The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Blogs

GAM Implements Indus Valley Partners Solutions to Create Digital-First Data Management Model

GAM, an independent asset manager managing over $136 billion in assets for institutions, financial intermediaries and private investors, has implemented Indus Valley Partners (IVP) solutions to simplify its data architecture through automation and set up a digital-first data management model designed to give the firm enhanced operational flexibility coupled to greater control.

The firm selected IVP as part of a strategic data architecture implementation programme that would deliver a data-centric IT ecosystem ensuring scalability and robust flexibility to support the firm’s core capabilities. The implementation enabled GAM to integrate a variety of key business systems with mastered data hubs and made it self-sufficient for any future maintenance or enhancements.

Carolyn Baker, head of data management and governance at GAM, explains: “IVP was selected as a cutting-edge solution to revolutionise the way in which data is enriched and controlled at GAM. The reconciliation solutions were implemented very quickly and have proven to deliver operational efficiencies and improved user experience. The delivery of the Security & Reference Master solution has enabled GAM’s first centralised data platform from where all data will be interfaced to downstream systems. Operational efficiencies will be realised as data is sourced and scrubbed in a single platform, creating a true security and reference master.”

GAM has implemented three IVP solutions: IVP Recon, a data reconciliation tool that is providing operational efficiencies and cost savings; IVP Entity Master, which has enabled the centralisation of funds, mandates, share classes and umbrellas, and enhanced data quality controls and workflows to improve overall data governance; and IVP Security & Reference Master, which is providing instruments and party master functionality, enriched data to the portfolio management system, and improved data quality controls on instruments and party data through a federated business governance mode, while continuing to leverage multiple outsourcing providers.

Related content

WEBINAR

Recorded Webinar: Entity identification and client lifecycle management – How financial institutions can drive $4 billion in cost savings

A new model in Legal Entity Identifier (LEI) issuance has created significant opportunities for financial institutions to capitalise on their KYC and AML due diligence. By becoming Validation Agents and obtaining LEIs on behalf of their clients, financial institutions can enhance their client onboarding experience, streamline their internal operations, and open the door to new,...

BLOG

How to Use Chatbots and Collaboration Tools to Improve Automation and Deliver On-Demand Data

Digital transformation in the financial services sector is forcing a rethink in how financial institutions access the data they need to support trading and investment activities. While traditional bulk data distribution arrangements are well suited to large sell-side institutions, they can be costly and lack flexibility for firms from large Tier 2 sell-sides down to the...

EVENT

Data Management Summit London

The Data Management Summit Virtual explores how financial institutions are shifting from defensive to offensive data management strategies, to improve operational efficiency and revenue enhancing opportunities. We’ll be putting the business lens on data and deep diving into the data management capabilities needed to deliver on business outcomes.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...