Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysical

IT Reliability and Security in Investment Firms

Managed Service Providers (MSPs) serve the need; here's what to expect from them

By Matthew Hilsenrad
data center
May 22, 2019

Investment firms are among the most security-conscious businesses, for good reason. Their clients depend on them to be up and running constantly and to keep their investments and privacy safe. But disasters lurk in both physical (storms, power outages, hardware crashes) and cyber (viruses, malware attacks) realms. And in investment management, a day – or even an hour – of downtime is a disaster.

Technology and security play critical roles. Investment firms need fast, efficient and stable IT systems for research, trading, regulatory compliance and reporting results to their customers. And they have a paramount need to keep their proprietary data and customer accounts protected at all times. 

Meeting these needs can be costly – custom-built, on-site IT infrastructure and security applications are expensive. Likewise, asset managers want to focus their core competency – seeking Alpha. Thus, many firms turn to managed service providers (MSPs) with cloud-based solutions for their primary IT needs. 

A reliable MSP does the heavy lifting for its clients when it comes to technology and security. An effective provider will have built an adaptive infrastructure using enterprise class technology to provide a highly reliable and scalable computing environment. Leveraging industry best practices for hosting services, the MSP delivers secure and robust access to mission critical applications such as email, file sharing, mobile device management and platforms for industry specific applications.

At the core of the MSP’s operations will be a network of data centers that are highly secure, continuously available, scalable and manageable. MSP data centers should be certified to the highest industry standards and compliance requirements and be connected to the Internet using multiple Internet Service Providers (ISPs). Security should be implemented through multiple network layers. Starting with Internet access firewalls, access controls must be implemented to restrict inbound and outbound traffic.

As a best practice, an MSP’s hosted platform should:

  • Be architected to allow for the failure of individual components without impacting the client or any of its users in their use of the IT functions.
  • Have all hardware components in each data center configured for high availability.
  • Have redundancies in the primary data center, all client data is replicated to a secondary data center.
  • Be equipped to rapidly restore service and data in a secondary data center in the event of a disaster that affects the primary data center. 

Investment managers and investors in general want peace of mind when it comes to the security of their data. A “3-2-1 methodology” for data protection provides that. In essence, 3-2-1 is three copies of data, stored on two different storage types, with at least one copy of data stored offsite. This can be accomplished by replicating data between geographically dispersed data centers and backing up vital data using different resiliency vendors and storage solutions. 

At the heart of an MSP will be a 24/7 NOC that monitors internal and hosted services – among other things: preventively maintaining, checking disk sizes and circuit connectivity. Safeguarding files using these methods limits risk. The helpdesk must always be prepared should a disaster scenario occur, be it cyber attack, human error, or works of nature.

To be fully prepared for a worst-case disaster scenario, an MSP must test its primary and backup systems, using multiple approaches:

  • Perform regular client data backups and restorations to ensure data is on secondary or tertiary storage.
  • Run platform level penetration tests multiple times per year, contracting with different vendors to identify and remediate against any possible risk.
  • Perform regular “failovers,” with hundreds of servers and the interaction of multiple clients. This includes third-party vendor coordination and participation. 
  • For hosted voice and networking, perform testing within its data centers, validating that both sides of a redundant pair can handle the full load should the primary go offline.

An MSP should also assist with client disaster recovery documentation and business continuity planning. Each test it performs should be followed up with a report, noting scope, timing and key takeaways. In addition to reports, important security and compliance focused documentation should be provided to clients in a transparent manner.

In today’s remote work environment, an MSP also needs to provide solutions for investment firm employees who work outside the office. Leveraging the cloud, an MSP can provide options to connect and access all systems remotely and securely. Should a client’s local office become unavailable, they can resume working from virtually any location with a stable internet connection.

Finally, an MSP must test, re-test and perfect its core systems. For each exercise, it should analyze the process, looking to automate or remove steps in an effort to improve overall speed and efficiency. The MSP is mission control of the firms in its orbit – failure is not an option. 

KEYWORDS: cybersecurity data center security malware privacy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matthew hilsenrad headshot
Matthew Hilsenrad is the Director of Disaster Recovery at Abacus Group.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Most US Firms Have Cybersecurity Insurance — But Only 1 in 3 Say it is Full Coverage

    See More
  • railroad

    Transportation Department announces $291 million in grants to improve the reliability and safety of US rail network

    See More
  • Poll: US Firms Security Concerns Grow in Mexico

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Layer Security in Wireless Communications

See More Products

Events

View AllSubmit An Event
  • IT Security Entrepreneurs Forum (ITSEF)

View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing