The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Blogs

Fenergo Teams Up with Markit and kyc.com to Improve Client Lifecycle Management

Fenergo has formed a strategic relationship with Markit that will allow banks using its client lifecycle management software to automate consumption of Know Your Customer (KYC) and counterparty data from Markit and kyc.com, a joint venture between Markit and Genpact.

The automation is based on Data Integration Manager, an adjunct to Fenergo’s client lifecycle management software that was introduced late last year and combines data vendor application programming interfaces (APIs) with Fenergo intelligent rules logic and a workflow solution to consume, standardise and normalise client and counterparty data from multiple sources and route it to applications such as KYC.

Fenergo initially integrated DTCC’s Avox, Clarient and Omgeo Alert data services and has now implemented APIs to integrate kyc.com and Markit Counterparty Manager data with its regulatory onboarding and client lifecycle management software. It has also integrated Markit Enterprise Data Management to provide a wider entity data management solution.

Marc Murphy, CEO of Fenergo, explains: “Client lifecycle management is highly dependent on good quality, consistent and normalised client and counterparty data. However, most financial institutions are consuming this data manually. Through our relationship with Markit and kyc.com, we are automating this process using quality data and Fenergo’s workflow technology and regulatory rules engine to deliver an optimised client lifecycle management process that will help financial institutions significantly improve regulatory and onboarding efficiencies and reduce operational costs.”

With banks relying on multiple providers of specialised data for applications such as client onboarding, KYC, Anti-Money Laundering and screening, Joe Dunphy, vice president of product management at Fenergo, says the company is working to integrate data services from a number of other providers with its software.

Related content

WEBINAR

Recorded Webinar: Adverse media screening – how to cut exposure to criminal activity, from money laundering to human trafficking

Screening for adverse media coverage of counterparties presents an incredible opportunity for financial institutions to limit risk exposures and identify bad actors early. It is required by regulations such as the EU’s sixth Anti-Money Laundering Directive (AML 6), and is one of the most effective ways to steer clear of potential connections with sanctioned activity...

BLOG

The Great and the Good Gather for A-Team’s RegTech Virtual Event This Week

The global RegTech community gathers virtually this week for A-Team’s RegTech Summit Virtual, which kicks off on Wednesday. Over its two-day programme of must-attend sessions, the conference will offer an assessment of the global RegTech landscape, plus discussions ranging from the ongoing regulatory reporting challenge, the emerging conduct compliance requirement, addressing financial crime and other...

EVENT

TradingTech Summit London

TradingTech Summit London will explore how trading firms are innovating in today’s cloud and digital based environment to create flexible, scalable trading platforms to support speed to market and business agility. Leveraging the cloud, AI and ML technologies to get an edge, automate processes and simplify operations in a cost effective way is the name of the game and will share practical insight from practitioners and technology leaders who are innovating and driving forward change in trading operations.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...