IEF iShares 7-10 Year Treasury Bond ETF
What is IEF?
IEF tracks a market-value-weighted index of debt issued by the US Treasury with 7-10 years to maturity remaining. Treasury STRIPS are excluded.
IEF Factset Analytics Insight
IEF is a longer maturity, longer duration play on the US Intermediate Treasury segment. The fund focuses on Treasury notes expiring 7-10 years from now, which have significantly higher yield and interest rate sensitivity than the notes that make up our broader 1-10 year benchmark. IEF’s average YTM is significantly higher than our benchmark's. Of course, the higher yield comes with significantly higher sensitivity to changes in rates, particularly those at the longer end of the yield curve (10-year key rate duration). The fund changed its index from the Barclays US Treasury Bond 7-10 Year Term Index to the ICE US Treasury 7-10 Year Bond Index on March 31, 2016. This change created no significant change in exposure. IEF's narrow focus and concentrated portfolio have been popular, so the fund is stable and easy to trade.
IEF Summary Data
IEF Portfolio Data
IEF Index Data
IEF Portfolio Management
IEF Tax Exposures
IEF Fund Structure
Factset Analytics Block Liquidity
This measurement shows how easy it is to trade a $1 million USD block of IEF. IEF is rated a 5 out of 5.
IEF Sector/Industry Breakdown
IEF Top 10 Holdings
IEF Performance Statistics
IEF Top 5 Countries
IEF Top 5 Currencies
IEF Avg Life Maturity Distribution
IEF OAS Breakdown
IEF Holdings Statistics
Options Strategies for Outcome Investing
Options allow you to customize investment outcomes. Using the strategy builders provided by Cboe Vest Technologies, you can construct some of the most common option strategies. Check out our user guide for more information on how to use the tool.
A collar strategy is a protective option strategy constructed by writing a call and buying a put with the same expiration date while being long the underlying security.
A covered call is an income strategy constructed by writing a call option against a holding of the underlying security.