Backstop Solutions

Learn more about Backstop Solutions Group

Recent Posts

Expert insights, in the heart of Silicon Valley

When LPs are selecting managers, or considering further investments, what are they really thinking? Traditionally, it’s been a private – some might even say mysterious – process. At our upcoming West Coast Connect event, we’re bringing it out into the open, and maybe even revealing some well-kept secrets.

Continue reading

An Exceptional Evening Awaits The 2018 BUC Attendees.

Along with an agenda packed with insightful panels and informative speakers, those attending this year’s Backstop User Conference can also look forward to an amazing evening at the famed Chicago Art Institute.

Continue reading

Your Contacts, Your Way: Configuring How You Create Data

Backstop is the most flexible, agile productivity suite available to the alternative investment industry today.  Empowering users across multiple verticals to get more done in less time is of crucial importance to us, but more importantly, we speak their language. Things like field and entity names, or report titles, may be unique to a particular firm, and this is where Backstop comes to shine.

Continue reading

Four New Innovations Coming Your Way

Let's face it - when you're the "Project Sponsor," the "Power User," or the "Local Admin" for software your organization uses, you magically become the single source for any help required, and all changes and configurations that need to be made in that software. You can expect to be called upon for everything from changing a username or resetting a password to creating a client-configured layout of fields specific to your organization. That means you spend precious minutes working on administrative tasks, instead of doing the jobs actually associated with your title.

Continue reading

Our Response to Meltdown and Spectre

No doubt you’ve heard about two recent cybersecurity issues, referred to as Meltdown and Spectre. Both allow “low-privilege” users to access sensitive data, and could potentially enable hackers to access account data, passwords, and other information. The vulnerabilities affect laptops, desktops, cloud-based computers, and even some smartphones, tablets, and other internet-connected devices.

Continue reading

No More Posts