Eze Castle Integration expands cyber security consulting services

Source: Eze Castle Integration

Eze Castle Integration, Inc., a leading provider of strategic IT, cybersecurity and private cloud services to the investment industry, today announced the expansion of its cybersecurity consulting services.

The company’s cybersecurity experts will now deliver comprehensive vulnerability assessments, penetration testing and third-party due diligence audits to all firms across the investment industry.

The general availability of these cyber consulting services comes on the heels of Eze Castle Integration being named the ‘Best Cyber-Security Provider’ in the Water Rankings 2016 Reader’s Choice Awards. Eze Vulnerability Assessments cover both internal and external network activities while Eze Penetration Testing Services work to test defenses and uncover potential weaknesses. For third-party due diligence audits, Eze Castle tailors analysis to the client-vendor relationships and goes deeper than the common one-size-fits-all checklist-type questions.

“Eze Castle Integration is recognized as the trusted technology advisor to the hedge fund and investment management industry. This role mandates we deliver a portfolio of cybersecurity services that combines cyber consulting best practices with technical services and safeguards,” said Mark Coriaty, SVP strategy and partnerships at Eze Castle Integration.

Eze Castle’s newest cyber risk services complement the company’s other cybersecurity solutions which include:

  • Conducting cybersecurity consulting and assessments for clients across the hedge fund and investment industry;
  • Building deep layers of security and intrusion prevention to services on the Eze Private Cloud platform;
  • Providing Eze Active Threat Protection (Eze ATP), which combines 24x7 intrusion protection and prevention monitoring with security incident response and remediation;
  • Delivering Eze Managed Phishing & Online Training service which combines simulated phishing attacks with online training and reporting to increase security awareness and actively change employees’ cyber behaviors; and
  • Developing, maintaining and training employees on written information security plans and incident response policies.

Comments: (0)