Vendors
日本語

IVP Security & Reference Master

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)

Overview

IVP Security and Reference Master centralizes storage and management of mission-critical security and reference data. Its open architecture, flexible and transparent design, and dynamic instrument model make it easy for middle office and back office teams to generate a detailed, time-series-enabled golden copy that reduces operational risk. IVP Security and Reference Master also offers pre-built connectivity to major market data providers, so it can be operationalized quickly.

Key Features

  • Model any security or entity on the fly with a configurable data model
  • Connect to any upstream data provider or downstream system for accounting, order management, or reporting
  • Keep track of changes with audit trails and time series data management
  • Ensure high-quality data with workflow management, exception management, and data validation
  • Create, update, and store corporate actions data from any provider
  • Accelerate processing with real-time security or entity instantiation from preferred vendors
  • Master legal entities and counterparty relationships with a flexible, extensible data model

Key Benefits

  • Efficiency – Eliminate redundant steps, making trusted data available to all teams
  • Speed - Rapidly set up and onboard new asset classes, entities, and counterparties
  • Accuracy - Avoid manual processes that can lead to errors and inconsistencies
  • Awareness - Get notified before missing data or new securities affect downstream systems
  • Security - Use built-in, configurable permissions to control which users access which datasets

Media

Brochures