Backstop Solutions

Learn more about Backstop Solutions Group

Recent Posts

An Exceptional Evening Awaits The 2018 BUC Attendees.

Along with an agenda packed with insightful panels and informative speakers, those attending this year’s Backstop User Conference can also look forward to an amazing evening at the famed Chicago Art Institute.

Continue reading

Your Contacts, Your Way: Configuring How You Create Data

Backstop is the most flexible, agile productivity suite available to the alternative investment industry today.  Empowering users across multiple verticals to get more done in less time is of crucial importance to us, but more importantly, we speak their language. Things like field and entity names, or report titles, may be unique to a particular firm, and this is where Backstop comes to shine.

Continue reading

Four New Innovations Coming Your Way

Let's face it - when you're the "Project Sponsor," the "Power User," or the "Local Admin" for software your organization uses, you magically become the single source for any help required, and all changes and configurations that need to be made in that software. You can expect to be called upon for everything from changing a username or resetting a password to creating a client-configured layout of fields specific to your organization. That means you spend precious minutes working on administrative tasks, instead of doing the jobs actually associated with your title.

Continue reading

GDPR Is Coming: Backstop Responds to FAQs

You’ve likely heard a great deal about GDPR, or the General Data Protection Regulation. Developed over a period of years by the European Union (EU), this new set of regulations will likely substantially impact almost every facet of how companies handle the collection and processing of personal data.

Continue reading

Our Response to Meltdown and Spectre

No doubt you’ve heard about two recent cybersecurity issues, referred to as Meltdown and Spectre. Both allow “low-privilege” users to access sensitive data, and could potentially enable hackers to access account data, passwords, and other information. The vulnerabilities affect laptops, desktops, cloud-based computers, and even some smartphones, tablets, and other internet-connected devices.

Continue reading

No More Posts