As we look forward to 2014, we can expect that the hedge fund and investment management industry will continue to evolve and experience change as in years past. As more and more new funds launch, the competition for investors will increase and firms will be hard-pressed to live up to the successes of the top performing funds in the industry.
Earlier this week, we gathered several panels of experts in Boston to share their insights into the hedge fund landscape for startups in 2014 and the tips and advice for firms looking to compete in the changing marketplace. Following is a brief recap of the event.
Building a Hedge Fund is Like Building Any Successful Business
When starting a new firm, it’s critical to think about all aspects or forming a new business. Yes, your investment strategy is important, but if the foundation of your business is not critically thought out, it will wreak havoc for your firm. Following are a few areas you shouldn’t overlook as you go through the launch process.
Categorized under: Business Continuity Planning Cloud Computing Hedge Fund Due Diligence Hedge Fund Marketing Hedge Fund Operations Hedge Fund Regulation Infrastructure Launching A Hedge Fund Outsourcing Privacy Compliance Security Trends We're Seeing
Last month, former Secretary of Homeland Security Michael Chertoff said the most significant threat we face as a nation is cybersecurity. That’s a pretty jarring statement given the threats our country faces in terms of terrorism and war, for instance. But the reality is, cyber networks have become the gateway for risks both on the global terrorism front as well as within our internal circles at our places of business.
With watchful eyes geared towards security threats, interest in cybersecurity insurance continues to rise. The Department of Homeland Security and the Department of Commerce have identified cybersecurity insurance as a viable opportunity to thwart the effects of security breaches and attacks by:
- Promoting widespread adoption of preventative measures;
- Encouraging the implementation of best practices by basing premiums on an insured’s level of self-protection; and
- Limiting the losses that companies face following a cyber-attack.
First and foremost, Happy Halloween!
In honor of Halloween, I’m going to share a trick and a treat about the world of social media and investment firms.
First the trick.
Did you hear the story about how shares of bankrupt Tweeter soared when Twitter announced its IPO? If not, here goes. According to WallStreetInsanity, on October 4, 2013, “shares in bankrupt TWTR Inc. (OTC: TWTRQ) were up over 1500 percent as the company’s stock soared from $0.0 to $0.15 on extremely heavy volume. Seems some people thought the consumer electronics retailer was Twitter.”
This story demonstrates that traders are monitoring social media outlets for investment ideas even if they are not personally participating. It also shows that many of those folks buying TWTRQ didn’t quite understand how an IPO works or what Twitter will be valued at (certainly not pennies), but we’ll ignore that fact for the sake of this article.
On April 8, 2014 two Microsoft products – Windows XP and Office 2003 – will reach "end of support". End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance for these products.
What Does This Mean?
End of support is significant for a number of reasons. First, this means that Microsoft will no longer be a support option should complex issues arise surrounding the software.
Secondly, Microsoft will no longer provide security hotfixes or any patches for these systems. This means that any security vulnerabilities left in these systems will no longer be addressed by Microsoft and calls to their support will not be worked.
The longer workstations keep Windows XP and Office 2003 versions, the more vulnerable they become to virus/malware/rootkit infestations and risk potential data compromise.
Last week, Wednesday 16 October, the Eze Castle Integration team in London hosted a breakfast seminar on Cyber Protection: Building a Secure Investment Firm.
Cyber security is one of the greatest threats facing the hedge fund and alternative investment industry. The 2008 financial crisis brought a wave of new and sophisticated attacks, as well as a high rise in security incidents to the industry. With this changing landscape in mind, our panel of experts -- Simon Eyre, Director of Service at Eze Castle Integration; Lawrence Brown, Partner at Simmons & Simmons; and Sean Blenkhorn, Director, Solutions Engineering at eSentire -- got together to address this very topic.
The hedge fund and investment industry is especially vulnerable to threats since they present hackers with opportunities to profit from sizeable asset pools. Many fund managers assume hackers are focusing on higher profile targets such as retails banks, but the reality is that they are targeting unprepared investment firms of all sizes.
What can investment firms and their service providers do to protect themselves?
Fund managers, as well as their service providers, should regularly review the security threat landscape and their security safeguards. Adopting the following steps can help protect firms from cyber crimes:
Clarify roles and responsibilities - Identify key individuals responsible for maintaining the various aspects of your firm's security plan.
Categorized under: Security
Earlier this week, we announced the findings of our 2013 market survey: Examining Cloud Usage within the Investment Management Industry. If you haven’t already, check out our infographic here.
If you’re not up for reading the full report yet, here’s Part I of our Cloud Survey Recap. Be sure to come back next Tuesday for Part II!
As a follow up to our 2012 Cloud Adoption Trends Survey, we wanted to take a closer look at how and why hedge funds and investment firms are leveraging cloud services in today’s marketplace. Working again with IDG Research, we surveyed 101 investment firms across the U.S. about their current and planned cloud usage.
Firms covered a wide range of asset bases: 38 percent reported less than $100M; 20 percent fell between $100 and $499.99M; 19 percent between $500M and $999.99M; and 20 percent said they had more than $1B.
Do you want the inside scoop on how and why your investment firm peers are using the cloud? We're in the know.
Check out our infographic for a sneak peek at the results of our 2013 survey: Examining Cloud Usage within the Investment Management Industry. Next week, we'll share a more detailed recap of the findings. If, of course, you can't bear to wait until next week, you can download our full survey report here.
While it’s not the sexiest aspect of a hedge fund’s operations, a firm’s technology infrastructure is critical to its success. But a major consideration lies in choosing what type of infrastructure to use, and accordingly, where to host it.
Earlier today, we picked the brain of our Vice President of Client Technology, Steve Schoener, and asked him to share his expertise on the key drivers for firms migrating to the cloud. He also shared two examples of clients who’ve successfully transitioned to the cloud for various reasons. Below is a short recap of Steve’s presentation.
Would you rather watch the full replay? Scroll down or click here.
Network Operation Centers, commonly known as NOCs, are primarily used by large businesses, universities and the government in order to oversee complex networking environments. NOCs are often confused with data centers, which are significantly different. Click here for a refresher on data center tiers. A NOC is an operations base in a dedicated, secure location where a technical team is monitoring, managing and maintaining customers’ networks. Companies and organizations that require a high demand for security and monitoring will most likely have an internal NOC in place - or leverage that of an outsourced provider - in order to maximize efficiency.
You guessed it. It’s Security Week here on Hedge IT! Today, we’re diving into a topic that we’re passionate about – education and awareness.
We’ve told you about the types of threats that can harm a business, the steps you should take in the event of a security incident, and the policies you should create to keep your organization safe. But now it’s time to talk about training your employees to understand each of these.
A firm’s security strategy will only work if employees are properly trained on it. Therefore, the importance of providing information security awareness training cannot be understated. The goal of an awareness program is not merely to educate employees on potential security threats and what they can do to prevent them. A larger goal should be to change the culture of your organization to focus on the importance of security and get buy-in from end users to serve as an added layer of defense against security threats.
Once you have buy-in from employees, your focus can turn to ensuring they get the necessary information they need to secure your business.
- Expert Tips for Launching a Hedge Fund in a New Environment
- Answering the FCA's Dear CEO Letter on Outsourcing with Some Practical Steps
- Reflecting on What We're Thankful For This Thanksgiving
- Finding Your One-Stop Shop: The Benefits of Choosing an All-Inclusive IT Provider
- Three Ways Your Cloud Provider Can De-Stress Your Life
- business continuity planning
- cloud computing
- data loss prevention
- disaster recovery
- eze castle milestones
- hedge fund due diligence
- hedge fund marketing
- hedge fund operations
- hedge fund regulation
- help desk
- high frequency trading
- launching a hedge fund
- privacy compliance
- project management
- real estate
- startup & relocation
- trends we're seeing
- videos and infographics