigh Alessandro,
Thursday, December 17th, 2015

Times have changed. There is little doubt that the hedge fund industry has evolved in recent years with the rise of new regulations, the wide spread adoption of cloud services and deep focus on cybersecurity risks. CTOs have to wear many hatsThese changes have affected the way many firms do business on both operational and technology levels.

But what effect do these changes have for the person responsible for technology at a hedge fund or investment firm? As a Chief Technology Officer (or comparable role: Director of IT, Chief Information Officer, etc.), one has historically been responsible for day-to-day IT functions and routine technology refreshes. But as the industry has experienced rapid change over the last several years, so too have the CTOs and their responsibilities.

Categorized under: Trends We're Seeing  Cloud Computing  Hedge Fund Operations  Infrastructure  Outsourcing 



View earlier posts in the archive

Recent Posts / All Posts


 

Eze Cloud Information

Subscribe to Hedge IT

Follow Us

    Follow us on Twitter Follow us on FaceBook Follow us on LinkedIn Follow us on Google RSS Feed

Recent Articles

Categories

Archives