Eze Castle Integration Eze Castle Integration

Eze Castle Blog

> Subscribe to Blog Entries about Trends We're Seeing RSS

5 Reasons Investment Management Firms are Considering Public Cloud

By Olivia Munro,
Tuesday, May 21st, 2019

Public cloud computing is growing in popularity among investment management firms. In the past, firms embraced cloud computing technology via the private cloud methodology due to its inherent security features and service and support model. Now, with technological advancements enhancing security, investment management firms are embracing the public cloud model. Continue reading to learn why the investment industry has warmed up to public cloud computing.

Agility, Flexibility and Scalability

The public cloud's flexibility, agility and scalability make it an ideal option for fast-growing or evolving investment firms. The ability to add or remove cloud computing resources as your business needs evolve provides flexibility (not to mention cost savings, but we'll get to that later). This also allows firms to deploy new applications, solutions or technologies in a timely manner and with greater ease.
 

To learn more about the public cloud, you can read Microsoft's whitepaper, "10 Myths About Moving to the Cloud"!

Categorized under: Cloud Computing  Security  Outsourcing  Infrastructure  Trends We're Seeing 



Top Technology Challenges for CTO's in the Investment Industry

By Olivia Munro,
Thursday, May 9th, 2019

In the evolving technology landscape, coupled with regulatory concerns and investor demands, CTOs at investment management firms must be prepared for a host of complex technology challenges in today’s world. Here are some of the top challenges CTOs in the investment management industry are facing today:

1.) Data Security, Privacy and Governance

One of the top challenges, if not THE top challenge, for CTOs is cybersecurity. Troublesome threats include AI-driven cyber attacks, ransomware and malware attacks, phishing schemes and internal threats, among others. Cybersecurity programs require attention, expertise and consistent evaluation to ensure you have a robust security posture, and developing the proper protections, plans and programs is time consuming and challenging.

2.) Multi-cloud Computing Challenges

While cloud computing has grown in popularity and become more accepted by investment management firms, they were more comfortable with using the private cloud based on its inherent security. Now, due to advancements in security, more firms are incorporating the public cloud into their methodology. Challenges lie in every step, from planning and deciphering which cloud model best fits their firms' needs, to implementing and securing the cloud, managing vendors, and educating employees and other internal and external stakeholders. 

3.) Compliance Regulations and Audits

All businesses in the financial space need to be especially cognizant of the regulatory bodies and compliance requirements specific to their industry. Compliance audits ensure that the firm is adhering to the regulatory guidelines and drive all technology related decisions. Failure to maintain compliance can result in hefty fines or legal action. This responsibility often falls on the CTO, and it is no easy job to maintain compliance across an investment firm.

4.) Strategic Investment in Technology and Budgetary Concerns

In general, IT budgets are growing among investment management firms, and with the progressive and evolving technology landscape, new tools, technologies and services appear and create tough choices regarding budget spend. CTOs must evaluate which tools are useful, valuable, and trustworthy for the organization. For some CTO's, getting management buy-in for new technologies is a challenge of its own. On the other hand, for some CTOs convincing the management team that a technology or tool isn't the right fit for the firm is the challenge.

5.) Finding Talent

According to our 2019 Global Investment Management IT Survey, respondents indicated that lack of in-house cybersecurity talent was a top 5 concern for 47% of UK businesses and 22% of businesses in the US. The talent pipeline depends on potential hires and their skill sets, and the shortage of talent in general, specifically in security, cloud computing, data analytics and business analytics.

Download out eBook to read the full list of top technology challenges for CTO's and how to avoid them.

Categorized under: Trends We're Seeing  Cloud Computing  Security  Operational Due Diligence  Outsourcing  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Project Management 



World Password Day – How to Protect Your Credentials on the Dark Web

By Eze Castle Integration,
Friday, May 3rd, 2019

To celebrate World Password Day, continue reading to learn about password safety best practices! Stolen credentials like usernames and passwords and account takeover (ATO) instances are increasing at an alarming rate. This can occur when credentials are stolen and sold to the highest bidder on the dark web. This can wreak havoc on a firm's reputation, relationships, and finances. Continue reading to learn about password safety best practices.

Passwords like “12345” or “password” are very predictable, as are consecutive letters. To ensure the safety of your password and privacy, be sure to:

  • Keep the password complex, i.e. incorporate letters, numbers, and symbols and that change often. By doing so, this alleviates the option of someone cracking the code of your password. Additionally, aim for a long password (think 8 characters) - the longer the password the better, and same goes for complexity.
     

  • Avoid using personal information in your password that may be easy for someone to figure out. Things to avoid include your name, address, date of birth, pet’s name and children’s names. Instead, make up a sentence and use the first letters. For example, 'I love creating complex passwords with eight characters!' turns into this password: Ilccpw8c! 
     

  • Make sure your passwords vary across different platforms – switch it up. It is okay to use the same word, but be sure to change it up by capitalizing different letters, or substituting letters for numbers such as changing an “e” to “3”.
     

Categorized under: Security  Operational Due Diligence  Trends We're Seeing 



Five Qualities to Look for in a 24x7 Help Desk

By Kulvinder Gill,
Tuesday, April 23rd, 2019

When evaluating technology providers, there are a number of factors to consider when determining which is the best fit for your firm. One important, and often overlooked, criterion is the quality of the Help Desk. Firms rely heavily on technology, but no technology is completely infallible. In the event of an unexpected issue, having a knowledgeable, experienced Help Desk at your fingertips is essential.

So, what makes an exceptional Help Desk?

In today's blog article, we will take a look at some critical considerations and provide guidelines for what to look for when selecting a Help Desk provider for your firm. 

Categorized under: Help Desk  Trends We're Seeing 



How to Create a Comprehensive Security Training Program for Employees

By Olivia Munro,
Thursday, April 18th, 2019

Here at Eze Castle Integration, we’re constantly talking about the evolving security landscape and the technical tools and layers of security required to keep your firm's sensitive information safe. Today, we're here to talk about one extremely important layer of security that firms often overlook: employee training.

Though sometimes underestimated, developing and implementing a comprehensive employee training program creates an internal culture of security and ensures that all employees maintain a "security-first approach" to everything they do. This will make your employees an asset to your data security as opposed to a threat and bolsters your firm's cybersecurity strategy.



To learn more about creating an internal of security, downloud our guidebook, Four Step Guide to Employee Security Awareness, Culture of Security.

Categorized under: Security  Outsourcing  Trends We're Seeing 



Hello, Eze Dark Web Monitoring, A Deterrent to Account Takeover Activities

By Amanda Daly,
Tuesday, April 9th, 2019

Here at Eze Castle Integration, we take great pride in listening to our clients and the market as a whole. We follow a security-first approach in delivering complete cloud solutions complemented by the support of our award-winning global helpdesk, which operates 24x7x365. Whether using the public cloud, private cloud or a hybrid cloud approach, Eze Castle Integration excels in providing best-in-class solutions that address a firm’s specific needs.

Dark Web MonitoringAcross the dark web underworld criminals are buying and selling stolen user credentials, including email addresses, usernames and passwords, to access high value (i.e. executive and privileged user) accounts. Once in a system, criminals steal financial assets, uncover trade secrets and exploit other vulnerabilities. To stop this threat, firms must monitor the Dark Web and respond.

Enter Eze Dark Web Monitoring, a cost-efficient deterrent to ATO activities. Eze Dark Web Monitoring provides early detection, alerting clients when credentials are discovered and forcing users to reset passwords.

“Cybersecurity threats rank as some of the greatest risks facing the industry today with companies of all sizes under attack. At Eze Castle Integration, protecting clients is our mission. We follow a security first approach to IT and deliver fully managed security solutions, such as Eze Dark Web Monitoring, to fortify our client environments – whether they reside in a public cloud, private cloud or on-premise,” said Steve Schoener, Chief Technology Officer at Eze Castle Integration.

Categorized under: Security  Cloud Computing  Operational Due Diligence  Outsourcing  Private Equity  Disaster Recovery  Trends We're Seeing  Eze Castle Milestones 



Signs It's Time to Upgrade from Your Mom & Pop IT Shop

By Olivia Munro,
Tuesday, March 19th, 2019

As investment management firms grow, the cyber threat landscape evolves and new and improved technologies emerge, it is critical for firms to outsource their IT to a managed service provider who they rely on to provide the best possible support, service and products. Continue reading for five signs that your firm has outgrown their 'Mom & Pop' IT shop and is ready for an upgrade.

The service level isn't meeting your needs.

For investment management firms, having the appropriate support and service level is crucial. Investors are vigilant about mitigating operational risk, and by leveraging a provider with a 24/7/365 Help Desk, you can ease their minds by ensuring your employees, systems and network have constant support. Additionally, if your existing IT service provider isn't responding to emails or returning calls in a timely manner, or you if their support is inconsistent with your service level agreement (SLA), it may be time for an upgrade.

They lack experience with cutting-edge technologies and strong partnerships.

If your IT provider isn't using cutting-edge technologies and best-in-breed solutions, it may be time to consider an upgrade. When outsourcing IT, you want to make sure that the provider offers an array of solutions that are going to best meet your firm's needs. It is unusual for one technology provider to be the best at everything, so you'll want to to work with a service provider that leverages long standing partnerships with a wide-variety of technology vendors.

Especially in today's evolving threat and technology landscape, there is no "one-size-fits-all" approach to either security or IT, and you'll want to partner with a firm that has the experience and flexibility to build a custom solution right for you and your organization.

Categorized under: Outsourcing  Trends We're Seeing 



New Infographic! Global Investment Management Survey

By Amanda Daly,
Thursday, March 14th, 2019

New technology is emerging, cloud computing is becoming the new norm and cybersecurity threats are growing exponentially, but how does this impact investment management firms across the globe? Eze Castle Integration surveyed 150 senior-level executives with IT decision making responsibility to find out how the current landscape has shaped their strategies and attitudes on cybersecurity, IT spend and third-party outsourcing.

Our newest infographic explains the findings: see it here!

You can also download the full survey here

Categorized under: Trends We're Seeing  Cloud Computing  Security  Operational Due Diligence  Outsourcing 



New Survey: Exploring Global Technology and Cybersecurity Priorities in the Investment Industry

By Olivia Munro,
Thursday, March 7th, 2019

With new technology emerging, cloud computing becoming the new norm and cybersecurity threats growing exponentially, how does this impact investment management firms across the globe? To gain a better understanding of industry IT priorities, Eze Castle Integration, in partnership with Microsoft and IDG Research, conducted a survey of 150 senior-level executives from the United States and United Kingdom. The findings cover technology priorities, cybersecurity plans and concerns, outsourcing attitudes and trends, and IT budgeting.

Continue reading for a synopsis of our findings, or to view the full report, you can access The 2019 Global Investment Management Survey: Understanding Industry IT Priorities and Spending HERE.

To download the full 2019 Global Investment Management Survey: Understanding Industry IT Priorities and Spending, click here.

Categorized under: Trends We're Seeing  Cloud Computing  Security  Outsourcing  Hedge Fund Operations  Infrastructure 



The Importance of Cybersecurity

By Eze Castle Integration,
Tuesday, March 5th, 2019

Did you know that the global average cost of a data breach is $3.86 million? Or, that the average cost incurred for each record of lost or stolen sensitive and confidential information has increased by almost five (5) percent since 2017? A recent study found that breaches are only getting bigger; and I think we have the evolving sophisticated cyber threats that continue to surface. 

Categorized under: Security  Disaster Recovery  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Business Continuity Planning  Software  Trends We're Seeing 



View earlier posts in the archive

Recent Posts / All Posts


 

Subscribe

Follow Us

    Follow us on Twitter Follow us on FaceBook Follow us on LinkedIn Follow us on Google RSS Feed

Recent Articles

Categories

Archives