Eze Castle Integration Eze Castle Integration

Hedge IT Blog

KRACK Wi-Fi Vulnerability Puts Patch Management in the Spotlight

By Mary Beth Hamilton,
Thursday, October 19th, 2017

Teams across our company are hard at work testing, validating and implementing the many new patches being released from vendors, including Cisco and Microsoft, as a result of the KRACK (‘Key Reinstallation Attacks’) vulnerability.

Warnings around the new vulnerability, KRACK, made headlines earlier this week as its identification meant that virtually any Wi-Fi enabled device could be made vulnerability to exploit. This latest exploit also reinforces the importance of being prepared to execute both reactive and proactive patch management measures.

Yet when it comes to patch management, most firms do not have the internal resources necessary to effectively monitor, test and roll-out patches in a timely fashion. Remember the Equifax breach? It is widely reported the Equifax breach occurred because the company missed a patch to address an application vulnerability, which the criminals later exploited.

You Need a Patch Management Service

Outdated systems are dangerous yet all systems can become dangerous if left unpatched. That’s why we recommend looking at a patch management service. Companies – such as Eze Castle Integration! – can provide fully managed patch services to ensure software and firmware remain up-to-date and are proactively monitored to prevent security bugs and malicious exploits, reducing overall firm risk. 

Categorized under: Cloud Computing  Security  Outsourcing  Infrastructure 



51 Hedge Fund IT Due Diligence Questions You Can Expect From Investors

By Mary Beth Hamilton,
Tuesday, October 17th, 2017

On our recent Emerging Manager Trends in Operational Due Diligence webinar, we looked at how today’s emerging managers face a number of challenges from fierce competition to the rapidly evolving investor IT due diligence process, especially in terms of scrutiny on technology processes and security safeguards.

The reality is that investors have a greater understanding of technology, are asking more probing due diligence questions and care about the responses they receive. In recent years the depth of DDQ questions around information technology and security has expanded as investors become increasingly savvy about IT and headlines around IT risks have grown.

Here at Eze Castle Integration we regularly assist our clients in completing the IT portions of investor due diligence questionnaires. The wording of questions varies but here is a handy list of 51 common IT due diligence questions we see.

Organization

  1. Provide an organization chart for the Company, its affiliates and key personnel.
  2. Provide the physical address and general contact information for each of the Company’s office locations.
  3. Provide the name and contact information of the Company employee(s) assigned to the client’s account(s).
  4. Provide a list of compliance personnel, their roles and qualifications, the date of his/her appointment and position within the Company’s organizational structure.

Categorized under: Operational Due Diligence  Cloud Computing  Security  Launching A Hedge Fund  Disaster Recovery  Hedge Fund Operations  Trends We're Seeing 



Five Questions with…Bob Shaw, Director of Technical Architecture

By Kaleigh Alessandro,
Thursday, October 12th, 2017

From time to time, we like to introduce new voices to our blog and pick their brains about technology trends and industry observations. Most recently, I sat down with Eze Castle’s Director of Technical Architecture, Bob Shaw, to discuss cybersecurity and how clients are responding to increasing threats.

1. Earlier this year, the WannaCry outbreak made a lot of waves and forced firms to reevaluate their protections against ransomware. What would you say is the biggest takeaway from the WannaCry incident?

BS: The first thing I would say to firms – and it sounds simple but it’s not always a given – is don’t pay the ransom! You’ll never get your files back. That’s where the second part comes in, and that’s always have backups. Backups are the only fool-proof method for recovering your data, and it’s critical that firms use robust and secure backup and recovery tools to safely store their files and protect them against these types of incidents.

2. What’s the technology you’re most excited about right now that’s helping firms guard against cyber threats?

BS: Next-generation firewalls are really interesting and effective. We work with Palo Alto to deliver these to our clients, and when we lay out the facts, it becomes pretty evident how beneficial they are. Older, port-based firewalls can’t necessarily detect that traffic is doing, but next-gen firewalls have the ability to analyze unknown traffic and simultaneously develop protections to safeguards networks. Firms also have greater visibility and control in managing applications and content to uniquely implement security protections for their infrastructure.

Categorized under: Security  Operational Due Diligence  Outsourcing 



What Makes Hybrid Clouds Appealing?

By Mary Beth Hamilton,
Tuesday, October 10th, 2017

There has been discussion for years about whether public or private cloud platforms were more suitable to financial and investment management firms. And that debate continues, but with the addition of a new player – the hybrid cloud.

While the public cloud receives praise for its flexibility and potential cost savings and the private cloud for its robust security and reliable performance, the hybrid iteration essentially marries these features to create a compelling package for firms who don’t fit naturally into the previous two categories.

As its applicability continues to surge, it is worth understanding the concepts and benefits behind the hybrid cloud. Let’s take a look at what makes hybrid environments appealing to some organizations:

  • Agility & Flexibility: A hybrid cloud model allows a company to combine public cloud assets with those in a private cloud to increase agility and availability. For example, combine Microsoft Exchange and file services via the public cloud with robust security layers and 24x7x365 managed support via the private cloud, and suddenly you’re benefiting from the best of both worlds (hint: we’re talking about the Eze Hybrid Cloud).

Categorized under: Cloud Computing  Security  Outsourcing  Launching A Hedge Fund  Private Equity  Disaster Recovery  Infrastructure  Trends We're Seeing 



ODD Red Flags for Investors: Transparency, Service Providers, Valuation and More

By Kaleigh Alessandro,
Thursday, October 5th, 2017

During a recent webinar on operational due diligence, we explored the changing ODD environment for emerging managers, and our guest speaker, Frank Napolitani of EisnerAmper, helped shed light on some critical missteps that could cause ODD teams to veto an investment.

>> Click here to listen to our full conversation with Frank and hear more about operational due diligence trends

At the highest level, investor due diligence experts see the following as the most egregious red flags:

  • Dishonesty: Demonstrated in the form of failing to disclose or withholding information. This shows a lack of integrity.

  • Belligerence: When managers exhibit an ‘I’m never wrong’ attitude and are unwilling to listen to objective advice.

  • Incompetence: When a firm or manager’s skillset doesn’t align with the expertise required for a particular function.

More specifically, there are a number of red flags that can give investors pause and lead to either increased due diligence or an outright rejection. From a recent Deutsche Bank survey, keep reading for a few reasons:

Categorized under: Operational Due Diligence  Cloud Computing  Security  Outsourcing  Launching A Hedge Fund  Private Equity  Disaster Recovery  Hedge Fund Operations  Infrastructure  Business Continuity Planning  Trends We're Seeing 



Cybersecurity Awareness Month: 'Best of Cyber' Articles to Keep Your Firm Secure

By Amanda Daly,
Tuesday, October 3rd, 2017

October is Cybersecurity Awareness Month, and since we've written A LOT about security over the last few years, we thought it would be helpful to share some of our favorite articles. Here are some of Eze’s latest and greatest cybersecurity articles - happy reading! 

  • 20 Cybersecurity Dos and Don'ts Your Employees Should Follow

  • What’s the Difference Between Next-Generation Firewalls and Traditional Firewalls?

  • Six Myths about Hedge Fund Cybersecurity

  • Is “Smart” Technology Invading Your Privacy?

  • Top 10 IT Security Audit Gaps and How to Avoid Them

  • An Achievable Calendar for Cyber Security Plan Implementation

  • Will Outsourcing Shield You from Cyber Threats?

  • Here Are Investment Managers' Biggest Cyber Security Fears

Categorized under: Security  Cloud Computing  Operational Due Diligence  Outsourcing  Hedge Fund Operations  Infrastructure  Communications  Trends We're Seeing 



Preparing For a Hurricane: Business Continuity Planning

By Kulvinder Gill,
Thursday, September 28th, 2017

Natural disasters often strike with little to no warning, but their operational and economic impact to an organisation can be devastating. On average, we see 12 tropical storms, but this year, we’ve seen 13 (so far!). These natural disasters highlight the importance of business continuity planning and a reminder for firms to leverage the calm before the storm to ensure that business continuity plans address key impacts of a disaster event to help ensure they can continue with operations.

Following are some key business continuity preparation questions you should consider:

Categorized under: Business Continuity Planning  Disaster Recovery 



7 Common Cloud Mistakes and How to Avoid Them

By Mary Beth Hamilton,
Tuesday, September 26th, 2017

We all make mistakes, but when it comes to technology and investment operations, mistakes aren’t an option. So let’s look at seven common cloud mistakes we see financial and investment management firms make and talk about how to avoid them.

Mistake #1: Not Sizing Bandwidth to Business Needs

Determining the right amount of bandwidth comes down to the types of services being delivered and user expectations. Nothing ruins a cloud or really any computing experience like sluggish application and Internet performance. 

Beyond bandwidth, firms must also consider latency. While latency issues don’t impact all applications (i.e. email is relatively insensitive) for others it is a killer. Latency has little place in trading applications or voice over IP services. When moving to the cloud, have a realistic conversation with the hedge fund cloud provider about the amount of bandwidth your firm really needs. 

Mistake #2: Not Planning for Applications

Not all cloud platforms are equal especially when it comes to supporting hedge fund specific applications such as Order Management Systems or Portfolio Accounting Systems. While a hedge fund may not launch day one with one of these applications, there is a good chance they will require one in the future. To help mitigate future growing pains a hedge fund should plan for the future when evaluating cloud providers. Being shortsighted can result in future disruptions and integration pains.

Categorized under: Cloud Computing  Launching A Hedge Fund  Hedge Fund Operations  Infrastructure  Trends We're Seeing 



Service Provider Risk: Understanding Scope & Calculating Exposures

By Kaleigh Alessandro,
Thursday, September 21st, 2017

Risks are everywhere, particularly in today’s cyber-focused environment. But the risk a financial firm undertakes when outsourcing a function of its business to a service provider is enormous. Not only is the firm relinquishing control to an outside vendor, it also takes on the added burden of managing that company, in addition to its own.

I recently interviewed Eze Castle Cybersecurity and Data Privacy Analyst, Matt Donahue, and we spoke about how hedge funds, private equity firms and other alternatives can roll out and improve third party risk management programs.

Within an organization, where does the accountability for risk live and how do third parties fit into that structure?

Typically, when firms think about where responsibility and accountability live within their organization they mention compliance or information technology – when, in reality, there should be a sense of responsibility at almost every level. As we’ve noted before when talking about establishing a culture of security, tone should be set from the top down – and in this case, risk management responsibility starts at the top also.

If you’re making decisions with only a single lens on technology or cybersecurity or any one area – you’re missing the big picture. Senior execs bring a high-level view point that will help the risk management program align throughout the entire organization.

Categorized under: Outsourcing  Security  Operational Due Diligence  Private Equity  Hedge Fund Operations  Trends We're Seeing 



Emerging Manager Trends in Operational Due Diligence (Webinar Replay)

By Amanda Daly,
Tuesday, September 19th, 2017

Today’s emerging managers face a number of challenges: fierce competition and demanding investor expectations tops among them. With operational due diligence processes evolving rapidly, how can emerging managers differentiate themselves and make an impression on suspecting investors?

During a recent webinar, speakers from Eze Castle Integration and EisnerAmper discussed the current environment for emerging managers and examined the following topics:

  • Key Qualities Investors Look For

  • Red Flags for Emerging Manager Investors 

  • Investors IT Expectations

  • Why Firms Look to Outsource

Categorized under: Operational Due Diligence  Security  Outsourcing  Hedge Fund Operations  Project Management  Videos And Infographics 



Recent Posts / All Posts / Next Page