Eze Castle Integration

Hedge IT Blog

BCP Tip: Don't Rely on Luck to Get Your Firm Through a Disaster

By Lisa Smith,
Tuesday, March 18th, 2014

Feeling lucky that your business has never been impacted by a disaster? If so, now is the time to evaluate everything from your call tree to your disaster recovery solutions. Most studies show that up to 40 percent of businesses fail after a disaster. That means that almost half of firms reading this article will not recover if not fully prepared.BCP Emergency Kit

So what do you do to ensure that you will be more than just lucky to successfully recover from a disaster? 

Start with your documentation. What do you have? You should have a current Business Continuity Plan (BCP) and Employee Quick Reference Cards (QRCs).  If you have those two items, be sure to review them and make sure any recent changes to your business have been captured. Once you’ve validated the information is current, it’s time to test the documentation.

Categorized under: Business Continuity Planning  Disaster Recovery 



Why are Hedge Funds Moving to Miami?

By Jennifer Odence,
Thursday, March 13th, 2014

Miami SkylineWhat comes to mind when you think of Miami, Florida?

Beaches and sun, exciting nightlife, a popular Will Smith song. These are typical associations with Miami. How about finance? This might not be the first thought that comes to mind, but the city of Miami is hoping that will change. Miami is a major financial hub and growing, and according to the president of the Miami Finance Forum, it’s the second most concentrated financial hub behind New York City.

Currently home to over 60 international banks and 100 alternative investment companies, Miami and its busy Brickell Avenue has emerged as “Wall Street South,” and according to Forbes is luring many financial firms away from more traditional hubs such as New York and Greenwich, CT.

Categorized under: Real Estate  Project Management  Trends We're Seeing 



Microsoft XP Extends Antimalware Support, Highlights Cybersecurity Concerns

By Kaleigh Alessandro,
Tuesday, March 11th, 2014

Microsoft XP End of SupportBack in October of last year, we learned that Microsoft was ending support for its XP operating system – a move that would force users to upgrade to its more current software. Fast forward to today, and more than 29% of PC users are still using XP (according to NetMarketShare). In an interesting move, Microsoft announced recently that it will continue to provide updates to its antimalware signatures and engine for Windows XP users through July 14, 2015. Microsoft did caution that its research shows that the effectiveness of antimalware solutions on out-of-support operating systems is limited. 

But why?

We can assume this is a move at least partly fueled by slow adoption of software upgrades, based on the figure NetMarketShare has provided. Beyond private PC users, however, there may lie an even greater reason for extending security support. Reports suggest that more than 90% of ATMs across the United States are operating with Windows XP – a potentially crippling situation if hackers were able to breach the operating system. Last year, “a high-profile criminal group in Europe took advantage of a security vulnerability in XP that allowed them to use flash drives to infect ATMs with malicious software, emptying the machines of cash one-by-one. Researchers estimate that they may have gotten away with millions of Euros."

Categorized under: Security  Trends We're Seeing 



How Will the AIFMD Affect Private Equity Firms?

By Kulvinder Gill,
Thursday, March 6th, 2014

In the wake of the 2008 financial crisis, which prompted a call to stricter regulations across the board, the European Commission decided to develop the Alternative Investment Fund Managers Directive (AIFMD). The European Commission pointed out that managers of alternaAIMFD Regulation Imagetive investment funds are responsible for the management of a significant amount of invested assets and can exercise an important influence on markets and companies in which they invest. Furthermore, the Commission believed activities of such alternative investment funds may amplify risks through the financial system. The directive has been developed to address a number of risks identified by the Commission relating to alternative investment funds, including systemic risk, through a single set of rules that would apply across the board.

The Alternative Investment Fund Managers Directive came into force on 22nd July 2013. Since then, the alternative investment fund managers, including managers of hedge funds, private equity firms and investment firms, have been working on submitting the 35-page application form to get registered under the directive before it comes into effect in less than four months.

The Alternative Investment Fund Managers Directive will most likely affect private equity funds if they are located in or have investors in the European Union and are identified as the alternative investment fund manager. Fund managers at private equity firms will need to obtain and comply with transparency and the reporting requirements of the directive in order to manage and market private equity funds within the EU.

Categorized under: Hedge Fund Regulation 



Dropbox Alternatives Coming to a Hedge Fund Private Cloud Near You

By Mary Beth Hamilton,
Tuesday, March 4th, 2014

Dropbox Alternative for Hedge FundsIs Dropbox becoming a noun? For the sake of this article, let’s say it is.

With over 200 million users, Dropbox (and similar services) is gaining popularity based on its ability to allow users to share files and sync data between devices. These capabilities are very appealing but rely on a public cloud platform that can introduce security and compliance concerns for hedge funds.  

Dropbox made headlines last year when it was discovered by security researchers that the service opens some files once they are uploaded. While Dropbox provided an explanation, this can be a serious issue for businesses where employees are using Dropbox to share sensitive company and investment data.

So are your employees using Dropbox? Probably. A study conducted by Gigaom of 1,300 business professionals found that one out of five use public file sharing services, such as Dropbox, with work documents. And, half of those users know their companies have rules against it. This raises the question, how do you give employees access to a valuable tool in a way that meets compliance and security protection obligations?

Categorized under: Cloud Computing  Launching A Hedge Fund  Security  Hedge Fund Operations  Trends We're Seeing 



A Hacker's Tool Kit: Cyber Security Threats to Financial Firms

By Mary Beth Hamilton,
Thursday, February 27th, 2014

It has been said that cyber weapons can be as dangerous as weapons of mass destruction. To emphasize this, at last night’s FBI Citizens Academy seminar on cyber security in financial markets, the speaker noted that if you take out an industry (think financial, teleco) you can cripple an entire country.

But just how would this happen? What’s in a hacker’s tool kit? Quinn Shamblin, executive director of information security at Boston University, provided a glimpse into the cyber security underworld.

Targeting Your Favorite Device

Let’s start with Mobile Device Security. Hackers are shifting their focus and resources to mobile devices. They recognize that a user’s life is virtually encapsulated on his/her mobile device. From contacts and email to documents, passwords and banking apps, mobile devices now hold as much as or more personal information than PCs or laptops. And most devices do not have anti-virus/malware software installed.

Just last Friday, Apple released a critical update to its iOS 7 operating system after a flaw was identified that could give an attacker with a privileged network position the ability to capture or modify data in sessions protected by SSL/TLS (aka public key encryption). Following that announcement, researchers at a cyber security firm (FireEye) published a proof of concept for a surveillance app that, if created and distributed by hackers, could capture every tap on an iPhone’s screen. The information captured, including passwords and credit card numbers, would be accessible to the attacker. These are just two examples of the cyber security threats facing mobile devices. Users need to be aware that these threats exist and practice smart computing on all devices.

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Operations  Infrastructure  Trends We're Seeing 



Happy 400th Post! Hedge IT Blog Awards

By Emma Howie,
Tuesday, February 25th, 2014

In honor of our 400th post on here on Hedge IT (400 - wow!), we are celebrating with our annual blog awards. We've gathered the most popular articles according to our readers and included a few of our personal favorites, too.

We hope you enjoy!

Categorized under: Eze Castle Milestones  Cloud Computing  Disaster Recovery  Security 



Three Reasons the Private Cloud is Just like Olympic Curling

By Kaleigh Alessandro,
Thursday, February 20th, 2014

Have you been enamored by the coverage of the Winter Olympics the last two weeks? We sure have. And watching all of these great sports we don’t normally get the chance to witness got us thinking – there are a lot of similarities between technology and Olympic sports. They’re both complex in many ways and require experts (engineers and athletes) who are the best of the best at what they do.Olympic Curling
 
One of our favorite sports to watch is curling. And we couldn’t help but notice that Olympic curling and the private cloud are a lot alike. Don’t believe us? Take a look.

Both are safe and secure.

Let’s be honest: curling clearly presents the least amount of danger and lowest risk for injury at the Winter Olympics. Skiing and snowboarding? We’ve seen our fair share of wipeouts this year. Bobsled, luge and skeleton? Those are terrifying enough just as a spectator. Even figure skating poses a risk when skaters are leaping and twizzling left and right.
 
But curling? Extremely safe. Athletes can be fairly certain – whether they are curling or sweeping – that they will come out of the event unscathed.

Categorized under: Cloud Computing  Launching A Hedge Fund  Security  Outsourcing  Trends We're Seeing 



Ledgex Tackles Liquidity Management Challenge for Fund of Funds, Institutions

By Mary Beth Hamilton,
Tuesday, February 18th, 2014

Ledgex Liquidity Management SoftwareEffectively managi­­ng liquidity and reporting within investment portfolios has been a struggle for fund of funds, institutional investors, pensions and endowments. No manager wants to in a position where their investor liquidity does not match portfolio liquidity but at the same time firms are trying to offer investors more frequent liquidity options as a competitive edge. In some case, investors are even asking for no liquidity limits.

To adapt to the changing liquidity risk landscape, firms are selecting portfolio management systems from companies like Ledgex Systems. Recently, Ledgex released the next generation of its portfolio management platform that delivers new liquidity management and manager research modules.  These new tools give firms real-time visibility into their existing and proposed portfolio liquidity options while providing the research and analytics that support the manager selection process.

The Ledgex Liquidity module provides an advanced liquidity modeling utility and reporting engine, which can generate all available options for accessing assets given certain conditions by processing each tranche and their respective trade characteristics with a manager’s liquidity terms. Ledgex can model 90% of the manager liquidity terms used in the industry.   

Categorized under: Software  Trends We're Seeing 



Give Back this Valentine’s Day: Like for Life Campaign

By Emma Howie,
Thursday, February 13th, 2014

In honor of Valentine’s Day tomorrow, we are continuing our tradition of spreading the love to those who need it the most.


One Laptop Per Child

Categorized under: Trends We're Seeing 



Recent Posts / All Posts / Previous Page / Next Page