About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

Moody’s Analytics Introduces Sovereign Correlations to RiskFrontier 3.0

Subscribe to our newsletter

Moody’s Analytics, a leader in enterprise risk management solutions, today announced the release of RiskFrontier 3.0, the latest version of its credit portfolio management and economic capital calculation solution. This release features a new sovereign risk correlation model that enables financial institutions to better quantify and manage the sovereign risk exposure in their portfolios.

The new sovereign correlation module, an extension of  GCorr, Moody’s Analytics’ industry-leading, global multi-factor asset correlation model, helps credit portfolio managers assess their sovereign risk by quantifying the correlation between sovereigns, as well as the correlation between sovereigns and other asset classes. The sovereign risk model captures sovereign risk for 89 sovereigns and territories, which accounts for 99.5% of sovereign debt issuance.

“The new model incorporates factors that explain regional sovereign credit deterioration, commonly observed with contagion events,” said Dr. Amnon Levy, Managing Director of Portfolio Research.

RiskFrontier 3.0 also includes a new model for capturing the risks associated with defaulted assets.  The model allows users to quantify recovery values that take into account portfolio correlation. This release also introduces new ways to assess and manage the portfolio, including the ability to analyze any subset of a given portfolio. Using this feature, clients can now quickly and easily perform “what-if” analysis by filtering a portfolio based on any combination of user-defined variables.

For users measuring portfolio performance against a benchmark, RiskFrontier 3.0 also introduces the ability to perform “what-if” analysis to assess the impact of a portfolio strategy under the current economic environment as well as against economically stressed scenarios.

The new release also improves the utility of DealAnalyzer, RiskFrontier’s deal analysis tool, by allowing for the analysis of new deals against stressed portfolios, merged portfolios and relative risk portfolios.

Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: End-to-End Lineage for Financial Services: The Missing Link for Both Compliance and AI Readiness

The importance of complete robust end-to-end data lineage in financial services and capital markets cannot be overstated. Without the ability to trace and verify data across its lifecycle, many critical workflows – from trade reconciliation to risk management – cannot be executed effectively. At the top of the list is regulatory compliance. Regulators demand a...

BLOG

Financial Institutions ‘Layering’ New Risks as Report Highlights Greenwashing Exposure

The number of financial institutions flagged for greenwashing climbed substantially in the past year, highlighting both the vulnerability of individual firms and the need to integrate greenwashing risk management into decision-making processes.. The sector remained the worst offender for overstating their progress or making vague or misleading claims, the report by sustainability risk data company...

EVENT

TradingTech Summit London

Now in its 15th year the TradingTech Summit London brings together the European trading technology capital markets industry and examines the latest changes and innovations in trading technology and explores how technology is being deployed to create an edge in sell side and buy side capital markets financial institutions.

GUIDE

Applications of Reference Data to the Middle Office

Increasing volumes and the complexity of reference data in the post-crisis environment have left the middle office struggling to meet the requirements of the current market order. Middle office functions must therefore be robust enough to be able to deal with the spectre of globalisation, an increase in the use of esoteric security types and...