Eze Castle Integration

Hedge IT Blog

The Antidote for IT Headaches: Eze Private Cloud (NEW VIDEO!)

By Emma Howie,
Tuesday, February 11th, 2014

Managing technology at a hedge fund can be complex and time consuming, but not when you’re on the Eze Private Cloud. Adding new investment applications is a cinch, IT costs are predictable and security is robust.

Watch our new video to see what it feels like to be on the Eze Private Cloud: 


Categorized under: Cloud Computing  Business Continuity Planning  Disaster Recovery  Videos And Infographics 



How Is Your Firm Mitigating Technology Risk?

By Kaleigh Alessandro,
Thursday, February 6th, 2014

Investment risk plays an important role in the life of a hedge fund manager, but technology risk should not. When it comes to your firm’s technology systems and operations, you want things to run efficiently, not add more stress to your already crowded plate.Mitigating Technology Risk
 
Mitigating technology risk is a critical step to ensuring your hedge fund operates smoothly and successfully. Following are a few areas to keep in mind as you evaluate your firm’s technology risk:

Layers of Redundancy

One way to reduce your firm’s technology risk is to add layers of redundancy throughout your infrastructure. Whether you’re utilizing a cloud infrastructure or an on-premise environment, your servers, networking and telecomm lines should feature N+1 availability, a configuration in which multiple components have at least one independent backup component to ensure system functionality continues in the event of a failure. 

Categorized under: Outsourcing  Business Continuity Planning  Cloud Computing  Disaster Recovery  Hedge Fund Operations  Infrastructure  Security  Trends We're Seeing 



SEC to Examine Cybersecurity Policies at a Hedge Fund Near You

By Mary Beth Hamilton,
Tuesday, February 4th, 2014

Notice anything different? That’s right, your favorite hedge fund technology blog got a facelift, and we didn’t stop there -- we overhauled our corporate website too. Our goal with the overhaul was to make it even easier for visitors to get the valuable information they expect from the industry’s technology leader (us!). We hope you like it.

SEC LogoNow on to today’s hot topic. The U.S. Securities and Exchange Commission (SEC), at a recent industry event, said that they plan to examine the cybersecurity policies and procedures asset managers have in place to prevent and detect cyber attacks.

Specifically, according to Reuters, SEC national associate director Jane Jarcho said,  “We will be looking to see what policies are in place to prevent, detect and respond to cyber attacks [and] we will be looking at policies on IT training, vendor access and vendor due diligence, and what information you have on any vendors."

Some have indicated that the SEC cybersecurity exams could be coming by late-September 2014. In many cases they will be conducted as part of the SEC's routine examinations of investment companies, however, Jarcho advised that inquiries could be done as separate exams.

Categorized under: Security  Hedge Fund Regulation 



Dealing with a Security Breach: Planning, Response & Resolution

By Jennifer Odence,
Tuesday, January 28th, 2014

Last week, we kicked off our 2014 webinar series with our first topic, “Security Incident Response Priorities: How to Prepare Your Firm Before a Breach Occurs” featuring our own VP of Technology, Steve Schoener, along with eSentire’s Chief Technology Officer, Eldon Sprickerhoff. Topics discussed included common threat actors and potential security scenarios to be aware of as well as the importance of planning a response to such attacks.Restricted Area

A Quick Brief

In 2012, IBM reported that companies were attacked an average of 2 million times per week, and unfortunately, the statistics aren’t declining anytime soon. It’s no longer “what if” a security breach or cyber-attack occurs, but when and how it will occur. With targeted attacks that are bypassing existing security infrastructures, the topic of security has become even more important to all firms.

Security Landscape

The most common security threat actor lately has been attacks from criminal organizations, most notably international occurrences. Criminal organizations are out for profit and the most difficult to track down, especially in international instances. There has been less impact from Nation States, but these are still threats to be cautious of, along with insiders and hacktivists.

Categorized under: Security 



Video: Security Incident Response Priorities for Your Hedge Fund

By Kaleigh Alessandro,
Thursday, January 23rd, 2014

At the end of last year, we predicted security would continue to be a hot topic in 2014 - and our experts agree. It's still such an important topic for hedge funds and investment firms to be educated on that we even dedicated our first webinar of the year to it.

Expert speakers from Eze Castle Integration and eSentire spoke earlier today about security incident response priorities and offered best practices for investment firms looking to plan before a security breach occurs.

Watch the video below and learn more about the three critical phases of security incident management:

  • Planning

  • Response

  • Resolution

Categorized under: Security  Infrastructure  Trends We're Seeing  Videos And Infographics 



Severe Winter Weather - Before, During and After Preparations

By Katharine Washburn,
Tuesday, January 21st, 2014

Preparing for Winter WeatherPlanning is valuable in preparation for any form of event, but is essential in more common situations such as severe winter weather. Depending on where you are located, frequent weather events may not appear dangerous since you have been through them before; but what if this next storm shuts down your power for a week?

Do you know what to do or where to go? Do you have the proper supplies on hand? Weather can be a common disruption that arises quickly and without warning and affects many.

Categorized under: Business Continuity Planning  Disaster Recovery 



Planning for Routine IT Maintenance: Best Practices to Follow

By Kaleigh Alessandro,
Thursday, January 16th, 2014

When it comes to keeping your firm’s IT infrastructure running smoothly, it’s critical to perform routine maintenance. Whether you manage your own technology or rely on an outsourced service provider, maintenance plays an important role in keeping your IT running at full speed. Setting priorities and expectations ahead of time will ensure your maintenance is performed successfully and does not negatively impact your firm.Maintenance
 
Following are four areas to focus on as you plan your scheduled maintenance with your in-house or outsourced IT staff.

1. Responsibilities

Be clear on who is responsible for what when it comes to the entirety of the maintenance schedule. By planning ahead, you can greatly reduce the time it takes to complete your firm’s maintenance and the resources you will need to complete all tasks.

Categorized under: Hedge Fund Operations 



Android Apps Coming to a BlackBerry Near You

By Kulvinder Gill,
Tuesday, January 14th, 2014

Android AppsIt’s true, the Canadian smartphone maker BlackBerry is preparing to launch a new firmware upgrade to its BB10 OS smartphone, including the Q5, Q10, Z10 and Z30 phones, that will allow Android apps to become available to its users via the BlackBerry World portal. 

There is no question the BlackBerry handsets have been struggling because of a significant “app gap.” Consumers have come to expect unimaginable numbers of apps at their fingertips, which can easily be found on iOS and Android.

In the past, BlackBerry only accepted apps created using their own proprietary format. The 10.2.1 upgrade to its BlackBerry operating system will support Android apps.

Categorized under: Trends We're Seeing  Software 



Phishing: How Not to Get Hooked!

By Emma Howie,
Thursday, January 9th, 2014

Phishing: Don't Get HookedFirst of all, let’s clear up what phishing is for those of you who aren’t sure. Phishing is a psychological attack used by cyber criminals in order to trick you into giving up personal information or taking action. Phishing has developed over time.

The term initially described email attacks that would steal your username/password information. Phishing now refers to any message based attack, whether that be email, IM, or on a social media network.

 

Categorized under: Security 



Five Ways the SEC Will Impact You in 2014

By Deborah Prutzman (Guest Contributor),
Tuesday, January 7th, 2014

Five Ways SEC Will Impact You in 2014This week we have a contributed post from Deborah Prutzman, CEO of The Regulatory Fundamentals Group.

Since the summer of 2012 the SEC has embarked on a drive to change the culture within financial services firms, including those in the alternatives space. At first the SEC focused on education—both of its staff and of industry participants. Now the SEC is actively using enforcement as a hammer to drive deeper change. Enforcement cases in 2013 included a focus on boards that failed to properly steer the valuation process and on individuals who misled compliance, as well as the highly-publicized cases involving insider trading.

What does this mean for you in 2014?

1. The SEC will continue to focus on governance and on gatekeepers. This means you. Whatever your role-- as an adviser, on a board, or as a service provider-- you must have a grasp of key regulatory requirements. The SEC has announced an initiative to bring enforcement actions for inadvertent (or in technical terms “non-scienter”) violations. Do not let your firm be on that list. Take the time to learn what is required of you. Doing otherwise is like crossing the street with your eyes closed. Some may make it across, but do you want to be the one hit by a truck?

Categorized under: Hedge Fund Regulation  Hedge Fund Operations  Launching A Hedge Fund  Trends We're Seeing 



Recent Posts / All Posts / Previous Page / Next Page