Eze Castle Integration Eze Castle Integration

Eze Castle Blog

Signs It's Time to Upgrade from Your Mom & Pop IT Shop

By Olivia Munro,
Tuesday, March 19th, 2019

As investment management firms grow, the cyber threat landscape evolves and new and improved technologies emerge, it is critical for firms to outsource their IT to a managed service provider who they rely on to provide the best possible support, service and products. Continue reading for five signs that your firm has outgrown their 'Mom & Pop' IT shop and is ready for an upgrade.

The service level isn't meeting your needs.

For investment management firms, having the appropriate support and service level is crucial. Investors are vigilant about mitigating operational risk, and by leveraging a provider with a 24/7/365 Help Desk, you can ease their minds by ensuring your employees, systems and network have constant support. Additionally, if your existing IT service provider isn't responding to emails or returning calls in a timely manner, or you if their support is inconsistent with your service level agreement (SLA), it may be time for an upgrade.

They lack experience with cutting-edge technologies and strong partnerships.

If your IT provider isn't using cutting-edge technologies and best-in-breed solutions, it may be time to consider an upgrade. When outsourcing IT, you want to make sure that the provider offers an array of solutions that are going to best meet your firm's needs. It is unusual for one technology provider to be the best at everything, so you'll want to to work with a service provider that leverages long standing partnerships with a wide-variety of technology vendors.

Especially in today's evolving threat and technology landscape, there is no "one-size-fits-all" approach to either security or IT, and you'll want to partner with a firm that has the experience and flexibility to build a custom solution right for you and your organization.

Categorized under: Outsourcing  Trends We're Seeing 



New Infographic! Global Investment Management Survey

By Amanda Daly,
Thursday, March 14th, 2019

New technology is emerging, cloud computing is becoming the new norm and cybersecurity threats are growing exponentially, but how does this impact investment management firms across the globe? Eze Castle Integration surveyed 150 senior-level executives with IT decision making responsibility to find out how the current landscape has shaped their strategies and attitudes on cybersecurity, IT spend and third-party outsourcing.

Our newest infographic explains the findings: see it here!

You can also download the full survey here

Categorized under: Trends We're Seeing  Cloud Computing  Security  Operational Due Diligence  Outsourcing 



Technology to Enhance Funding and Investor Trust

By Amisha Shah ,
Tuesday, March 12th, 2019

More than ever before, technology has become a key element of the already thorough due diligence processes that businesses go through, in order to secure funding from investors. Thus, being able to illustrate a strong and resilient infrastructure is vital for both start-up and established firms operating in today’s wider professional services landscape.

Today’s blog article will take a look commonly asked investor due diligence questions (DDQs), as well as share best practices on how firms can leverage technology to win the trust of investors and subsequently unlock the capital needed to help their business flourish.

 

Download a copy of our whitepaper ‘Outsourcing in the Alternative Investment Management Industry’ to learn more about managing third-party vendor relationships effectively.

Outsourcing Whitepaper

Categorized under: Cloud Computing  Security  Operational Due Diligence  Outsourcing 



New Survey: Exploring Global Technology and Cybersecurity Priorities in the Investment Industry

By Olivia Munro,
Thursday, March 7th, 2019

With new technology emerging, cloud computing becoming the new norm and cybersecurity threats growing exponentially, how does this impact investment management firms across the globe? To gain a better understanding of industry IT priorities, Eze Castle Integration, in partnership with Microsoft and IDG Reserach, conducted a survey of 150 senior-level executives from the United States and United Kingdom. The findings cover technology priorities, cybersecurity plans and concerns, outsourcing attitudes and trends, and IT budgeting.

Continue reading for a synopsis of our findings, or to view the full report, you can access The 2019 Global Investment Management Survey: Understanding Industry IT Priorities and Spending HERE.

To download the full 2019 Global Investment Management Survey: Understanding Industry IT Priorities and Spending, click here.

Categorized under: Trends We're Seeing  Cloud Computing  Security  Outsourcing  Hedge Fund Operations  Infrastructure 



The Importance of Cybersecurity

By Eze Castle Integration,
Tuesday, March 5th, 2019

Did you know that the global average cost of a data breach is $3.86 million? Or, that the average cost incurred for each record of lost or stolen sensitive and confidential information has increased by almost five (5) percent since 2017? A recent study found that breaches are only getting bigger; and I think we have the evolving sophisticated cyber threats that continue to surface. 

Categorized under: Security  Disaster Recovery  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Business Continuity Planning  Software  Trends We're Seeing 



Employee Appreciation Day: One Mission's Kids with Cancer Buzz-Off

By Amanda Daly,
Thursday, February 28th, 2019

In honor of Employee Appreciation Day tomorrow, March 1, Eze Castle Integration sat down with Dave Wilcox, Service Director- Northeast Region, of Eze Castle Integration for an interview on his experience with One Mission’s Kids with Cancer Buzz-Off


Dave Wilcox has been involved with the One Mission Kids with Cancer Buzz-Off since 2013 so we sat down with him to get an insight on his experience. The money One Mission raises goes exclusively to their 40+ programs and services that are offered at their three partner hospitals; Boston Children’s Hospital, The Jimmy Fund Clinic at Dana-Farber, and Hasbro Children’s Hospital. The one mission of One Mission is to do whatever it takes to get kids through cancer, and they accomplish this by focusing on the day-to-day needs of patients and families that people and charities often overlook as non-essential. One Mission feels very strongly, however, that it’s the little things that get kids and families through the darkest days of their lives. Programs such as birthday parties, decorated hospital rooms, yoga, catered meals, and parking passes are exactly the “small” things that turn a horrible, stressful day into one with smiles and memories. One Mission funds no cancer research at all.

Categorized under: Trends We're Seeing  Eze Castle Milestones 



How Strong is Your Human Firewall? Best Practices for Phishing Readiness + Webinar Replay

By Amanda Daly,
Tuesday, February 26th, 2019

A report by leading global researcher, Gartner, found that 91% of all cyber attacks start with phishing. This reinforces the argument that human error is perhaps the weakest link in the security chain of any organization. In our most recent webinar, we illustrate the value of investing time and money to make employees your strongest security asset.  

phishing

Social Engineering: The art of manipulating people so they give up confidential information

Phishing: Typically through email, but can also be via telephone or other communications where a user is tricked into browsing a malicious URL designed to appear like a site they trust, or provided with other fabricated content such as an attachment containing malware

Continue reading for a recap of the webinar.

Categorized under: Security  Operational Due Diligence  Disaster Recovery 



Secrets to Operational Due Diligence Breakfast Seminar Roundup

By Amisha Shah,
Thursday, February 21st, 2019

In today’s investor landscape, operational due diligence (ODD) can eliminate a manager from consideration, regardless of a positive investment management analysis. With ODD teams increasingly using this veto-power in the decision-making process, it is important for asset managers to be cognizant and well-prepared for thorough operational due diligence tests.

Together, leading accountancy and advisory firm, EisnerAmper, and trusted global provider of managed IT services, Eze Castle Integration, hosted a breakfast seminar to share secrets to operational due diligence excellence with investment firms, in London last week.

Today’s blog article will round-up the technology considerations concerning ODD, covered at the event by Dean Hill, Executive Director at Eze Castle Integration.

Categorized under: Cloud Computing  Operational Due Diligence  Outsourcing 



A Risk-Averse Approach to Securing the Cloud

By Amanda Daly,
Tuesday, February 19th, 2019

This article is featured in AIMA - The Alternative Investment Management Association's latest journal

A Risk-Free Approach to Securing the Cloud

Cloud products continue to evolve as adoption has increased rapidly over recent years. Top vendors such as Microsoft offer feature-rich cloud platforms, with transformational potentials for the global workforce. However, due to the perceived data security risks accompanying cloud usage,there are still many firms that have decided against ‘going cloud’. A report on cloud security published by Crowd Research Partners in 2018 highlights that 91% of cybersecurity professionals share these concerns. Fears around cloud security are not uncommon, and, unfortunately these fears do have a basis. An estimated 25% of public cloud users have suffered data loss, as per security software company McAfee’s ‘Navigating a Cloudy Sky 2018’ report. All things considered, businesses are still encouraged to leverage a cloud-based platform to accelerate the modernisation of their IT. And, trust that with a strong security net in place, applications and assets stored on these solutions can effectively be protected. Businesses are advised to embrace the following cloud data security best practices to secure their network.

Categorized under: Cloud Computing 



Do You Love Your Security Attitude?

By Eze Castle Integration,
Thursday, February 14th, 2019

If there’s one thing we’ve learned over the years when it comes to cybersecurity, it’s that there’s a whole lot more to creating a secure investment firm than robust technology. Before identifying infrastructure components and implementing operational policies, a firm must first be clear on what its attitude is toward security. This attitude will filter through the company from the top down, and will therefore dictate how employees and the business as a whole operate on a daily basis.
 
To give you a clearer understanding of what we mean, we’ve created three security profiles that cover a wide spectrum in terms of security attitudes and practices.

Under the Radar: Low Security

If you’re attitude toward security is low, odds are you’re barely scraping the surface in terms of what practices and policies you should be employing to maintain proper security firm-wide. You likely rely on quick fixes to solve problems instead of looking at the bigger picture and thinking strategically about how security can both benefit and protect your business. You’ve employed minimal preparedness efforts and could be in for a difficult task if faced with a serious security incident. You probably take a “it won’t happen to me” attitude and don’t take security seriously enough – a stance that could endanger your firm in the long term.

 

You can also check out our latest Whitepaper on the required safeguards for 2019  and how to pursue a "security-first" posture.

Security Defined: Required Safeguards for 2019

Categorized under: Security  Cloud Computing  Operational Due Diligence  Outsourcing 



Recent Posts / All Posts / Next Page