Eze Castle Integration Eze Castle Integration

Hedge IT Blog

Cybersecurity for Financial Institutions: NYC Panel Highlights

By Kaleigh Alessandro,
Tuesday, July 28th, 2015

We take our thought leadership efforts seriously around here, and we’re always interested in educating our clients and partners about technology issues that can affect them. We’re also fortunate to be invited to speak frequently on a variety of hedge fund technology topics – most recently, cybersecurity. Our own Managing Director, Vinod Paul, participated in a panel session last month in New York dedicated to this topic.

Featuring speakers from Eze Castle Integration, Citrin Cooperman, Akin Gump, and CFO Consulting Partners, the panel spoke candidly about how the cybersecurity landscape is evolving for financial services firms and how they can begin to comply with recent recommendations from the SEC and FINRA. Following are some highlights from the event. If you’d like to listen to the podcast of the panel, click here.Hedge Fund Cyber Security Panel

  • Many firms question whether they need to do anything to comply with SEC cybersecurity recommendations. The answer is yes. And it’s more than technology firms need to employ.
     

  • Cybersecurity governance is a critical component. Who is in charge beyond the IT team? Someone at the firm needs to take accountability for this process and interface with various functions to ensure compliance. Ideally, a Chief Compliance Officer or Chief Information Security Officer should handle. 

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Trends We're Seeing 



Setting Up Secure File Sharing at Your Hedge Fund: Varonis on Eze Cloud

By Mary Beth Hamilton,
Thursday, July 23rd, 2015

So we all know hedge funds and investment firms don’t want their important information drifting around free file sharing services like Dropbox. Heck, even Dropbox’s Chief Operating Officer says they still have to convince businesses that “the enterprise features that [they’ve] built satisfy [business] security requirements and [business] needs.1

With security threats multiplying exponentially, satisfying security requirements isn't enough - vendors need to be one step ahead. That’s why for secure file sharing Eze Castle Integration offers the Varonis' DatAnywhere product as a standard feature within our Eze Managed Suite. Varonis' DatAnywhere offers users seamless and secure collaboration and file sharing across devices.

Beyond security, Varonis DatAnywhere is easy to use. Users receive the same drag-n-drop experience as shared network drives or a cloud sync folder, which means no need for training on complex user interfaces and collaboration workflows. Additionally, data is automatically backed up and version controlled.

We created a video training series for our Eze Managed Suite clients on using DatAdvantage. While I can’t share all the videos (unless you are an Eze client!), here’s the intro video to give you a taste of this great feature. 

Categorized under: Infrastructure  Cloud Computing  Security  Trends We're Seeing  Videos And Infographics 



Five Steps to Effectively Managing Third-Party Service Provider Risk

By Kaleigh Alessandro,
Tuesday, July 21st, 2015

Hedge fund outsourcing is not a new trend, as buy-side firms have long dispersed the responsibility of many functions to third-party service providers more adept and accomplished at said functions. Technology, for example, is an area where many firms choose to leverage outsourced providers to manage complete or partial infrastructures, support projects or supplement on-site IT staffs. The benefits to outsourcing are numerous, but the true measure of a successful service provider relationship comes when an investment firm’s level of risk in using that provider is low.Service Provider Risk
 
Risks are everywhere, particularly in today’s cyber-focused environment. But the risk a hedge fund undertakes when outsourcing a function of its business to a third-party is enormous. Not only is the firm relinquishing control to an outside company, it also takes on the added burden of managing that company, in addition to its own.
 
It’s one thing to put faith in your service providers to do their jobs effectively. It’s another to ignore your own firm’s responsibility to manage that third party as a means of protecting your own firm. Successfully managing risk associated with third-party service provider relationships is a full-time job, especially for financial services firms working with dozens of various parties. Here are a few tips to help your firm properly manage third-party service provider risk:

Categorized under: Hedge Fund Operations  Launching A Hedge Fund  Cloud Computing  Security  Hedge Fund Due Diligence  Infrastructure  Trends We're Seeing 



The IT Checklist Cheat Sheet for Startup Financial Firms

By Mary Beth Hamilton,
Thursday, July 16th, 2015

As a new firm, your to-do list is going to be lengthy: formation structures, legal requirements, service provider evaluation, etc. On the technology front, there are also a lot of items to think through. Here’s a quick IT checklist cheat sheet that financial firms should keep handy during the startup planning process.
 
Also, for more technology tips, download the Essential Tech Guide to Starting a Hedge Fund
 
IT Checklist for Financial FirmsNetworking & Infrastructure

  • Define networking requirements

  • Data circuits featuring N+1 redundancy

  • Voice circuits

  • Wireless and Local Area Network (LAN) capabilities

  • Delivery

  • Design network infrastructure: Cloud, On-Premise or Hybrid

  • Workstations (PCs, monitors, laptops, servers)

  • Peripherals (printers, phones, etc.)

  • Delivery

Categorized under: Launching A Hedge Fund 



How to Comply With the SEC's Cyber Security Guidance

By Estani Laredo ,
Tuesday, July 14th, 2015

Last week, we partnered up with law firm Sadis & Goldberg to host a webinar where we discussed the Securities and Exchange Commission’s (SEC) Division of Investment Management’s latest cybersecurity guidance recommendations and offered firms clear direction on satisfying these new requirements from both a legal and technology perspective. Featured speakers included John Araneo, counsel, and Lance Friedler, partner at Sadis & Goldberg, as well as Eze Castle Integration’s Managing Director Vinod Paul. To watch a full recap of the webinar, click here or scroll downHacker - cyber security prep

Cyber Threats Across the Industry

The cyber threat landscape is changing rapidly, and our speakers shared examples of how developed hackers are targeting all industries, not only financial services. Araneo gave two examples of data breaches from two companies that were recently penalized by the SEC for failure to meet requirements. The first example was from a firm that failed to use strong passwords and allowed access to systems after long periods of computer inactivity, resulting in a penalty and mandatory independent security consulting for two years. The second firm failed to enforce the use of anti-virus software, leading to an unauthorized trade from a customer’s account and resulting in fines totaling over $100,000.
 
Beyond mismanagement of internal cyber controls, phishing and ransomware are other targeted approaches our speakers noted they are seeing across the industry, as hackers are targeting executives by sending fake emails to try to phish sensitive information or attaching files that could infect entire systems. In the case of ransomware, if a user opens an email that is infected, it will lock down files and the only way to recover the files is to buy a key from the hacker. As the sophistication of cyber hackers increases, firms are expected to shore up securities and employ best practices to protect sensitive company information – a goal the SEC is targeting with their most recent cybersecurity guidance recommendations. 

Categorized under: Security  Hedge Fund Regulation 



How Secure is Your Password? First Steps to Safeguarding Your Data

By Kaleigh Alessandro,
Thursday, July 9th, 2015

Security, security, security. It’s all anyone can talk about. From spear-phishing schemes to cyber extortion plots, hackers are reaching new levels of sophistication in their attempts to confiscate sensitive material and, in many cases, access monetary funds. But while we’ve trained ourselves to be more aware of these elaborate cybersecurity schemes, we often forget that the gateway to much of our information is only secured by one teeny, tiny little feature: a password.Password Security
 
Whether you’re safeguarding your work PC or personal mobile device, password security is the first and arguably most important step you can take to protect your sensitive information. And unfortunately, users often don’t put the necessary effort into creating strong, secure passwords, thereby leaving that sensitive information in peril and potentially easily accessed by intelligent hackers.
 
Password creation sounds like a simple task, but it is far from it, especially in today’s security-heightened marketplace. Following are five hallmarks of a strong password to help get you started:

Categorized under: Security  Trends We're Seeing 



Understanding Social Engineering: How to Avoid Phishing Attacks

By Katie Sloane,
Tuesday, July 7th, 2015

In the context of information technology, social engineering refers to the act of tricking people into divulging confidential or sensitive business information, and breaking security policies. This form of attack infiltrates companies by targeting their weakest access point, which predominantly is a firm’s employees.Understanding Social Engineering; Spear Phishing, Cyber Security

The Art of the Phishing Con

Let’s examine a popular technique for social engineering known as phishing. In a phishing scheme, the hacker broadly disseminates a fraudulent email with aim to acquire sensitive data, such as, login credentials, IT resources or banking information. The message may request the recipient to submit personal information or to click on a link embedded with malware. Although this approach rarely dupes sophisticated users, a distracted employee could make one mistake and compromise a firm’s entire network.

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Trends We're Seeing 



Happy Fourth and Hello Instagram from Eze Castle Integration

By Mary Beth Hamilton,
Thursday, July 2nd, 2015

On behalf of the entire team here at Eze Castle Integration, we would like to wish all of our U.S. readers, clients, partners and friends a very happy and safe Independence Day holiday.

Also, we’re happy to announce our newly launched Instagram page so be sure to follow us: EzeCastle

We'll see you back here at Hedge IT on Tuesday, July 7th for a look at Social Engineering. 

Eze Castle says Happy Fourth of July

Categorized under: Trends We're Seeing  Videos And Infographics 



From NT to Cloud: A Look at Eze Castle's 20 Years of Achievements

By Mary Beth Hamilton,
Tuesday, June 30th, 2015

20 years. 400 incredible employees. 650 clients. 3 continents. 10 offices. Countless services.

June 2015 marked the 20-year anniversary of Eze Castle Integration’s founding. We have reached many milestones over the years thanks to our dedicated employees and loyal client base.

From building the world’s first all NT trading floor (as Eze Castle Consulting) to building the hedge fund industry’s first private cloud platform (as Eze Castle Integration), the Eze Castle name represents innovation, quality and excellence.

We could go on and on but we’d rather show you some of our proudest accomplishments from the last decade.

First hedge fund cloud

20 years – Wow. So many milestones and so many more to come.
 

Categorized under: Eze Castle Milestones  Trends We're Seeing 



Why is Cybersecurity Important?

By Katie Sloane,
Thursday, June 25th, 2015

Did you know that the average cost of a data breach is $3.8 million? Or, that the consolidated average cost incurred for each record of lost or stolen sensitive and confidential information has increased six percent (6%) since 2013 from $145 to $154? A recent study of 350 companies spanning 11 countries reported the aforementioned statistics, representing a twenty-three percent (23%) increase in data breach consolidated costs.

Categorized under: Security  Disaster Recovery  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Business Continuity Planning  Software  Trends We're Seeing 



View earlier posts in the archive

Recent Posts / All Posts


 

Eze Cloud Information

Subscribe to Hedge IT

Follow Us

    Follow us on Twitter Follow us on FaceBook Follow us on LinkedIn Follow us on Google RSS Feed

Recent Articles

Categories

Archives