Eze Castle Integration Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Hedge Fund Operations

Astellon Capital Partners Deploys Eze Private Cloud Services to Support Worldwide Growth

By Mary Beth Hamilton,
Tuesday, April 21st, 2015

We love showcasing our work with clients and one such client is Astellon Capital Partners who selected the award-winning Eze Private Cloud for all of its IT needs. Astellon moved to the Eze Private Cloud because of Eze Castle Integration's leadership role in bringing cloud services to the investment community, as well as its ability to deliver the high performance, applications and exceptional user experience the investment firm demands.

Established in 2011, Astellon Capital Partners is a twelve user alternative investment manager based in London focusing on European event-driven value-investing with a particular focus on German-speaking countries.

Davi Vieira, head of operations at Astellon Capital Partners, said, "Our move to the Eze Private Cloud was born out of the need to have a secure, reliable and institutional-grade IT platform that matches our focus on implementing strong financial, operational and infrastructure controls. Eze Castle Integration is the driving force behind the adoption of cloud services in the hedge fund industry and the optimal partner to help us run our business for many years to come."

Categorized under: Launching A Hedge Fund  Cloud Computing  Eze Castle Milestones  Hedge Fund Due Diligence  Hedge Fund Operations  Infrastructure 



What Do Hedge Fund Investors Think of the Cloud?

By Kaleigh Alessandro,
Thursday, April 16th, 2015

It’s a question that many folks in the financial services industry have been asking for a few years now. Are potential investors comfortable with the idea of hedge funds leveraging cloud services? In Part 1 of our cloud webinar series, The Investor Perspective on Cloud and Security, we asked Ashley Gimbel, Senior Vice President at Dyal Capital Partners, to share her thoughts on evaluating the operational and infrastructure decisions of hedge funds and alternative investment firms and if investors are truly comfortable with the cloud. Click here or scroll down to watch the full replay of our conversation with Gimbel.cloud computing
 
The simple answer is ‘yes.’ According to Gimbel, investors are and should be at ease with hedge fund clients using cloud infrastructures to support their daily operations. In fact, she says, hosted infrastructures often make more sense for firms with little to no IT resources in-house.
 
With a few caveats, of course. Firms should ensure outsourced cloud providers have proper Service Level Agreements (SLA) in place and are conducting appropriate oversight of their provider(s). A few other technology must-haves:

  • Well integrated data and systems

  • Established policies and procedures

  • Comprehensive disaster recovery

  • Cybersecurity protections

Categorized under: Cloud Computing  Disaster Recovery  Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Outsourcing  Trends We're Seeing 



Business Continuity Focus: What happens when it's not a drill?

By Matt Donahue,
Tuesday, April 14th, 2015

What happens when it’s not a drill? What will employees in the office do after hearing an announcement or alarm due to an incident? Quickly make their way to the stairs or ignore it and continue working?Evacuation Plan

In critical situations, time matters. If everyone delays evacuating to make sure it’s the “real thing” or just completely ignores the warning, they can potentially put themselves in serious jeopardy. At home or at work, fire alarms go off from time to time. Unfortunately, responses to such alarms can range from grabbing a fire extinguisher to fuse the situation to putting on ear plugs and continuing with your workday. Inadequate responses to a fire alarm, for example, can put yourself, coworkers, and even first responders at risk. Fines can also be assessed to a firm by agencies such as OSHA or the local fire municipality if employees fail to evacuate in a timely manner.

A recent report from the National Fire and Protection Agency (NFPA) estimated that in 2013 alone there were 487,500 structure fires, causing 2,855 civilian deaths and 14,075 injuries.  Below are four areas of importance that firms should focus on during these types of scenarios to ensure their employees and businesses are not negatively impacted.

Categorized under: Business Continuity Planning  Hedge Fund Operations  Communications 



Why the Public Cloud Isn't Suitable for Hedge Fund Trading Environments

By Kaleigh Alessandro,
Tuesday, April 7th, 2015

Whether you are a new hedge fund startup evaluating technology solutions or an established investment firm looking for an application upgrade or technology refresh, you’re likely to consider the cloud as one of your infrastructure options. If a cloud platform is ultimately your preference, however, your decision-making is far from over.public vs. private cloud considerations
 
Deciding between a low-budget public cloud environment (think: Amazon Web Services, Microsoft Azure) and a vertical-specific private cloud (hint, hint: The Eze Private Cloud) is not always an easy choice for financial services firms. Despite the clear advantages of the private cloud, many investment management firms are drawn to the low-cost and high flexibility of a public cloud. While this type of infrastructure may suit a variety of other verticals, financial services firms have high standards and require a level of service and infrastructure beyond what public cloud platforms can offer. Trading via the public cloud can pose a host of challenges and concerns - let's look at a few.

Preparing for Cyber-Attacks and Breaches

At the top of everyone’s priority list these days is cybersecurity preparedness. And rightfully so. Security breaches and attacks are seemingly occurring on a daily basis, and hackers have become savvier than ever. As a result, large public cloud enterprises – the Googles and Amazons of the world – are inherently more susceptible to attacks and, as a result, downtime. While these public cloud services are surely beefing up security and have billions of dollars’ worth of resources to dedicate to security planning, it remains to be seen if they can sustain a targeted attack or significant downtime.

Categorized under: Cloud Computing  Security  Hedge Fund Operations  Software  Trends We're Seeing 



Ethical Hacking: It's a Thing, Hedge Funds

By Mary Beth Hamilton,
Thursday, April 2nd, 2015

At Eze Castle Integration we see thousands of due diligence questions about hedge fund technology and operations each year. The questions around security are getting more specific with investors wanting details about each layer of a firm’s security stack.

A new question we’ve seen pop up one or twice centers around whether a firm’s online systems have undergone an ethical hack. So what is ethical hacking and how is it different from penetration testing?

What is Ethical Hacking?

Going back to our trusty security dictionary, SearchSecurity defines ethical hacker (aka white hat hacker) as a “computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker [aka black hat hacker] could potentially exploit.”

The increased focus on all things cybersecurity related – cyber-attacks, cyber warfare and cyber terror – has even led to the creation of a Certified Ethical Hacker (CEH) designation, which hacking pros can earn by completing online courses offered by the EC-Council.

Categorized under: Security  Cloud Computing  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Trends We're Seeing 



Interconnectivity: A Growing Cybersecurity Threat

By Katie Sloane,
Tuesday, March 31st, 2015

In an interconnected world, there is a trade-off between enjoying limitless information at our fingertips and threats that are just one click away. Most of us have become so accustomed to being plugged in, that we forget the world is simultaneously plugging in to us as well.

Global Cyber Threats, Hedge Fund Security

The global evolution of cybercrime continues to push boundaries and raise the bar for technology innovation and advanced security solutions. Indicating the evolving regulatory landscape, the US Securities and Exchange Commission (SEC)'s Office of Compliance Inspections and Examinations (OCIE) announced back in 2014 that it planned to inspect the cybersecurity preparedness of over 50 registered broker-dealers and investment advisers. In 2015, their examinations will continue across the financial services industry, and firms are locking down security practices in advance of these inquiries. Additionally, in Asia, the Singapore Personal Data Protection Act governs the collection, use, and disclosure of personal data.

Categorized under: Security  Hedge Fund Operations  Hedge Fund Regulation  Software  Trends We're Seeing 



Encryption 101: Protecting Your Investment Firm's Sensitive Material

By Kaleigh Alessandro,
Thursday, March 26th, 2015

The amount of data and information that passes through the Internet every day is – for lack of a better term - enormous. And truth be told, sometimes we are sharing information that we don’t want to get into the wrong hands, whether it be via email, instant message or other communications. Think: credit card information, personal information (name, address, social security number, etc.), bank account information or sensitive company or financial data.Security Padlock - Encryption
 
A secure way to transmit this information is through encryption. According to TechTarget, encryption is “the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.”
 
The history of encryption, believe it or not, began a long time before the Internet existed and we started sending electronic data. The ancient Greeks and Romans, in fact, sent secret messages by substituting letters that only a secret key code could decipher. In the time of Julius Caesar, he created a cipher by which he shifted letters to the left or right to hide his messages.

Categorized under: Communications  Cloud Computing  Security  Hedge Fund Operations  Hedge Fund Regulation  Trends We're Seeing 



Client Relationship Management: A "Must-Have" Tool for Hedge Funds

By Katie Sloane,
Tuesday, March 17th, 2015

In today’s market, the pressure from both investors and regulators is at a steady incline. Reporting obligations have grown complex, transparency is in high demand and compliance technology has become a vital component to a firm’s success. With various demands tug-o-warring hedge fund managers in multiple directions, a Client Relationship Management (CRM) platform could be the solution your financial firm has been searching for.  Ledgex CRM, Hedge Fund Technology

Introducing Ledgex CRM, the revolutionary, stand-alone Client Relationship Management solution launched today by our sister company, Ledgex Systems. Ledgex CRM is ideal for managing and tracking investor communications, sales pipelines, client relationships and capital movements. The highly configurable, centralized platform is tailor-made for hedge funds, family offices and asset allocators. 

The new product offers the sophisticated Client Relationship Management capabilities necessary to raise and retain more assets, maintain and grow clients, provide outstanding client service and meet heightened reporting requirements. Out of the box, the web-based solution delivers efficiencies, transparency and flexibility without increasing headcount or costs. By streamlining investor relationship management and capital activity, Ledgex CRM enables managers to optimize their time and focus on fostering relations and growing business.

Categorized under: Software  Hedge Fund Operations  Hedge Fund Regulation  Communications 



Business Continuity Focus: Understanding billion-dollar disasters

By Matt Donahue,
Tuesday, March 10th, 2015

In the last 30 years, how many weather events can you remember? Maybe some recent “super storms” come to mind – Hurricane Sandy (2012), and Winter Storm Juno (2015) are probably at the top of your list. How prepared for these storms was your firm? 

A 2007 study by the National Association of Insurance Commissioners (NIAC) found that more than 90% of small businesses interviewed had property/liability coverage while less than half (48%) of firms with annual revenues of more than $1 million have business interruption insurance.

It may not come as a surprise then that, following disasters such as these, many small business (20-40%) are forced to shut down, according to an Institute for Business & Home Safety (IBHS) report. It is important to understand the losses that can affect businesses and prepare accordingly. These losses can include: disruption of critical supplies and inability to move product, utility outages and power failures, employee transportation issues or remote access problems, and connectivity issues, just to name a few.

Categorized under: Business Continuity Planning  Hedge Fund Operations 



Opalesque TV Exclusive: Cybersecurity Threats Facing Hedge Funds in 2015

By Kaleigh Alessandro,
Tuesday, February 24th, 2015

In this Opalesque.TV video interview, Bob Guilbert and Vinod Paul from Eze Castle Integration discuss the cybersecurity landscape of the investment community, specifically the risks facing hedge funds and alternative investment managers in 2015. Both spend the majority of their time educating their client base on internal and external risks, protecting them against the “Activist Hacktivists” looking for any means of entry into funds.

These hackers will spend weeks, months, and sometimes even years trying to get access, most often with the goal of triggering illicit wire transfers out of the fund.

Today, the usual efforts of employees to avoid clicking links or opening files and password protocoling aren't enough. Everyone should be aware of new techniques employed by hackers like “spearfishing” and “whaterhole” attacks which, with more institutional dollars flowing into hedge funds, will become more frequent. Unless funds have the right Written Information Security Policy (WISP) and processes in place, together with true intrusion detection that monitors what is coming into the firm and what data and information is going out of the firm, they can be at risk of a cybersecurity attack.

Categorized under: Security  Cloud Computing  Disaster Recovery  Hedge Fund Operations  Hedge Fund Regulation  Communications  Outsourcing  Trends We're Seeing  Videos And Infographics 



View earlier posts in the archive

Recent Posts / All Posts