Eze Castle Integration Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Videos and Infographics RSS

Emerging Manager Trends in Operational Due Diligence (Webinar Replay)

By Amanda Daly,
Tuesday, September 19th, 2017

Today’s emerging managers face a number of challenges: fierce competition and demanding investor expectations tops among them. With operational due diligence processes evolving rapidly, how can emerging managers differentiate themselves and make an impression on suspecting investors?

During a recent webinar, speakers from Eze Castle Integration and EisnerAmper discussed the current environment for emerging managers and examined the following topics:

  • Key Qualities Investors Look For

  • Red Flags for Emerging Manager Investors 

  • Investors IT Expectations

  • Why Firms Look to Outsource

Categorized under: Operational Due Diligence  Security  Outsourcing  Hedge Fund Operations  Project Management  Videos And Infographics 



Prepare for the Unexpected: Business Continuity (Webinar Recap)

By Katelyn Orrok,
Thursday, July 20th, 2017

Recently, Eze Castle Integration moved office locations in London. In fact, we had just finished moving into our office, and minutes later the London Bridge attack occured. Fortunately, all of our employees were safe, but the next day our office was closed due to the ongoing investigation. WIth an updated business continuity plan in place, Eze Castle employees were still able to run business operations as usual.

Take our real-life scenario as a lesson that even if you have security in place, disaster scenarios can still happen either directly or indirectly, so it is best to be prepared.

What does developing a business continuity plan entail?

Step 1: Identify by utilizing risk assessments
Step 2: Analyse the effects on your business (Business Impact Analysis)
Step 3: Design, execute and implement a strategy
Step 4: Measure- Plan testing, training and maintenance

Categorized under: Business Continuity Planning  Disaster Recovery  Videos And Infographics 



Understanding The Power Behind Your Network (Video)

By Lauren Zdanis,
Tuesday, June 20th, 2017

Technology is only effective if it’s supported by a robust network infrastructure. And despite that you can’t see it, your network is one of the most powerful (and underrated) components to your IT operations.

During a recent webinar, Eze Castle Integration's VP of Network Services, Mike Abbey, discussed trends in networking technology and highlighted the power behind your firm’s network. Some areas he explored during the 20-minute discussion include:

  • How private networks differ from traditional Internet lines

  • Why global private networks are particularly advantageous for financial and investment management firms 

  • How Internet of Things devices - and the multitude of devices in general - are impacting network infrastructure requirements (speed, bandwidth, etc.)

  • What benefits/advantages firms can gain from direct peering and connectivity

Watch below or click here for our full webinar.

Categorized under: Infrastructure  Communications  Trends We're Seeing  Videos And Infographics 



Debunking Common Myths About Voice over IP (VoIP)

By Mary Beth Hamilton,
Thursday, May 11th, 2017

Voice over IP has come a long way, especially in the business world, but many financial services firms still have hesitations about making the switch. To assist hedge funds and private equity firms in making a decision about voice solutions, we're debunking some common myths.

MYTH 1: Poor Call Quality – Everyone Will Know I’m on VoIP

A main concern of VoIP is call quality, which can be impacted by a number of features including the network, available bandwidth and even the type of phones being used. However, a well-designed business-caliber VoIP system can deliver quality of service comparable to an in-house phone system. In business settings, where calls are made over private IP connections, Quality of Service (QoS) can be monitored and guaranteed because the entire IP connection is controlled by the party making the call.

When evaluating VoIP for financial firms, it is important to inquire about the underlying network and how voice traffic is prioritized and routed. You want a provider that has full control over network traffic and can ensure high quality of service. For added confidence, ask to speak with existing VoIP customers (over the phone!) to hear about their experiences first-hand.

Categorized under: Communications  Cloud Computing  Trends We're Seeing  Videos And Infographics 



Top 10 IT Security Audit Gaps and How to Avoid Them

By Katelyn Orrok,
Tuesday, April 11th, 2017

When it comes to cybersecurity there are many factors that you need to be conscious of. During a recent webinar, speakers from Eze Castle Integration and Wolf & Company shared 10 of the most common cybersecurity gaps identified during an IT audit/risk assessment. We’ve listed the top 10 below and shared some particulars on a few of the most critical (in our opinion). For more detail on how these gaps are presenting themselves – and also best practices for avoiding them – click here to listen to the full webinar replay

Top 10 IT Security Gaps  

  1. Risk Management and Governance

  2. IT Asset Management

  3. Vulnerability Assessments

  4. Patch Management 

  5. Social Engineering & User Training 

  6. Business Continuity Planning

  7. Multi-Factor Authentication

  8. Third Party Vendor Management 

  9. User Provisioning and Management 

  10. Incident Response Planning/Procedures 

Categorized under: Security  Operational Due Diligence  Outsourcing  Private Equity  Hedge Fund Operations  Infrastructure  Business Continuity Planning  Trends We're Seeing  Videos And Infographics 



ODD & Technology Advice for Achieving Institutional Operations (Video)

By Lauren Zdanis,
Thursday, March 16th, 2017

Post-launch, many hedge funds and investment firms struggle to gain ground and attract the institutional capital needed to succeed in today’s competitive market. As firms grow – and bandwidth and budget are less likely to be roadblocks – it can be a challenge to reinvent the wheel and position your firm to capture institutional dollars.

During a recent webinar, speakers from EisnerAmper and Eze Castle Integration explored trends in hedge fund operational due diligence and technology operations and offered advice for asset managers looking to grow out of their startup boots and achieve an institutional grade operation. Some areas they explored during the 40-minute webinar include:

  • How institutional investor expectations have changed for firms at the pre-launch and post-launch phases;

  • The importance of (and detriment to not) passing an operational due diligence examination;

  • How cyber security expectations are evolving to increase standards across both technology infrastructure and policy planning; 

  • If the public cloud is suitable for investment management firms looking to solidify institutional investments; and

  • Top mistakes emerging managers make that prevent successful ODD exams and institutional evolution.

Scroll down or click here to watch the replay

Categorized under: Operational Due Diligence  Security  Outsourcing  Hedge Fund Operations  Business Continuity Planning  Project Management  Videos And Infographics 



Cybersecurity Basics for Asset Managers (Webinar Replay)

By Katelyn Orrok,
Tuesday, February 28th, 2017

When it comes to cybersecurity, the list of haves and have nots is constantly evolving due to the changing regulatory and threat landscape. In case you missed it, we hosted a webinar this week on Cybersecurity Basics for Asset Managers, during which we uncovered various elements within three primary cybersecurity layers: from Tier 0 (Basic Protection) to Tier 1 (Industry Standard) to Tier 2 (Advanced Protection).

How does your firm stack up when it comes to your cybersecurity practices? Watch the replay below and find out where you fit in.

  • Tier 0: We call this level Tier 0 in part because, well, there’s zero chance your firm will have long-term success in thwarting cyber risks if you don’t employ these basic security measures.

Categorized under: Security  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Videos And Infographics 



Private Equity CTO Survey: Insights in Cybersecurity, CTO Roles & IT Outsourcing [INFOGRAPHIC]

By Mary Beth Hamilton,
Tuesday, December 6th, 2016

Our 2016 Private Equity CTO Survey is packed with insights across four primary areas: business priorities, cybersecurity, outsourcing trends and the evolution of the private equity CTO. These findings include:

  • 70% of PE firms report their organizations have experienced 3 or more cybersecurity issues in the past 12 months

  • Nearly 90% of respondents identified cloud computing as a planned investment area, with respondents preferring private cloud solutions over the public cloud.

  • 93% of survey respondents believe their firm’s CTO or top IT executive is becoming more important to their business

Checkout out our infographic (below) for a picture of our findings and download the full report here: www.eci.com/pesurvey.

Categorized under: Security  Cloud Computing  Outsourcing  Private Equity  Trends We're Seeing  Videos And Infographics 



Private Equity CTO Survey Explores IT Priorities and CTO Role Evolution

By Kaleigh Alessandro,
Thursday, December 1st, 2016

The tide is changing for private equity firms. They continue to grow in popularity – some say private equity is the new hedge fund – but with increased interest comes amplified speculation and heightened expectations.

In technology, private equity firms have found a fierce enabler for continued growth, and one that has shone the light on organizational benefits to be had far beyond the IT closet.

Eze Castle Integration commissioned its Private Equity CTO Survey to more closely examine the evolution of the private equity industry as driven by – and driven to – technology. In reaching the top IT executives and chief technology officers (CTOs) at these firms, the survey highlights their priorities, successes and even failures, and in doing so, sheds light on this industry that has risen to the forefront of the greater financial community.

Our Private Equity CTO Survey encompasses four primary sections: business priorities, cybersecurity, outsourcing trends and the evolution of the private equity CTO.

Business Priorities

If one thing is to be derived from the advent of information technology, it is that IT enablement extends well beyond the recesses of the Communications Room. Accordingly, technology decision-making is also impacted by an organization’s business objectives, and the two work in alignment to derive achievements across the firm. In this section of the survey, we’ll highlight areas where business goals have impacted IT budgets and where private equity firms plan to focus their attention in the coming year.

Categorized under: Private Equity  Cloud Computing  Security  Outsourcing  Trends We're Seeing  Videos And Infographics 



Preventing Cybersecurity Threats with Email Phishing Simulations

By Kaleigh Alessandro,
Thursday, November 10th, 2016

Social engineering schemes continue to grow in their sophistication, and phishing campaigns, in particular, are causing concern as they make their way to employee inboxes. These fraudulent email campaigns (and phone calls too!) appear legitimate and take advantage of employees who are often too busy or simply unprepared to identify a scam. In either case, if the employee clicks a link, downloads an attachment or provides credentials or financial information to a hacker behind the scenes, it is a gateway to potentially very serious scenarios.

And these scams are working. A 2016 study by Verizon found that 30 percent of phishing emails are opened by the recipient. According to the FBI, spear-phishing campaigns between 2013 and 2015 cost companies more than $2 billion.  

And while there are next-generation firewall protections and email security features and tools to act as security barriers to targeted attack emails, unfortunately, some of these emails are still going to get through and pose a threat to your firm’s security posture. (Side note: to learn more about each of these cybersecurity defense layers, watch our webinar replay below).

Categorized under: Security  Trends We're Seeing  Videos And Infographics 



View earlier posts in the archive

Recent Posts / All Posts