Eze Castle Integration Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Software

Power Up, Power Down: The Hidden Risks of Public Charging Stations, Tools

By Katie Sloane,
Thursday, March 19th, 2015

Smartphone charging station; BYODIn a constantly connected world, the majority of us cannot help but feel reliant on our mobile devices, especially when it comes to battery life percentage.

Whether you’re in the airport, train or just on the go, keeping that effervescent green light out of the red zone becomes a priority, and most will plug into just about anything. With public smartphone chargers on the rise, this resource seems ideal for the battery conscious user. However, prior to plugging in to power up, we suggest proceeding with caution. After all, do you know whose hands that charger was in before?

Categorized under: Security  Communications  Software  Trends We're Seeing 



Client Relationship Management: A "Must-Have" Tool for Hedge Funds

By Katie Sloane,
Tuesday, March 17th, 2015

In today’s market, the pressure from both investors and regulators is at a steady incline. Reporting obligations have grown complex, transparency is in high demand and compliance technology has become a vital component to a firm’s success. With various demands tug-o-warring hedge fund managers in multiple directions, a Client Relationship Management (CRM) platform could be the solution your financial firm has been searching for.  Ledgex CRM, Hedge Fund Technology

Introducing Ledgex CRM, the revolutionary, stand-alone Client Relationship Management solution launched today by our sister company, Ledgex Systems. Ledgex CRM is ideal for managing and tracking investor communications, sales pipelines, client relationships and capital movements. The highly configurable, centralized platform is tailor-made for hedge funds, family offices and asset allocators. 

The new product offers the sophisticated Client Relationship Management capabilities necessary to raise and retain more assets, maintain and grow clients, provide outstanding client service and meet heightened reporting requirements. Out of the box, the web-based solution delivers efficiencies, transparency and flexibility without increasing headcount or costs. By streamlining investor relationship management and capital activity, Ledgex CRM enables managers to optimize their time and focus on fostering relations and growing business.

Categorized under: Software  Hedge Fund Operations  Hedge Fund Regulation  Communications 



Giving Hedge Fund Start-ups a Helping Hand

By Kaleigh Alessandro,
Thursday, January 29th, 2015

HFMWeek Catches Up with Eze Castle Integration’s Managing Director, Vinod Paul, To Discuss How Technology Can Help Tackle the Challenges Facing Hedge Fund Start-up Firms. 

HFMWeek (HFM): Are you seeing a healthy market for new hedge fund launches in the US? Eze Castle Integration’s Managing Director, Vinod Paul

Vinod Paul (VP): 2013 and 2014 were very strong years for start-ups in the US. Our US pipeline is also quite healthy for 2015 in terms of start-ups, which is a little different to Europe, where there aren’t as many launches. In terms of overall US business, 50% of the clients we brought on in 2014 were start-ups; this is up from 40% in 2013. There are several factors that have contributed to this, some that we cannot control, such as how the wider market performs. Institutional money coming back into the market is causing some of the start-up activity. Many of the start-ups we have been able to bring on were funded by larger institutions. HFM: How are today’s start-up funds different than those from five years ago?

Categorized under: Launching A Hedge Fund  Cloud Computing  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Software 



Happy New Year! Employee Resolutions for 2015

By Katie Sloane,
Thursday, January 15th, 2015

Happy New Year, all!

As we embark on the New Year, there is no better time to reflect on 2014 and set new goals for the future, both personal and professional. We’ve asked a few of our employees at Eze Castle Integration what their aspirations are for 2015. Check out what some of their responses were below.2015

  • "Eat out less and cook at home more often." - Jim Bove, Systems Engineer
     

  • "To learn more about technology. You can never learn enough!" - Tim Macdonald, Product Manager
     

  • "To travel more." - Elizabeth Martin, Resource Coordinator

Categorized under: Trends We're Seeing  Hedge Fund Operations  Communications  Project Management  Software 



Betting Against the Odds and Neglecting Risk:The True Cost of a Data Breach

By Katie Sloane,
Tuesday, December 9th, 2014

When it comes to the cost of a successful data breach, the ensuing ramifications are not limited to monetary loss. A firm’s confidential information, customer trust and overall operations are all at risk of being compromised. To protect their data and systems from cyber-attacks and breaches, it is critical that firms become Hackeras secure as possible.

Raising the Bar

Over the past year, we have witnessed more firms strengthening their security measures in an effort to comply with industry regulations as well as the SEC cybersecurity expectations. Additionally, we’ve seen an increase in frequency and sophistication of both data theft and cybercrime. A study by Risk Based Security revealed that within the first nine months of 2014 there were 1,922 data breaches reported and 904 million records exposed. Four of those incidents have made the Top Ten All time Breach List and three hacking incidents combined were accountable for nearly sixty percent of exposed records. Today, most hedge funds are aware of the severe negative effects a security breach can cause; however, gaining this knowledge may have been a tough lesson to learn.

Categorized under: Security  Disaster Recovery  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Business Continuity Planning  Software  Trends We're Seeing 



Throwback Thursday: History of the Eze Private Cloud

By Katie Sloane,
Thursday, December 4th, 2014

Less than ten short years ago, Eze Castle Integration saw a shift in the market and gap in the cloud space. Eze Private Cloud HistoryFirms had to hire multiple third-party vendors to fully outsource their IT needs, public cloud environments fell short of hedge fund security demands and service level contracts varied drastically. Fast-forward to today, and that very same spark of ideation has progressed to completely revolutionize hedge fund IT.  In the spirit of Throwback Thursday, today we're reflecting on the journey and growth of our very own Eze Private Cloud.  

In 2005, Eze Castle built and deployed the first hosted cloud platform for a large hedge fund based in New York City. By 2007, 18 funds spun out from the initial firm, each selecting Eze Castle as their trusted cloud platform provider. The following year, the company began building the foundation for the Eze Private Cloud.  The same year marked the opening of Eze Castle’s hedge fund hotel in New York City. The environment, which supported more than 200 users, united the company’s cloud computing platform and fully managed office suites for startup funds.   

Categorized under: Eze Castle Milestones  Launching A Hedge Fund  Cloud Computing  Hedge Fund Operations  Infrastructure  Communications  Software  Trends We're Seeing 



10 Holiday Travel Security Safety Tips

By Katie Sloane,
Tuesday, November 25th, 2014

Traveling with electronic devices puts personal and critical business information at risk. As we embark on the busy holiday travel season, we decided to share some useful tips to help prevent your data and devices from falling into the wrong hands. Here are our top 10:smartphones tablets mobile devices

  1. Back up Your Data Before You Leave: Prior to traveling, back up data that is stored on your device(s) onto media that will not be taken with you on your travels. For example, on a storage card, cloud, or computer, if you are not bringing the latter device on your trip. Furthermore, ensure you do not have social security numbers, passwords, credit card information and other sensitive data stored on your devices. If you do, save this information in a more secure place and remove it from your portable devices.

  2. Travel Light: If you do not need it, do not bring it on your trip. Only devices that are necessary should accompany you while traveling.

Categorized under: Security  Communications  Software  Trends We're Seeing 



2014 Benchmark Study Results: Top Hedge Fund Applications Revealed

By Katie Sloane,
Thursday, November 13th, 2014

The results from our Global Hedge Fund Technology and Operations Benchmark Study are in and here is a snapshot of the 2014 findings. You can find the complete report here. We surveyed 279 buy-side firms across the United States, United Kingdom and Asia in order to discover their front, middle, and back office technology and application preferences.Hedge Funds by Type

Respondent Profile[Hedge Funds by Type]All survey respondents fell into the following categories within the financial industry: hedge fund (58%), asset/investment manager (13%), private equity firm (3%), fund of fund (3%), and family office (3%). Additionally, 13 percent fell into an ‘other’ category, which included financial firm types such as venture capital, advisory, fund management, quant and wealth management.  

Firms surveyed fell into three asset groups: thirty-three percent (33%) reported their assets under management (AUM) as less than $100 million; twenty-eight percent (28%) fell between $101 and $500 million; and the majority (39%) reported over $500 million AUM. 

In regards to investment strategy, long/short equity continues to dominate as the most favorable with 50 percent (50%) of respondents reporting this to be their primary investment strategy.  Additional preferred strategies include credit (8%), fixed income (6%), emerging markets (5%), event driven (4%), and distressed debt (3%). Twenty-four percent (24%) of firms fell into an “Other” category that included a wide variety of investment strategies such as commodities, derivatives, merger arbitrage, relative value, securities, global macro, and long only. In 2014, the top primes employed by firms are Goldman Sachs, Morgan Stanley, JP Morgan, Credit Suisse and UBS (same as 2013 results).

Categorized under: Hedge Fund Operations  Launching A Hedge Fund  Cloud Computing  Hedge Fund Due Diligence  Communications  Outsourcing  Software  Trends We're Seeing 



Sneak Peek: 2014 Hedge Fund Benchmark Study Results

By Kaleigh Alessandro,
Tuesday, November 11th, 2014

In it's fourth year running, our Global Hedge Fund Technology Benchmark Study reveals the top technology systems and applications used by investment management firms around the world. And while we aren't due to officially release the results until tomorrow - register for our webinar to hear them live - we thought we'd share a little sneak peek in the form of an infographic.

Take a look below and discover how your hedge fund and investment management firm peers are using technology to power their firm operations.

Categorized under: Hedge Fund Due Diligence  Launching A Hedge Fund  Cloud Computing  Security  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Software  Trends We're Seeing  Videos And Infographics 



Hedge Fund Cybersecurity: Preparing Your Defensive Team

By Katie Sloane,
Thursday, November 6th, 2014

When it comes to cybersecurity defenses, this isn’t a fantasy league. The threats are real and growing in sophistication for the hedge fund and alternative investment industry. In today’s blog, we will discuss how to prepare your firm’s defense for external attacks and internal breaches.Hedge Fund Cybersecurity

Cybercrime works like a defensive team that studies their opponents and plays and can make midgame adjustments. The only true way to thwart an incident is to establish a layered security program to safeguard against attacks and vulnerabilities of all kinds. Football teams share a similar composition, as there are defensive tackles and ends, cornerback and safety roles. You need to ensure your infrastructure is highly secure and cannot be penetrated by external attackers or easily manipulated by internal threats. 

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Business Continuity Planning  Software 



View earlier posts in the archive

Recent Posts / All Posts