Technology & Data

Systems and technology offer immense potential to the development of the fund management industry and the possibility of rapid evolution in how fund groups operate. Here we explore some of the latest ideas and industry developments in technology, including current and future technology applications and new innovations being explored and trialled.

Q&A with Rob Wheatley, CTO of reconciliation specialists in Watson Wheatley

Rob Wheatley, CTO of reconciliation specialists in Watson Wheatley answers the most common questions ...

Investor view: How asset owners are thinking about ESG monitoring

Catherine Chen, Responsible Investment Manager at Royal London, explores the key challenges when it c...

Milestone Group’s Asset Allocation Technology Survey

Milestone Group report reveals institutional asset allocators lack proper systems to manage growing complexity.

Understanding trends in ESG and private markets data

Martin Kwiatkowski, Investment Operations Director at Aberdeen Standard Investments, explores whether ESG data presents unique challenges and what this means for fir...

Zurich Group Investment Management transforms operating model with DAAS

Two senior leaders from the Investment Management function of Zurich Insurance Group share their expe...

A guide to complying with the FCA’s key CASS requirements

Our short paper explores the key CASS requirements as outlined in the FCA’s Handbook and provides an overview of how we can help you comply with the regulations.

Four critical steps to achieving cyber security

Steve Forbes, Head of Product Management (Cyber) at Nominet, the UK registry for domain names, sets out the four steps that fund operators must take to make a big di...

The regulatory trends driving outsourcing decisions

Three chief operating officers examine why Mifid II and new ESG regulations will change the way we think about outsourcing data

How to manage the constantly evolving threat of cybercrime

Maria Long, Content and Research Director at the SBAI, explains the three main types of cybercrime fa...
See all articles