The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Blogs

Baer, Winterflood Pick ValueLink For Price Data Management

Julius Baer Investment Ltd. (JBIL), an investment management arm of the Swiss bank specializing in fixed-income securities, has selected ValueLink Information Services to provide daily pricing collection for its closing portfolio valuations. Meanwhile, Winterflood Securities has said it will use ValueLink’s Shares in Issue service, which provides data validation of third-party feeds.

At JBIL, ValueLink will supply a closing bond pricing file, created by combining and validating data from various third-party bond pricing data feeds. ValueLink performs all validation on this data, including checks on static quotes and price movements. Any price anomalies are investigated by ValueLink and then reported to JBIL, enabling the firm to maintain a consistent view of the universe of bonds it follows.

This daily bond file will be handled by the ValueLink data collection platform, along with two foreign exchange data feeds and two other specialized feeds from an undisclosed vendor already contracted to JBIL. Delivery of these feeds is automated by the ValueLink platform, which provides them alongside the validated bond pricing file.

The implementation, with ValueLink’s selection made after an extensive period of analysis, lasting several months, effectively outsources the data collection process for JBIL and allows it to streamline certain operational procedures that were both time-consuming and expensive to maintain.

Meanwhile, U.K. stockbroker Winterflood has similarly chosen ValueLink to provide validation of two third-party data feeds. Using ValueLink’s recently upgraded Shares In Issue Service, Winterflood will match instruments covered by the two feeds, cross-check anomalies and generate a detailed on-screen report that displays validation status for all securities.
As part of the deal, ValueLink will assign a dedicated client administrator to ensure all generated data queries are resolved efficiently. Winterflood has selected only those data fields it requires to be validated. Validation reports are provided by ValueLink via FTP connection as soon as vendor updates are received and validated.

Related content

WEBINAR

Recorded Webinar: Adverse media screening – how to cut exposure to criminal activity, from money laundering to human trafficking

Screening for adverse media coverage of counterparties presents an incredible opportunity for financial institutions to limit risk exposures and identify bad actors early. It is required by regulations such as the EU’s sixth Anti-Money Laundering Directive (AML 6), and is one of the most effective ways to steer clear of potential connections with sanctioned activity...

BLOG

HWM Group Acquires Koger Assets to Expand Fund Admin, Regulatory Offerings

HWM Group, a Dublin-based provider of investor services and regulatory solutions to alternative and retail fund administrators, has acquired the assets of Koger Inc., a global supplier of fund administration software. The acquisition strengthens HWM’s offerings in the fund administration and transfer agency technology space, allowing it to offer expanded fund administration and regulatory compliance...

EVENT

ESG Data & Tech Summit 2022

This summit will explore challenges around assembling and evaluating ESG data for reporting and the impact of regulatory measures and industry collaboration on transparency and standardisation efforts. Expert speakers will address how the evolving market infrastructure is developing and the role of new technologies and alternative data in improving insight and filling data gaps.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...