Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

iDEAL Wealth & Funds 6.

0
For BPI’s Fund Distribution System & PERA System Project

Presented to
Bank of The Philippine Island (BPI)
Table of Content

Investment Treasury Delivery &


About Us Management Suite Licensing Model
Management Suite

» Overview and Vision » iDEAL Wealth & Funds 6.0 » iDEAL – Treasury » Project Delivery Model
(For investment, Asset & (for Banks & Regulators)
» DNA & Business Wealth Managers, Trust & » Contact us
Private Banks, Insurers, » MercuryFx
Excellence Model
Custodians) (Branch Forex Dealing Solution)
» Global Presence » Creda. AI - ROBO Advisor
» Creda. AI - ROBO Advisor
» Product Stack » Creda. Chatbot
» Creda. Chatbot
(Your virtual Financial Advisor) (Virtual Financial Advisor)
Credence Profile

Well respected & established Software provider since 1993

170 Employees, 100+ enterprise clients globally

Global expansion servicing clients in Asia, Middle East & Africa who
manage over USD 100 Billion in AUM
44 implementations globally with 6 in the Philippines for Investment &
Wealth Management product suite.

Benchmarking with best practices for all processes & , ROI Driven Approach

Domain driven and experienced professionals &


Strong Local Partnership in Philippines
DNA at Credence Analytics
Business Excellence Model
ENABLERS RESULTS

Leadership People Domain, People Business


Processes Results Results
Products Service

Strategy Customer Results

Partnerships Society
Resources Results

LEARNING, CREATIVITY AND INNOVATION


Global Presence
South Asia | South East Asia | Africa | Middle East | United Kingdom
Our Journey
KEYMILESTONES
1993-1999 2000-2005 2006-2010 2011-2016 2017-18
» Started as research firm » iDEAL Treasury grows » iDEAL Funds Capitalized » Forayed into African » Global Expansion
engaged in syndicated client base Insurance Sector Markets
research for on financial Privatization » Credence 2.0
markets, primarily fixed » Launch of iDEAL Funds for » iDEAL Funds Capitalized
income, forex and Reliance Asset » iDEAL Funds enjoyed Insurance Sector » Innovations on Robo
derivatives. Management largest market share for Privatization Advisory & Launch of AI
Insurance Driven Virtual Advisor
» Leveraging Rich In-House » Launch of Risk Mark for » iDEAL Funds enjoyed
domain ventured into Market Risk » Mercury FX Rolled out for largest market share for » Inaugurated Dubai
Software business largest Banks in India Insurance Operations to serve
» Launch of Awarded MEA Region
» Treasury Suite iDEAL Mercury FX- Retail Branch » Initial Foray to the » Mercury FX Rolled out for
Launched for AMEX Forex Automation International markets largest Banks in India » Inaugurated Singapore

» Industry recognition » iDEAL Wealth Launched » First Client in Philippines » CashTrea Launched for » Strengthened
NBFC’s Management Team
Our Global Client Base
A Partial List

Banks / Trusts/ Discount Investment Portfolio, Insurance Companies Non Banking Finance
Houses Fund Management, Companies & Corporates
Pension Funds
Product Stack
Asset Managers
Insurance/ Corporates/
/ Trusts/ Finance
Products Banks
PF’s/Portfolio
Mutual NBFC/ Money
Companies
Managers
Companies Changers

iDEAL Wealth & Funds


Unified Investment Management

Creda - ChatBot
Virtual Financial Advisor

Creda.AI– ROBO Advisor


AI driven ROBO Advisor

iDEAL – Integrated Treasury


Bank Treasury Automation

MercuryFx
Forex Dealing System

CashTrea
Corporate Treasury Management
Our Partners
Our Partner

Our Infra and Local Partner


Our Technology Partners
How can we help BPI?
How can we help?
Quickly Capture Market Share
Innovate, Disrupt & Differentiate by using
front end tools like Chatbot, Portal & Mobile
App for quick customer onboarding

Build Lean Operations


Experienced team will help Automate Front
to back through a single STP system with
full localization to Philippines Market

Enhance Customer Experience


Build customer experience by self-
service tools like Creda.ChatBot,
Creda.Portal

Support and Scale business


Our dedicated support team will
ensure timely support, upgrades f or
scaling your business
iDEAL Wealth & Funds 6.0
Unified Investment , Wealth & Funds Management,
Trust Banking, Private Banking & Custody Platform
iDEAL Wealth & Funds 6.0
One Software Platform for all kinds investment management businesses

Banking Insurance
(Wealth & Investment Registry & CIS/ Mutual
Private Management Custodians Funds
Banking) Other
Investment
Management
Businesses
SWF’s & Asset &
Family Wealth Provident
Trusts
Offices Managers Funds

Multi- Entity Configuration Multi-Country Management Multi-Currency Coverage Multi-Lingual Reporting


iDEAL Wealth & Funds 6.0
Unified Investment, Wealth & Funds Management, Trust Banking, Private Banking & Custody Platform

Service Third Party


Integrations
Channels Chatbot –
Mobile App Branches
RM &
Call Center Channel Partner
Virtual Assistant Customer Portal CBS, Deposits

Middleware (REST API)


MULTI InvestOne, GL ,
Investor Front Mid Back
Country, Entity PERA AMLA
Currency, Asset Class Servicing Office Office Office
IDARS, Elink
Creda -Virtual • PERA A/c creation
• Prospect & • Order Mgmt • Order • Static Data
Financial Advisor & Opportunity • Investment Limits Aggregation and Maintenance • PERA Products BSP PeraSys,
Self Service ChatBot Mgmt tracking allocation • Fees & • PERA Validations Pera Custodian
Creda.ai: Artificial • KYC & Onboarding • Transaction Mgmt • Pre & Post trade Commission • Local / Overseas
• Document Mgmt • Real time position compliance • Trade Filipino RM2 System
Intelligence driven
• Interaction Mgmt tracking • Investment rules Confirmation • Tax credits (TCC)
Robo Advisor Exchange/
• Risk Profiling & • Cash-flow management Broker & computations
FundSense : Realtime Financial Planning projection • Regulatory counterparty • Integration with Brokers/ Data
BI, Analytics, Reporting • Customer • Portfolio Reporting • Trade Settlements BSP PeraSYS Providers
& Dashboards • Stock & Cash • Masters
Transactions Modeling
reconciliation SMS/Email/
• Unit Allocation • Performance • Transactions
Comprehensive • Corporate Actions Payment
• Customer Attribution • Holdings
Rules Engine for strong • Income Mgmt Gateway
Statements • Fund Factsheet • Portfolio Valuation
Investment Compliance
• Accounting entries
Reports & Statements • NAVPU Calculation Portfolio Analytics

Analytical Self Service Alerts & Report Scheduling Worksheets & VaR Risk Scenario Analysis Back Performance
Dashboard Reporting Notification Storyboard Calculation Ratios Testing Attribution
Functional Requirement of BPI
Initiate Validate & Approve Transact & Record Reports & Statements

Financial Planning

PERA
BPI
UITF
Statement
Mutual
Funds

Bank
• PERA Sales / Administrator • ICS/ Branch receives account • System debits SETA • Admin & Control Unit
explains the product to opening forms (Employer/Employee) Generates Report for the
potential client/s • ICS / Branch checks TIN in BSP • System credits SETA of Cash client
• Conducts Customer PERA System if client is existing Custodian
Suitability Assessment & already in the database • ICS / Branch records
Risk Profiling • ICS/ Branch encodes account contribution and transaction
record/s in the system on desired PERA product
• Records reviews and approves • ICS / Branch upload
account opening transaction extract to BSP
• Records extracts an uploads to PERA System
BSP PERA System
Functional Requirement of BPI
FRONT END SYSTEMS
ATMC Mobile App
(Branch, EOL, Elink, Mobile App, ChatBots)

Prospecting Onboarding Order Taking Reporting

Stateme
nt

$
Customer Record
Creation
Leads Management For PERA
Contribution needs to be transferred
Risk Profiling first to Cash custodian and then send
back to Administrator for Subscription
For PERA Report
Contributor's record is Investment Account Transaction
Generation
submitted to Cash Custodian Creation Processing
for record purposes A.Branch Channel A.MIS Reports
Onboarding processes can B. Self Service Channel (EOL, Elink, B. Segregated Reports for UITF & MF
be performed via STP in Mobile App, Chatbot) C. Holdings Certificate
self-service channels C. Special Banking Arrangement (SBA)
D.Third Party
Administration (User, Fund, System Parameters)
FundSense
Business Intelligence and Dash-boarding Tool
FundSense – BI & Dashboarding

Interactive analysis, Simply Smarter Create and Explore on


without boundaries Visualizations Any device

Do the Unimaginable with your Data Make better and informed decisions
Empower every user to explore and discover
Do Analytics without having to build new queries
insights in your data with highly interactive and
or wait for the experts
intuitive dashboards
FundSense – BI & Dashboarding
Sample Dashboards

Market Performance

Sales Dashboard
FundSense – BI & Dashboarding
Sample Dashboards

Management Dashboard

Portfolio View
Creda - ChatBot
Virtual Financial Advisor
An Automated financial Advisor Platform
ensuring automated client servicing
Creda ChatBot – Virtual Financial Advisor
Differentiate, Disrupt, World-Class Customer Experience

SERVE THE MASS AFFLUENT BUILD A PIPELINE OF CLIENTS WORK WITH MILLENIALS

Manage accounts simply Onboard more clients. Provide a true digital


and cost-effectively, so Use our technology to experience for your future
you can invest more in automate account clients. Let them open an
relationships. opening, performance account with their phone,
reporting, and trade invest online with click of
execution. a button
Who is Creda?

Creda is your Virtual Financial


Advisor, a Chatbot powered by
artificial intelligence computer
programs and designed to
behave like humans that you
can interact with, in order to
get information or get things
done.
Creda.AI
Robo Advisor with AI
Omni-Channel Robo Advisory Platform
Creda.AI - Artificial Intelligence driven Robo Advisory Platform
Creda.AI - Artificial Intelligence driven Robo Advisory Platform
Step 2 Step 3
Automated Investment
Factor Based Investment
Allocation
Allocation
Use Artificial Intelligence to allocate
Using wide variety of security
investments automatically unlike
classification, called Factors to
traditional model portfolio
allocate investments

Robo Advisory-
Steps Involved
Step 1 Step 4
Classification Based on Machine Portfolio Optimization
Learning
Many optimization methods to use
Use of advance Machine Learning to arrive at an optimum
Algorithm to classify investors based on the investment recommendation
Risk Profile
RiskMark 4.0
Market Risk Management Platform
RiskMark 4.0
Market Risk Management Platform

RiskMark Market Risk Management Platform

Models Historical Analytical Var -CoVar Monte Carlo

Asset Fixed Income Securities Derivatives


Equity/MF Forex / Gold
Classes (Gsec, T Bills, Bonds) (Swaps & Fx Options)

User Parameters Market Data Back Testing Reports


• Value at Risk Report
Upload facility for market data
• Stop Loss Trigger Report
• Portfolio Selection
• Back Testing Report
• Overlapping / Non • ZCYC (Nelson Siegel • For user definable period
• PVBP Report
Overlapping (with Root T Svensson model) • Support for back testing
• Duration Analysis Report
method support) • Rating-wise Spread curves with actual P&L changes (as
• Working Sheets for VaR
• Holding Period • Forex Rates add on service)
calculations
• Confidence Level
Built-in Standard Reports
• Sample period (Bank to subscribe to market
Report Designer for adhoc
data)
reports
Technical Details
Topics

1 Physical & Logical Architecture 5 Scalability

2 HW / SW Requirement 6 High Availability

Layer Architecture & Application


3 Layer Interactions
7 BOM Coverage

4 Application Security 8 Project Costing


Physical Architecture
Logical Architecture
Layer Architecture

• The topmost layer of the application architecture.


Presentation Layer • These are components through which users can access the
Application

• Here, most application logic revolves around input


Application Layer validation.
• There is almost no business logic within the application layer.

• This is where the actual business logic is validated on server.


Platform Layer • This processing could either be synchronous or
asynchronous.

• This is the lowest layer in the architecture.


Database Layer • The database layer includes databases and a well-defined
data access layer
Application Layer Interactions
Presentation
Layer Web Browser Custom Applications

HTTPS REST
Controller View
Filters Web Services JSPs JSON
Application
Layer Validators Config Files
Model
Action Controller Resource Bundles

Business/ Session Management Access Control Reporting


Platform
Layer Business Validations, Logic & Processing

JNDI / JDBC LDAP JAVA MAIL

RDBMS Directory Service Mail


Application Layer Interactions
Standard J2EE distributed Application built on Service Oriented Architecture

Component based design

Built using secure design patterns, best practices & guidelines as defined by Open Web
Application Security Project (OWASP)

Presentation Services are rich client browser based user interface developed using
HTML5 & AJAX components

Application tier components and services are developed using MVC Model 2 design
pattern

Platform/Business tier components and services are developed using Stateless


Session
Application Layer Interaction Flow
Client / Web/Application Business / Platform
Tier Data Tier
Presentation Tier Tier

View Helper

All validations successful?

Process business logic…


Call Business Services…
Handle UI Navigation…

All parameters valid?


validity & Access?

Access data store…



1 2
Secure Pipe (HTTPS) 3 4 5 6 7 8

& Authorization

Action Controller
Authentication
Web Browser

Business service
Secure Base

& Data Access


Interceptor
Validation
User

Enforcer

Business
Delegate
Action

Object
Client-side JavaScript Validator

Data Store
  

Logger Logger

The User
Only Action
the Controller
accesses
Secured the ishides
responsible
application
HTTP on forsecured
the page navigations.
connection (HTTPS)
The All
The
All
The authenticated,
authenticated
business
Data Access
application delegate
Object
is dividedis port
&authorized
authorized
used
into
isrequests
and
the toopened
validated
complexities
encapsulate
secured
on the
are
and
HTTP
requests
processed
ofall
business
access
non-secured
server
are (port
byprocessed
service
the
to 443).
by Secure
Validation
the
zones. object
underline Base Action.
Interceptor.
creations.
data source. Validation Interceptor validates all the request
7
18
2
3
4
5
6 parameters

It
The
Iftakes
All
The the
the the
server against
data
requestdecision
accepts
posted
istriesa set
to
by
marked of
use
requests
the validation
the
useron
as invalidBusiness
isthe rules
using
by HTTPS configured
Delegate
asynchronous
port
the Validation to in the
invoke Application.
business
JavaScript
Interceptor, and
then services
XML and
(AJAX)
it redirects where
to checks
the to page
error transfer
andthe request.
 Data When business
Access
the user delegate
Object to then
manages
access calls
theany the Business
connection
secured services
with
URL, the
then data in source
the the business
to obtain
Authentication tier.and store
Enforcer data. if the user isdisplays the error
authenticated. messages
It only allows
on
the
In the
Incase
order
The browser.
iftoany
keep
application
authenticated of the validation
ausers
separation
performsto a rules
between
sanity
access the fails,
check theitfor
secure creates
presentation
the
zone data a the
in list of error messages
services
submitted andthe
by
application. business
user and marks
services,
(using the request
the
client-side Action as invalid
Controllers
JavaScript never directly access
validator).
 All the components/frameworks build as part of the enterprise architecture uses Data Access Objects for performing database
the
IfIfBusiness
the request Services.
is marked asround
validthe by the
operations. all
thethe
IfThis is parameters
just
user istonot
reduce are
thevalidated
authenticated, trips to Validation
successfully against
the server.
Authentication Interceptor,
the set
Enforcer then
of
logs only it isevent
avalidation
security passed
rules, then
and toredirect
the request
the individual actiontocontrollers.
is marked
the request as valid.
the login page.
 They always use Business Delegate to access the business services
Overall Security
Secure
Internal Router / JEE application Authentication
External Router / firewall
Authorized Secure access firewall Web services and secure
access SSL/TLS configuration Business logic access
Reverse proxy
Data
Business logic

Web Application
Firewall

Firewall
Server Server
Browser/
Mobile Web Database
Applications
Application
Security – Web Application
XSS Request Preventing
Handling Protecting
Authenticating Wrapper Parameter
Exception Sensitive
User Manipulation
Data

Web Application
Server Server
Firewall

Firewall
Browser Database
Web
Applications
Application

Protecting Authenticating/ Auditing and Encrypting or


Sensitive Authorizing Preventing Validating Logging activity Hashing sensitive
Data Users SQL Injection Input and Transactions data
Application Level Security
• Authentication • Comprehensive security Policies
– Supports Single Sign on authentication – Password policies, Account lockout
(LDAP/Directory, OpenAM) policies, audit policies

• Authorization & Access Control • Security Event Logs


– Role based access to system resources – Logs all authentication, authorization,
changes to security policies and Account
– Organization Structure
management activities
– Record level security using predefined
visibility criteria
• Session Management
– Session Timeouts
• Input Validations
– Restrict multiple logins to the application
– Client side validations used to reduce
using the single user account
round trips to the server. Performs all
validations on the server side
– Validation rules are decoupled from the • Audit Tracker
presentation logic – Tracks all changes made to the data for the
entities configured for auditing
Centralized Security Service

Users can have multiple profiles. Each profile is based on :

• Role
• Portfolio
• Organization Hierarchy Level
• Approval Level, where applicable

Entire organizational hierarchy can be mapped in the system


• Each level has access to only clients below in hierarchy.

As comprehensive as your business structure…now and in future


Scalability
• Round trip and packet size optimization for low
Browser Based bandwidth
Clients  Stateless AJAX based connections
 Rich client JavaScript components
NLB

Web Server
Web servers receive requests from the load balancer
Farm
and share the requests that come form internet

 Application Tier scale out


J2EE Leverages standard J2EE technologies with Cluster &
Application Failover support
Server Cluster Code optimized for scale out deployment
Vertical & Horizontal cluster for workload
optimization
Oracle Real
 Database Server Scale out
Application
Cluster (RAC) Support for standard Oracle Server fail-over via
or Mirror clustering or mirroring
Project Delivery Model

Study Configure Deploy Launch


Project Initiation

Functional, Technical &


Parameterization Data Migration Simulation
Process Assessment

Solution Architecture Design / Development System Integration Go Live

Interfaces & Accounting Internal Testing UAT Stabilization

Complete responsibility for delivery


LET US KNOW
WHAT YOU THINK

INDIA PHILIPPINES SINGAPORE UAE


Credence Analytics Credence Analytics Credence Analytics Credence Analytics
301, Palmspring 14/F Net Cube Center 3rd Singapore Land Tower, Building A3, 3rd Floor,
New Link Road, Malad (W) Ave.COR 30th Street, Raffels Place, DWCC Towers, Dubai
Mumbai , India. E-Square Zone Singapore – 048625 South, P.O. Box No 39056,
Pin - 400 064 Fort Bonifacio , Dubai, UAE
Phone : +91 22 4061 1000 Taguig Global City, Phone +97144567350
Fax : +91 22 4061 1000 Philippines-1634 Mo +971 50 552 6445
Phone: +63-9260449546

www.credenceanalytics.com
Thank You

You might also like