Eze Castle Integration Eze Castle Integration

Hedge IT Blog

Blog Entries from 10/2012

Hurricane Sandy Tests Business Continuity Plans: A compilation of DR & BCP resources

By Kaleigh Alessandro,
Tuesday, October 30th, 2012

First and foremost, our thoughts go out to all those impacted by Hurricane Sandy, and our team is ready to assist clients as they resume business operations.

While effects were minimal here in Boston, residents and businesses in New York, New Jersey and along the East Coast are grappling with immeasurable damage as a result of the hurricane. US markets have closed for a second straight day, and the effects of Sandy will continue to wreak havoc on financial firms nationwide.  

Over the next days and weeks companies and the media will reflect on the impact of Sandy as well as lessons learned.  Therefore, today’s post recaps previous Hedge IT articles focused on business continuity planning and disaster recovery.  Our hope in publishing this article is to provide a handy resource for future planning.

Categorized under: Business Continuity Planning  Disaster Recovery  Hedge Fund Operations 

Apple's 'mini' Additions to Your Christmas List?

By Jason Lisnak,
Thursday, October 25th, 2012

Earlier this week, Tim Cook led Apple's latest keynote and announced product upgrades across the board. Apple iMac miniNew additions here and spec upgrades there are prompting users around the globe to update their holiday shopping lists and hope for steep discounts on Black Friday. And in-between what were many foreseeable announcements, Apple also threw in a few surprises. Here are the big ones:
The new new iPad. In what might have been the biggest surprise, Apple announced it is phasing out the new iPad (released only a few months ago) and replacing it with a newer one (due out next month). Same look. Same price. Less issues. In simplest terms, they fixed all the complaints. Theres’ now more LTE support (including Sprint in the US and local providers in the UK), a faster processor faster WiFi and some better camera features. Oh and with the help of a new power adapter, quicker charging too. No major changes, but it does help to know you are getting your money’s worth and that the company you are buying from really listens to users’ input.

The iPad mini. Users want small. Technology has always been about making devices smaller; even the iPhone 5, with its bigger screen, has smaller components and a smaller weight. And now your iPad can be smaller too. Just as powerful as the current $399 model, the iPad mini has more features (Siri and LTE just to list a few) and a lower price (starts at $329). At over $250, many users might not make the jump away from their Kindle Fire HD or Nexus 7, but for users considering Apple and for users who want small, I wish them short lines in the store and quick initial shipments.

Categorized under: Communications  Trends We're Seeing 

Infographic: What Technology Do Hedge Funds Prefer?

By Mary Beth Hamilton,
Thursday, October 25th, 2012

Yesterday we unveiled our 2012 Hedge Fund Benchmark Study, which looks at the technology preferences of 300+ hedge funds and alternative investment firms.  Since a picture is worth a thousand words (or about 4,000 in the case of our report), we decided to publish this handy little infographic on our findings.

For you lovers of words, you can download the complete report here.

Hedge Fund Tech Infographic


Categorized under: Trends We're Seeing  Eze Castle Milestones  Hedge Fund Operations  Hedge Fund Regulation  Launching A Hedge Fund  Videos And Infographics 

Safeguards for Trade Malfunctions: As Much About People as Technology

By Deborah Prutzman, Regulatory Fundamentals Group,
Tuesday, October 16th, 2012

On Tuesday, October 2, the SEC held a roundtable discussion in Washington D.C. focused on technology use within the investment management sector. The following article from our guest blogger, Deborah Prutzman of the Regulatory Fundamentals Group, offers some highlights and insights from that meeting.
securities and exchange commission logoThe 2010 Flash Crash, the Knight Capital incident, the Facebook IPO and the BATS IPO were all rooted in technological failures. An SEC roundtable held on October 2, 2012 at the SEC headquarters in Washington discussed ways to prevent future incidents like these from occurring again. The roundtable gave a “thumbs up” to the adoption of a “kill switch” and focused on a number of best practices that are likely to find their way into managers’ procedures and investors’ due diligence questionnaires. Perhaps the most important takeaway, however, is that the role of the technology team, and that of the CTO, will continue to grow in importance.

Categorized under: Trends We're Seeing  Disaster Recovery  Hedge Fund Operations  Hedge Fund Regulation  Business Continuity Planning 

Hedge Fund Investors Are Getting Comfortable with Cloud in 2012

By Mary Beth Hamilton,
Thursday, October 11th, 2012

Earlier this year we conducted a survey looking at adoption of cloud services within the investment management industry. One question looked at barriers to adoption of cloud services. We found that 62 percent of those surveyed said a significant “barrier” to cloud deployment was that their investors and/or clients are not receptive to the idea of cloud computing. However, nearly a quarter of firms surveyed (23%) said this factor was not very significant or not significant at all. Education continues to play an important role here, and both investment firms and investors seem to be more open to the cloud than in years past. We expect this trend to continue as cloud services become mainstream.

Categorized under: Cloud Computing 

Turning Hedge Fund Security Inside-Out (Webinar Recap Part 2)

By Kaleigh Alessandro,
Tuesday, October 9th, 2012

Hedge fund cybersecurity is a serious concern, and our recent webinar highlighted the technical steps that firms can take to prevent, detect and respond to internal and external security threats. But in addition to implementing technical measures to protect your infrastructure, your firm must also employ operational policies and procedures to document incidents and provide transparency to investors and auditors.Security - Access Control
The following policies and procedures are recommended as part of an overall technology and security management strategy:

Access Control

The first step you need to take is determining who at your firm needs access to what. Yes, I’m saying not every employee should be able to access every file, server, etc. Employ the principle of least privilege and only authorize access to employees who need it. The less access employees have, the less damage can be done.
After you’ve controlled access, be sure to keep a log monitoring who accesses what. Do a regular audit to determine what access levels are in place and what changes need to be made. Remember - you aren’t saying you don’t trust your employees; rather, you trust the computers and systems they are using more.

Categorized under: Security  Hedge Fund Operations 

iPhone 5: New Features Review

By Jason Lisnak,
Thursday, October 4th, 2012

line at new york city apple storeThe new iPhone 5 – what do you think?

Anyone who has picked up a newspaper or read the Internet over the past two weeks since the iPhone 5's much anticipated release knows it has issues. The black model scuffs too much. Pictures look too purple. The Maps app is horrible. Everyone seems to have an issue with at least some new feature of the iPhone 5.

But in my observations, there is one thing that stands out among all those articles and negative reviews - everyone has an iPhone 5, and nobody can stop talking about it. And that's rightfully so!

The iPhone 5 comes preloaded with all the new features of the latest iOS, and it rocks. Below I've highlighted a few that you may find most intriguing. I know I've left a lot out (a review of 200 features would keep you here all weekend!), but I’ve tried to highlight some of the most significant changes.

Categorized under: Trends We're Seeing  Communications 

Hedge Fund Cybersecurity: Preparing Your Firm For an Intrusion

By Kaleigh Alessandro,
Tuesday, October 2nd, 2012

We hosted a webinar on hedge fund security and the internal and external threats firms should be aware of. Following is a short recap of the material presented by Eldon Sprickerhoff of eSentire – a leader in the managed security services space.Hedge fund security
For hedge funds and their investors, the reality of cybersecurity threats is a serious one and one that must be proactively and consistently monitored. Investors today expect firms to take steps to thwart potential security threats, which means using vulnerability assessments and penetration tests to identify possible risks.
The reality is that most successful cybersecurity attacks in today’s environment occur via different methods: malware via email, malware via download and transfer via USB. In most cases, an employee will download an unsuspecting virus or open an unsuspecting email, triggering a malware attack that could open the door for further intrusion. Alternatively, a trend becoming more common is the threat of employees transferring information onto USB drives (whether knowingly or unknowingly), resulting in an internal security breach.

Categorized under: Security  Trends We're Seeing 

Recent Posts / All Posts