Case Study: Elephant

See how Blissfully helped an emerging venture capital firm meet their office and IT security needs.

About Elephant

Elephant is a venture capital firm focused on disruptive software, internet and mobile companies. The firm was formed in 2015 and is currently investing out of its $150 million debut fund. With offices in Boston and New York City, Elephant needed a hands on IT partner to help with the office build outs and manage ongoing technology needs with a focus on security and financial compliance.

Blissfully helped us every step of the way with our office build outs with recommendations, setup, and ongoing support. And working with them on our IT security policies and implementation plan has given us confidence and comfort in our technology and security needs.
Pat CammarataChief Operating Officer

Main IT Needs

As a venture capital fund, IT security and compliance are absolutely critical. Furthermore, with constant travel and multiple office locations, being able to securely and productively work from any location was necessary, leading to a cloud-first IT architecture. Finally, without a dedicated in-house IT resource, being able to have an ongoing IT partner to monitor proactively security, networks, and policies would lead to increased peace of mind.

What we have done

Office Build out help

Blissfully worked directly with the construction contractors and electricians to make sure all IT wiring needs would meet the needs of the space. Upon construction completion, Blissfully set up all related technology including secure Wifi, wall mounted TVs with video conferencing and screen sharing, and smart phone based building security. On an ongoing basis Blissfully continually monitors networks.

IT Security implementation

Elephant is a cloud only organization with all core business software and processes served to employees wherever they are. As such, it’s critical to set up and maintain industry leading security processes. Blissfully and Elephant worked closely together to identify the core priorities, review recommendations, and implement strong security with a mutually outlined implementation plan. This included password policies, multi-factor authentication for critical applications, audit trails for future compliance and much more.