Eze Castle Integration Eze Castle Integration

Hedge IT Blog

Blog Entries from 12/2012

Best of the Year Blog Posts: A Look Back at Hedge IT in 2012

By Kaleigh Alessandro,
Thursday, December 27th, 2012

Here we are again – at the end of another year and recapping some of the best and most popular posts from the Hedge IT Blog in 2012. This year, we spent a lot of time talking about cloud computing, security, and disaster recovery, among other topics.Happy New Year
As always, we welcome your feedback and would love to hear your suggestions for future articles on Hedge IT. In the meantime, we’ll continue to bring you new and interesting posts related to all of your favorite hedge fund technology topics.
At last, here is a recap of our most popular blog articles of 2012:

Cloud Adoption Survey Results Revealed: Part 1

This year, we undertook a research study surveying 130 hedge funds and alternative investment firms in regards to their adoption of cloud technology. The results revealed that more than eight out of ten investment firms are either currently using or planning to use cloud computing services in the near future. This shift towards the cloud signifies a major trend in the financial services space as firms look to move away from costly on-premise technology infrastructures. You can download the complete survey report here.

Categorized under: Cloud Computing  Disaster Recovery  Security  Hedge Fund Operations  Hedge Fund Regulation  Help Desk  Infrastructure  Outsourcing  Business Continuity Planning  Trends We're Seeing 

What’s the Word on Windows 8?

By Dina Ferriero,
Tuesday, December 18th, 2012

microsoft windows 8 logoA few months ago, we took our readers on a tour of the newly released Microsoft Office Suite. This updated version of such tools as Word, PowerPoint, Excel and Outlook made it easier for users to take advantage of tablet and mobile computing devices. Now, with the recent release of its new Windows 8 operating system, Microsoft is continuing its foray into the mobile computing environment.
We’ve been receiving questions on Windows 8 from several clients and other industry professionals (What new features are included? What’s changed since previous versions?), so we’ve done some research and tapped our internal experts to provide you with an overview of Microsoft’s newest release.

Categorized under: Trends We're Seeing  Hedge Fund Operations 

Ready for Liftoff? Launching a Hedge Fund in 2013

By Kaleigh Alessandro,
Thursday, December 13th, 2012

RocketWe’ve said it before, and we’ll say it again. Starting a hedge fund is a thoughtful and time-consuming process that requires skillful considerations and supportive collaborations to drive success. But with the changes that have swept through the industry of late, now seems like as good a time as any to launch a new fund.
We recently hosted a webinar with KPMG to examine the current hedge fund landscape for startups and determine whether 2013 is the right time to begin the launch process. Below is a short summary of the topics discussed. To watch the full event replay, click here.

Forming a Hedge Fund

There is a wealth to consider when launching your first (or second or third) hedge fund. From organizational and personnel matters to grappling with regulatory and compliance requirements and infrastructure needs, the list seems to never end. With the help of experienced prime brokers and service providers, however, managing these tasks has never been easier.

Categorized under: Launching A Hedge Fund  Cloud Computing  Security  Outsourcing  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Business Continuity Planning  Real Estate  Trends We're Seeing 

What's Trendy in Technology? Predictions for 2013

By Kaleigh Alessandro,
Tuesday, December 11th, 2012

It’s that time of year again: time to take a look ahead and make predictions for the top technology trends of 2013. I don’t think any of these trends will come as a surprise to you, but let’s take a closer look.


I know - we had this topic on last year’s list, too. But it’s so important, it deserves another nod. Smartphones and tablets have invaded the enterprise world like never before, and we’re seeing companies work more diligently to manage the use of these devices. Strategies such as Bring Your Own Device (BYOD) give firms the ability to allow employees to use personal devices for work purposes. While this provides employees with flexibility in terms of which devices they can use (and eliminates the need to carry more than one), it also highlights the importance of enhancing security measures to protect sensitive company information from getting into the wrong hands. Speaking of security…

Categorized under: Trends We're Seeing  Cloud Computing  Security  Communications  Outsourcing 

'Tis the Season for Giving Back: A Great Year for Hedge Funds Care

By Dina Ferriero,
Thursday, December 6th, 2012

hedge funds care logoWith the holiday season just around the corner, we’re reminded to take a moment to appreciate what we have, and give back to those who may not be quite as lucky this year.
In keeping with the spirit of the season, we’d like to take this opportunity to recognize the amazing work of one of our favorite nonprofit organizations, Hedge Funds Care. This group is committed to preventing and treating child abuse by raising money to fund programs that support victims in their local communities around the world. These noble efforts are made possible by the generous support of individuals and companies throughout the hedge fund industry. We encourage you to learn more and consider becoming a supporter by visiting the Hedge Funds Care website.

Categorized under: Trends We're Seeing  Eze Castle Milestones 

Taking the Cloud Security Exam (aka Hedge Fund Checklist)

By Mary Beth Hamilton,
Tuesday, December 4th, 2012

Question markLast month our friends at eSentire published a Cloud Security Checklist to provide hedge funds and alternative investment firms a guide when evaluating a cloud provider such as Eze Castle Integration.  The Checklist asked the question, “How can you know if your Cloud Service Provider has your best risk management interests in mind?”

Since here at Eze Castle Integration we are big proponents of secure cloud computing, we thought we’d be the first cloud service provider (that we know of!) to complete eSentire’s checklist.

Here goes!

1.0 Physical Security: Does the cloud provider have a rigorous physical access protocol?

Yes, yes and yes.  Eze Castle has detailed Access Control and Premise Access policies that extend from physical to virtual environments.  Following are some of the key physical access control protocols we have in place:

  • 24x7x365 manned lobby with visual verification of identity

  • Two-phase authentication of visitors (card and biometric)

  • Secured access at all entry points, including doors and elevator banks

  • Monitored security cameras as well as door, motion and camera sensors

  • Visitor logs closely monitored and escorts required at all times

  • Key-locked cages and cabinets at all data center facilities

Categorized under: Security  Cloud Computing  Disaster Recovery  Hedge Fund Operations  Infrastructure 

Recent Posts / All Posts