Hedge Fund Blogs From HedgeCo.Net


Category Archives: Hedge Fund Technology

A Whodunit for Fund Managers

Piecing together clues to solve a mystery has a certain appeal – especially when the dramatic reveal shows that we were right. The same process of piecing together clues and evidence can be used to help Increase your AUM. Rest assured, it doesn’t require stakeouts, wiretaps and a reluctant ex-partner in the police department. In fact, you could be finding […]

Exploring NYC Hedge Fund Hotels

Hedge Fund Hotel: No, you can’t spend the night… …But you can spend a year (or more or less).  A hedge fund hotel is a fully-managed business office suite that provides high-end space, usually in a premium location, complete with important necessities required to get up and running quickly and efficiently.  Hedge fund hotels typically provide premier technology, business solutions, […]

How to Create A Cyber Security Culture + Employee Security Awareness

Did you hear the story of the Central Bank of Bangladesh that lost $100 million to hackers? It happened in February 2016 and goes like this. The bank believes Chinese hackers executed a hack that allowed $100 million to be taken from the bank’s foreign exchange account at the Federal Reserve Bank of New York. This is just the latest […]

Top 5 Reasons Managers Need a Research Management Software (RMS)

In today’s competitive market, research management software (RMS) has become a must-have integrated feature for investment management firms. Significant benefits offered via RMS have caused a ripple effect of soaring adoption rates across the global investment industry. In this article we’ll examine how adopting a research management solution could benefit your firm. Central Repository With offices, colleagues and clients spread […]

SEC Cybersecurity Hit List: 6 Items a Hedge Fund Better Have Covered

Earlier this week we presented at a Wells Fargo Prime Services breakfast briefing on cybersecurity. During the discussion, one panelist reminded attendees that the SEC has clearly defined (and communicated) its cybersecurity expectations. He recapped the following six areas advisers must have covered to demonstrate preparedness to regulators. 1. Risk Assessments 2. Governance 3. Training 4. Access Control 5. Vendor […]

How to Sell the Cloud to Your Hedge Fund CFO

If you’re one of the seemingly few firms who has yet to make the move to private cloud computing, it could be for a variety of reasons. Perhaps you want to maintain total control of your IT environment. Or maybe you’re waiting for a tech refresh to motivate you. Alternatively, it could be that you just haven’t made the proper case […]

Four Smart Hedge Fund IT Resolutions for 2016

A new year is just around the corner so here is Eze Castle Integration’s list of the top 4 IT resolutions that will help keep your hedge fund safe and sound in 2016. If watching the two-minute video isn’t for you, here’s a recap of our four smart hedge fund IT resolutions. Resolution 1: Investigate the Cloud. Everything and everyone […]

10 Tech Holiday Travel Tips to Keep You and Your Data Safe

Traveling with electronic devices puts personal and critical business information at risk. As we embark on the busy holiday travel season, we decided to share some useful tips to help prevent your data and devices from falling into the wrong hands. Here are Eze Castle Integration’s top 10: Back up Your Data Before You Leave: Prior to traveling, back up […]

Don’t Overlook These 3 Hedge Fund Technology Priorities

The following article is part of Eze Castle Integration’s Hedge Fund Insiders Article Series, which featured articles on a range of important topics. Today we look at technology (one of our favorite topics!). Technology was historically an afterthought for many hedge funds and a “check-the-box” item at that. Many firms took the approach that they could get away with the bare minimum […]

SEC Charges IA with Cybersecurity Failures

September 23, 2015 Dear Friends, The SEC announced that an investment adviser agreed to settle charges that it failed to establish required cybersecurity policies and procedures, to ensure the security and confidentiality of personally identifiable information (PII). The firm stored PII of approximately 100,000 individuals on a third party hosted web server, which was hacked in 2013. Following the attack, […]