About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

Nasdaq Unveils AI-Powered Feature to Enhance Market Surveillance

Subscribe to our newsletter

Nasdaq has integrated a new AI-powered feature within its Market Surveillance technology, aimed at significantly enhancing the quality, speed, and efficiency of market abuse investigations. The solution utilises generative AI (GenAI) to streamline the investigative procedures around suspected market manipulation and insider trading, enabling more effective monitoring and detection of potential market abuse.

With proof-of-concept testing showing a 33% reduction in investigation time, Nasdaq now plans to implement the functionality across its U.S. equity market surveillance.

“Market abuse is a substantial global challenge and one that demands increasingly sophisticated solutions to address it,” commented Ed Probst, Senior Vice President and Head of Regulatory Technology at Nasdaq. “As a major regulatory technology provider to the world’s financial system, with a deep culture of innovation, Nasdaq is uniquely placed to leverage the power of technology to further enhance the tools and capabilities necessary to uphold the integrity of marketplaces globally.”

Regulators worldwide mandate financial institutions to demonstrate the continuous effectiveness of their surveillance systems and controls. Firms are expected to maintain comprehensive coverage across all asset classes and jurisdictions with scalable systems that handle periods of high volume and volatility effectively.

Typically, when conducting initial reviews of automated alerts, analysts need to manually gather extensive evidence before deciding whether further investigation is warranted. This process is resource-intensive, especially for alerts requiring deeper investigation. Nasdaq’s enhanced functionality, built on Amazon Bedrock, an AWS service for secure GenAI applications, enables analysts to swiftly perform detailed initial assessments of alerts by distilling, analysing, and interpreting relevant information.

“By drawing on the latest innovation in cloud technology and artificial intelligence, we can better respond to new threats and offer the global financial system advanced tools to more effectively tackle market abuse,” said Tony Sio, Head of Regulatory Strategy and Innovation at Nasdaq.

Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: Best Practices for Managing Trade Surveillance

The surge in trading volumes combined with the emergence of new digital financial assets and geopolitical events have added layers of complexity to market activities. Traditional surveillance methods often struggle to keep pace with these changes, leading to difficulties in detecting sophisticated market abuses and increased regulatory risk. To address these challenges, financial institutions are...

BLOG

What an Actimize Sale Might Mean for Surveillance and FinCrime Technology

When news emerged that NICE is preparing to sell its Actimize division – long regarded as one of the most established full-stack platforms for financial crime, fraud, and surveillance – the immediate headlines focused on valuation. With reports suggesting a price in the range of US$1.5–2 billion, the deal would be one of the RegTech...

EVENT

Buy AND Build: The Future of Capital Markets Technology

Buy AND Build: The Future of Capital Markets Technology London examines the latest changes and innovations in trading technology and explores how technology is being deployed to create an edge in sell side and buy side capital markets financial institutions.

GUIDE

Applications of Reference Data to the Middle Office

Increasing volumes and the complexity of reference data in the post-crisis environment have left the middle office struggling to meet the requirements of the current market order. Middle office functions must therefore be robust enough to be able to deal with the spectre of globalisation, an increase in the use of esoteric security types and...