Blocking and tackling. Keeping the lights on. Non-revenue driving activity. The work that only gets attention when it goes down. This is the type of work we’re known for, and it’s the type of work you should look to outsource.
In today’s environment of ever-evolving security threats, Agio employs advanced protection at every level, from compliance-managed password vaults and secure network connections to the careful selection of technology tools. Our proactive approach to our internal governance ensures consistent and excellent service delivery across all Agio services.
Agio services are backed by documented liability and confidentiality warranties in our MSA.
We’re fully compliant with SOC 1 Type 2 and SOC 2 Type 1 to enhance our security processes with client-specific user controls and change management.
Every Agio employee receives regular security training and certifies they understand and fully comply with our formal written information security policy (WISP).
We conduct annual due diligence to evaluate our partners and vendors, ensuring they have the same level of security and compliance procedures in place that Agio requires.
Up-and-Running in 30 Days
A newly formed fund founded by former investment banking professionals and utilizing a research driven strategy, required a cost effective, enterprise level infrastructure. The fund turned to Agio to provide recommendations for and implementation of a right-sized solution. By leveraging the Agio SkySuite framework, we were able to provide messaging, compliance, remote monitoring and management, and business continuity services, as well as the physical infrastructure, all for roughly half the average salary for a mid-level engineer.
2x Their Coverage – Same Price
A growing firm, specializing in providing a platform for quantitative and analytical support, outgrew their existing support provider. As the firm reached an inflection point in their growth, they felt constrained by a lack of proactive outreach and creative problem solving in their existing relationship. Agio proposed an implementation focused on streamlining the firm’s processes and expanding both coverage and scope of support. By partnering with Agio, this firm was able to immediately reduce their costs associated with their hosted infrastructure environment, and then reinvest the savings into custom application development. The streamlined design increased system capability, and relieved the firm’s staff of many maintenance related tasks. The firm was able to refocus their valuable resources to developing future improvements to the firm’s platform.
By partnering with Agio, this firm was able to reduce the foot print of their hosted environment and increase end user satisfaction.
80 Hedge Funds Supported Daily
The Global Investment Bank’s Prime Brokerage Division (PB) contracted Agio to provide infrastructure and application support to their hedge fund clients based in the U.S. and EMEA. In July 2010, Agio took over the services and is currently providing support to PB's 80 hedge fund "tenant" clients, as well as over 600 of their hedge fund prime brokerage clients. Agio was required to meet the rigorous and demanding set of service level agreements and governance provisions of a global bank. After over a year of service, Agio has successfully met and/or exceeded every measurement and provision agreed between the two firms.
$8B Fund Improves Support with 22% Cost Savings
Agio joined forces with Point72, formerly SAC Capital Advisors, to collect intelligence that would effectively create a high-end technology infrastructure and application management services fulfilling their high expectations of service and solutions. From the beginning, Agio took over service desk management, managed and monitored IT infrastructure, managed databases and provided detailed governance services. Point72 also took advantage of Agio’s Application Services including QA resources, Application Support, Configuration Management, Application Development and Trade Floor Support.
Agio provides managed IT and cybersecurity services to firms at every stage, including technology hosting, monitoring, management, disaster prevention and recovery, managed security, cybersecurity consulting, and other high-end services.
Agio Incident Response is a planned program designed for the unplanned. Over the course of 12 months we onboard, organize, prep and continually test your ability to respond when a breach happens. We get, and keep you, battle-ready so when an attack happens, we mobilize immediately and effectively, neutralizing the threat and containing your exposure.
Here’s what the program includes:
o Environment Discovery
o Data Mapping
o Incident Response Plan Development & Review
- Incident Response Policy
- Data Classification Policy
- Incident Response Procedure
- Incident Response Communication-Chain of Command Procedure
o Tactical/Operational Incident Response Tabletop Exercise
Monthly Incident Response Readiness Review
Quarterly Status Review (monthly for first three months after going live)
o Intelligence Briefings
o Cybersecurity Events & Incidents Statistics Review
Annual Executive IR Tabletop Exercise
Incident Response Annual Review & Report
Red Team Security Assessment* (annually, if applicable)
It’s about practicing chaos. You’ll never be able to predict the specific type of breach your firm will ultimately fall victim to, but you can predict how you respond. And that response is comprised of the people you have in place, the processes you’ve implemented, and the technology that supports it all. How do these three facets interact with one another when tragedy strikes? Where are the loopholes, the gaps, and the ambiguity within your plan?
These are the details, when left undiscovered, unremediated and unrehearsed, create chaos on top of chaos for organizations.
We’re here to fix that. By proactively learning your environment, mapping what data lives where, reviewing your policies with a critical eye, and then practicing chaos, we improve your reaction to a breach. Your response goes from languid, haphazard and insufficient to immediate, efficient, and most importantly, effective.
It’s tempting to sit back and hope that a breach won’t happen. Or maybe when it does, that it’s not that bad. But when your company’s operations, reputation, and even your career are on the line, hope isn’t a strategy. Because even if the initial breach doesn’t bring down your environment, the longer the malicious activity goes undetected and unaddressed, the worse it gets. What may have started as a cybersecurity event, can quickly escalate to an incident and a full-blown breach.
TIME IS MONEY
Then there’s the financials. Bringing in an Incident Response team only after a breach guarantees one thing; you’re going to pay. Why? Because the firm you bring in, even if they’re the best, doesn’t know your environment. They don’t know where your data lives; they don’t know how you collect and store that data (for analysis); they don’t know your policies; and they don’t know who’s involved in your Incident Response Plan. They’re flying blind, and it’s going to take them time to get up to speed. That’s time you’re paying for, and even more importantly, that’s time in which the breach is getting worse.
By investing in an Incident Response service, proactively, you drastically reduce your time to resolution, which means less money out the door, less exposure and ultimately less damage. And you look good for preparing for the inevitable. You took chaos, mapped it, prepared for it, and even amortized it (i.e the cost). Well played.