Data management platform supplier Soliton Inc. has introduced a credit data management module for its TimeSquare system that combines credit risk ratings and issuer data with legal entity and counterparty data from CounterpartyLink (CPL). The new TimeSquare module rationalizes, stores and aggregates CounterpartyLink’s legal entity and counterparty data. The CPL data is then linked credit and issuer data, to form a standardized hierarchical relationship. This integration can be used by financial institutions to improve the management of limits by issuers and standardize their approach to compliance and credit risk.
A-Team Insight Blogs
Soliton Uses CPL Data to Add Credit Module to TimeSquare
Recorded Webinar: Adverse media screening – how to cut exposure to criminal activity, from money laundering to human trafficking
Screening for adverse media coverage of counterparties presents an incredible opportunity for financial institutions to limit risk exposures and identify bad actors early. It is required by regulations such as the EU’s sixth Anti-Money Laundering Directive (AML 6), and is one of the most effective ways to steer clear of potential connections with sanctioned activity...
Getting customer data right has been a problem for financial institutions for many years, but it is beginning to ease as regulation drives data aggregation underpinned by data governance, data standards emerge, and technologies replace manual processes. Getting management buy-in to improve customer data has also moved on and become more persuasive as conversations about...
DMS London brings together the European data management community to explore the latest challenges, opportunities and data innovations facing sell side and buy side financial institutions.
Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...