Eze Castle Integration Eze Castle Integration

Hedge IT Blog

Kicking Off the Hedge Fund Insiders Article Series

By Mary Beth Hamilton,
Tuesday, August 4th, 2015

Hedge Fund Insiders Article SeriesHedge funds operate in a dynamic, ever-changing environment, so to assist managers in staying abreast of hot topics, we are launching a new article series aptly titled, The Hedge Fund Insiders Series. Running right here on HedgeIT during the month of August, we’ll cover a range of topics aligned to investor and regulator expectations, due diligence trends and operational best practices.

Contributors to the Series include senior leaders at Eze Castle Integration, CBRE Group, Inc., eSentire, Haynes and Boone LLP, TriNet, Wells Fargo Prime Services and Willis Group Holdings Ltd.

Here is a sneak peak of some of the articles we will publish each Tuesday and Thursday starting this week:

Keys to Building an Effective Alternative Asset Manager and Prime Broker Relationship
Wells Fargo Prime Services

Excerpt: All business relationships are driven by the belief that both sides will receive a mutual benefit that will allow for a long term sustainable partnership between the firms. For a prime brokerage/alternative asset manager relationship this principle is no different. An alternative asset manager (“AAM”) looks for certain services from its prime broker (“PB”): financing, access to balance sheet, securities lending, Capital Introduction, research, Corporate Access, technology and other services that are essential to the AAM as it deploys its strategy. PBs are looking to generate an attractive after cost return based on the revenue generated from the client vs. usage of financial resources such as balance sheet and capital. 

Categorized under: Hedge Fund Operations  Launching A Hedge Fund  Hedge Fund Due Diligence  Trends We're Seeing 



Summer Weather Preparedness: More Than Sunscreen Needed for Protection

By Estani Laredo,
Thursday, July 30th, 2015

As summer officially approaches its halfway point, we at Eze Castle Integration hope that everyone is enjoying the beautiful weather. We also want to take this opportunity to remind folks to be mindful that your firm can still be vulnerable, even when the weather is warm and sunny. With heat and humidity rising, power usage is increased to keep offices cool, leaving firms susceptible to power outages. Additionally, with employee vacations prevalent during the summer and offices less crowded, there are fewer gatekeepers protecting your firm from social engineering threats and hackers. Let’s examine some of these factors a little more closely and offer some business continuity and security tips to keep your firm running at full speed in the summer heat. Boston Blackout 2012

Impact of the Heat: Power Outages

You are sitting at your desk and recording sensitive information for one of your clients, when all of a sudden your screen goes black, and the office is completely dark. Your firm has experienced a power outage caused by increased usage during the summer months, and you are not sure if your information and technology is protected.

The months of July, August and September are considered the “blackout season” as major cities use the most power during these months, leaving them susceptible to power outages. According to the Energy Information Administration, electrical power outages, surges and spikes in usage bring about more than $150 billion in annual damages to the U.S. economy.1

Categorized under: Business Continuity Planning  Disaster Recovery  Security  Hedge Fund Operations  Infrastructure  Trends We're Seeing 



Cybersecurity for Financial Institutions: NYC Panel Highlights

By Kaleigh Alessandro,
Tuesday, July 28th, 2015

We take our thought leadership efforts seriously around here, and we’re always interested in educating our clients and partners about technology issues that can affect them. We’re also fortunate to be invited to speak frequently on a variety of hedge fund technology topics – most recently, cybersecurity. Our own Managing Director, Vinod Paul, participated in a panel session last month in New York dedicated to this topic.

Featuring speakers from Eze Castle Integration, Citrin Cooperman, Akin Gump, and CFO Consulting Partners, the panel spoke candidly about how the cybersecurity landscape is evolving for financial services firms and how they can begin to comply with recent recommendations from the SEC and FINRA. Following are some highlights from the event. If you’d like to listen to the podcast of the panel, click here.Hedge Fund Cyber Security Panel

  • Many firms question whether they need to do anything to comply with SEC cybersecurity recommendations. The answer is yes. And it’s more than technology firms need to employ.
     

  • Cybersecurity governance is a critical component. Who is in charge beyond the IT team? Someone at the firm needs to take accountability for this process and interface with various functions to ensure compliance. Ideally, a Chief Compliance Officer or Chief Information Security Officer should handle. 

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Trends We're Seeing 



Setting Up Secure File Sharing at Your Hedge Fund: Varonis on Eze Cloud

By Mary Beth Hamilton,
Thursday, July 23rd, 2015

So we all know hedge funds and investment firms don’t want their important information drifting around free file sharing services like Dropbox. Heck, even Dropbox’s Chief Operating Officer says they still have to convince businesses that “the enterprise features that [they’ve] built satisfy [business] security requirements and [business] needs.1

With security threats multiplying exponentially, satisfying security requirements isn't enough - vendors need to be one step ahead. That’s why for secure file sharing Eze Castle Integration offers the Varonis' DatAnywhere product as a standard feature within our Eze Managed Suite. Varonis' DatAnywhere offers users seamless and secure collaboration and file sharing across devices.

Beyond security, Varonis DatAnywhere is easy to use. Users receive the same drag-n-drop experience as shared network drives or a cloud sync folder, which means no need for training on complex user interfaces and collaboration workflows. Additionally, data is automatically backed up and version controlled.

We created a video training series for our Eze Managed Suite clients on using DatAdvantage. While I can’t share all the videos (unless you are an Eze client!), here’s the intro video to give you a taste of this great feature. 

Categorized under: Infrastructure  Cloud Computing  Security  Trends We're Seeing  Videos And Infographics 



Five Steps to Effectively Managing Third-Party Service Provider Risk

By Kaleigh Alessandro,
Tuesday, July 21st, 2015

Hedge fund outsourcing is not a new trend, as buy-side firms have long dispersed the responsibility of many functions to third-party service providers more adept and accomplished at said functions. Technology, for example, is an area where many firms choose to leverage outsourced providers to manage complete or partial infrastructures, support projects or supplement on-site IT staffs. The benefits to outsourcing are numerous, but the true measure of a successful service provider relationship comes when an investment firm’s level of risk in using that provider is low.Service Provider Risk
 
Risks are everywhere, particularly in today’s cyber-focused environment. But the risk a hedge fund undertakes when outsourcing a function of its business to a third-party is enormous. Not only is the firm relinquishing control to an outside company, it also takes on the added burden of managing that company, in addition to its own.
 
It’s one thing to put faith in your service providers to do their jobs effectively. It’s another to ignore your own firm’s responsibility to manage that third party as a means of protecting your own firm. Successfully managing risk associated with third-party service provider relationships is a full-time job, especially for financial services firms working with dozens of various parties. Here are a few tips to help your firm properly manage third-party service provider risk:

Categorized under: Hedge Fund Operations  Launching A Hedge Fund  Cloud Computing  Security  Hedge Fund Due Diligence  Infrastructure  Trends We're Seeing 



The IT Checklist Cheat Sheet for Startup Financial Firms

By Mary Beth Hamilton,
Thursday, July 16th, 2015

As a new firm, your to-do list is going to be lengthy: formation structures, legal requirements, service provider evaluation, etc. On the technology front, there are also a lot of items to think through. Here’s a quick IT checklist cheat sheet that financial firms should keep handy during the startup planning process.
 
Also, for more technology tips, download the Essential Tech Guide to Starting a Hedge Fund
 
IT Checklist for Financial FirmsNetworking & Infrastructure

  • Define networking requirements

  • Data circuits featuring N+1 redundancy

  • Voice circuits

  • Wireless and Local Area Network (LAN) capabilities

  • Delivery

  • Design network infrastructure: Cloud, On-Premise or Hybrid

  • Workstations (PCs, monitors, laptops, servers)

  • Peripherals (printers, phones, etc.)

  • Delivery

Categorized under: Launching A Hedge Fund 



How to Comply With the SEC's Cyber Security Guidance

By Estani Laredo ,
Tuesday, July 14th, 2015

Last week, we partnered up with law firm Sadis & Goldberg to host a webinar where we discussed the Securities and Exchange Commission’s (SEC) Division of Investment Management’s latest cybersecurity guidance recommendations and offered firms clear direction on satisfying these new requirements from both a legal and technology perspective. Featured speakers included John Araneo, counsel, and Lance Friedler, partner at Sadis & Goldberg, as well as Eze Castle Integration’s Managing Director Vinod Paul. To watch a full recap of the webinar, click here or scroll downHacker - cyber security prep

Cyber Threats Across the Industry

The cyber threat landscape is changing rapidly, and our speakers shared examples of how developed hackers are targeting all industries, not only financial services. Araneo gave two examples of data breaches from two companies that were recently penalized by the SEC for failure to meet requirements. The first example was from a firm that failed to use strong passwords and allowed access to systems after long periods of computer inactivity, resulting in a penalty and mandatory independent security consulting for two years. The second firm failed to enforce the use of anti-virus software, leading to an unauthorized trade from a customer’s account and resulting in fines totaling over $100,000.
 
Beyond mismanagement of internal cyber controls, phishing and ransomware are other targeted approaches our speakers noted they are seeing across the industry, as hackers are targeting executives by sending fake emails to try to phish sensitive information or attaching files that could infect entire systems. In the case of ransomware, if a user opens an email that is infected, it will lock down files and the only way to recover the files is to buy a key from the hacker. As the sophistication of cyber hackers increases, firms are expected to shore up securities and employ best practices to protect sensitive company information – a goal the SEC is targeting with their most recent cybersecurity guidance recommendations. 

Categorized under: Security  Hedge Fund Regulation 



How Secure is Your Password? First Steps to Safeguarding Your Data

By Kaleigh Alessandro,
Thursday, July 9th, 2015

Security, security, security. It’s all anyone can talk about. From spear-phishing schemes to cyber extortion plots, hackers are reaching new levels of sophistication in their attempts to confiscate sensitive material and, in many cases, access monetary funds. But while we’ve trained ourselves to be more aware of these elaborate cybersecurity schemes, we often forget that the gateway to much of our information is only secured by one teeny, tiny little feature: a password.Password Security
 
Whether you’re safeguarding your work PC or personal mobile device, password security is the first and arguably most important step you can take to protect your sensitive information. And unfortunately, users often don’t put the necessary effort into creating strong, secure passwords, thereby leaving that sensitive information in peril and potentially easily accessed by intelligent hackers.
 
Password creation sounds like a simple task, but it is far from it, especially in today’s security-heightened marketplace. Following are five hallmarks of a strong password to help get you started:

Categorized under: Security  Trends We're Seeing 



Understanding Social Engineering: How to Avoid Phishing Attacks

By Katie Sloane,
Tuesday, July 7th, 2015

In the context of information technology, social engineering refers to the act of tricking people into divulging confidential or sensitive business information, and breaking security policies. This form of attack infiltrates companies by targeting their weakest access point, which predominantly is a firm’s employees.Understanding Social Engineering; Spear Phishing, Cyber Security

The Art of the Phishing Con

Let’s examine a popular technique for social engineering known as phishing. In a phishing scheme, the hacker broadly disseminates a fraudulent email with aim to acquire sensitive data, such as, login credentials, IT resources or banking information. The message may request the recipient to submit personal information or to click on a link embedded with malware. Although this approach rarely dupes sophisticated users, a distracted employee could make one mistake and compromise a firm’s entire network.

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Trends We're Seeing 



Happy Fourth and Hello Instagram from Eze Castle Integration

By Mary Beth Hamilton,
Thursday, July 2nd, 2015

On behalf of the entire team here at Eze Castle Integration, we would like to wish all of our U.S. readers, clients, partners and friends a very happy and safe Independence Day holiday.

Also, we’re happy to announce our newly launched Instagram page so be sure to follow us: EzeCastle

We'll see you back here at Hedge IT on Tuesday, July 7th for a look at Social Engineering. 

Eze Castle says Happy Fourth of July

Categorized under: Trends We're Seeing  Videos And Infographics 



Recent Posts / All Posts / Next Page