Exchange Data International (EDI) and CounterpartyLink (CPL) have joined forces to provide an integrated data service providing EDI’s corporate actions and reference data linked to and supplemented by legal entity data from CounterpartyLink. The new service is designed to help financial institutions comply with anti-money laundering (AML) and know your customer (KYC) regulations, and puts the two companies in competition with Crosswalk, a joint service developed by Telekurs, Standard & Poor’s and Dun & Bradstreet, and with Interactive Data Corp. and Avox, which have just announced their joint Business Entity Data Service as a module of FT Interactive Data’s FTS service.
A-Team Insight Blogs
Exchange Data and CounterpartyLink Join Forces with New Service
The buy-side faced a barrage of regulation in 2020 and is now under pressure to make post-Brexit adjustments and complete LIBOR transition by the end of 2021. To ensure compliance and ease the burden of in-house data management, many firms turned to outsourcing and managed services. But there is more to come, as buy-side firms...
ComplyAdvantage, a financial crime compliance specialist, has received new investment from Goldman Sachs Growth Equity. The investment will be used to build on the company’s rapid growth and cement its position as a critical part of the value chain for companies managing evolving risks around anti-money laundering (AML) and know your customer (KYC) processes, as...
The RegTech Summit Virtual is a global online event that brings together an exceptional guest speaker line up of RegTech practitioners, regulators, start-ups and solution providers to collaborate and discuss innovative and effective approaches for building a better regulatory environment.
Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...