About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

Thomson Reuters Extends Entity Risk Solution with Countries of Risks Data

Subscribe to our newsletter

Thomson Reuters has extended its Entity Risk data solution with a Countries of Risks strand that uses an algorithm developed by StarMine, the company’s entity and fundamentals data, and GDP data from the International Monetary Fund to measure the exposure of a firm to multiple countries.

The data service is available immediately as part of Entity Risk, which is delivered through Thomson Reuters’ Datascope delivery platform, and is expected to find favour among buy-side firms, hedge fund administrators and global custodians seeking to better identify and manage portfolio risk and regulatory reporting.

StarMine, a quant trading specialist that was acquired by Thomson Reuters in 2008, has used its experience in developing predictive models for investing to create the Countries of Risks model that incorporates fundamental and economic data on issuers.

Tim Lind, global head of middle office at Thomson Reuters, explains: “When we look at risk and reporting, we see four buckets of exposure – market counterparty or issuer, asset class, industry sector, and country or market. Countries of Risks completes the spectrum of measuring and reporting risk.”

Lind notes that Countries of Risks is a logical addition to entity records and says that while issuer domicile is already described, the solution’s additional data qualifies economic issues such as where the issuer generates revenue, where headquarters is based and the base currency of disclosures. He says: “The buy side usually looks for a single answer to the question of country of risk, but this will change and become more granular. For example, the StarMine algorithm can calculate an issuer’s percentage of exposure to different countries.”

Going forward, Thomson Reuters intends to enhance the Countries of Risks solution with further data that links issuers to countries. Lind suggests supply chain information could be included, detailing not only where an issuer sells products, but also where it sources components for its products, although he warns that data availability could be a challenge.

Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: Unpacking Stablecoin Challenges for Financial Institutions

The stablecoin market is experiencing unprecedented growth, driven by emerging regulatory clarity, technological maturity, and rising global demand for a faster, more secure financial infrastructure. But with opportunity comes complexity, and a host of challenges that financial institutions need to address before they can unlock the promise of a more streamlined financial transaction ecosystem. These...

BLOG

Bigger is Better, Says Gresham CEO After Acquisition of S&P Global’s EDM Business

Gresham has finalised its acquisition of S&P Global’s EDM business as the data automation company expands to meet the growing and increasingly complex data needs of modern financial institutions. EDM, which supports more than US$12 trillion in assets, will sit alongside Gresham’s existing enterprise data management business, which was created with its merger with Alveo...

EVENT

ExchangeTech Summit London

A-Team Group, organisers of the TradingTech Summits, are pleased to announce the inaugural ExchangeTech Summit London on May 14th 2026. This dedicated forum brings together operators of exchanges, alternative execution venues and digital asset platforms with the ecosystem of vendors driving the future of matching engines, surveillance and market access.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...