Professional Documents
Culture Documents
Credence Analytics Presentation For BPI
Credence Analytics Presentation For BPI
0
For BPI’s Fund Distribution System & PERA System Project
Presented to
Bank of The Philippine Island (BPI)
Table of Content
» Overview and Vision » iDEAL Wealth & Funds 6.0 » iDEAL – Treasury » Project Delivery Model
(For investment, Asset & (for Banks & Regulators)
» DNA & Business Wealth Managers, Trust & » Contact us
Private Banks, Insurers, » MercuryFx
Excellence Model
Custodians) (Branch Forex Dealing Solution)
» Global Presence » Creda. AI - ROBO Advisor
» Creda. AI - ROBO Advisor
» Product Stack » Creda. Chatbot
» Creda. Chatbot
(Your virtual Financial Advisor) (Virtual Financial Advisor)
Credence Profile
Global expansion servicing clients in Asia, Middle East & Africa who
manage over USD 100 Billion in AUM
44 implementations globally with 6 in the Philippines for Investment &
Wealth Management product suite.
Benchmarking with best practices for all processes & , ROI Driven Approach
Partnerships Society
Resources Results
» Industry recognition » iDEAL Wealth Launched » First Client in Philippines » CashTrea Launched for » Strengthened
NBFC’s Management Team
Our Global Client Base
A Partial List
Banks / Trusts/ Discount Investment Portfolio, Insurance Companies Non Banking Finance
Houses Fund Management, Companies & Corporates
Pension Funds
Product Stack
Asset Managers
Insurance/ Corporates/
/ Trusts/ Finance
Products Banks
PF’s/Portfolio
Mutual NBFC/ Money
Companies
Managers
Companies Changers
Creda - ChatBot
Virtual Financial Advisor
MercuryFx
Forex Dealing System
CashTrea
Corporate Treasury Management
Our Partners
Our Partner
Banking Insurance
(Wealth & Investment Registry & CIS/ Mutual
Private Management Custodians Funds
Banking) Other
Investment
Management
Businesses
SWF’s & Asset &
Family Wealth Provident
Trusts
Offices Managers Funds
Analytical Self Service Alerts & Report Scheduling Worksheets & VaR Risk Scenario Analysis Back Performance
Dashboard Reporting Notification Storyboard Calculation Ratios Testing Attribution
Functional Requirement of BPI
Initiate Validate & Approve Transact & Record Reports & Statements
Financial Planning
PERA
BPI
UITF
Statement
Mutual
Funds
Bank
• PERA Sales / Administrator • ICS/ Branch receives account • System debits SETA • Admin & Control Unit
explains the product to opening forms (Employer/Employee) Generates Report for the
potential client/s • ICS / Branch checks TIN in BSP • System credits SETA of Cash client
• Conducts Customer PERA System if client is existing Custodian
Suitability Assessment & already in the database • ICS / Branch records
Risk Profiling • ICS/ Branch encodes account contribution and transaction
record/s in the system on desired PERA product
• Records reviews and approves • ICS / Branch upload
account opening transaction extract to BSP
• Records extracts an uploads to PERA System
BSP PERA System
Functional Requirement of BPI
FRONT END SYSTEMS
ATMC Mobile App
(Branch, EOL, Elink, Mobile App, ChatBots)
Stateme
nt
$
Customer Record
Creation
Leads Management For PERA
Contribution needs to be transferred
Risk Profiling first to Cash custodian and then send
back to Administrator for Subscription
For PERA Report
Contributor's record is Investment Account Transaction
Generation
submitted to Cash Custodian Creation Processing
for record purposes A.Branch Channel A.MIS Reports
Onboarding processes can B. Self Service Channel (EOL, Elink, B. Segregated Reports for UITF & MF
be performed via STP in Mobile App, Chatbot) C. Holdings Certificate
self-service channels C. Special Banking Arrangement (SBA)
D.Third Party
Administration (User, Fund, System Parameters)
FundSense
Business Intelligence and Dash-boarding Tool
FundSense – BI & Dashboarding
Do the Unimaginable with your Data Make better and informed decisions
Empower every user to explore and discover
Do Analytics without having to build new queries
insights in your data with highly interactive and
or wait for the experts
intuitive dashboards
FundSense – BI & Dashboarding
Sample Dashboards
Market Performance
Sales Dashboard
FundSense – BI & Dashboarding
Sample Dashboards
Management Dashboard
Portfolio View
Creda - ChatBot
Virtual Financial Advisor
An Automated financial Advisor Platform
ensuring automated client servicing
Creda ChatBot – Virtual Financial Advisor
Differentiate, Disrupt, World-Class Customer Experience
SERVE THE MASS AFFLUENT BUILD A PIPELINE OF CLIENTS WORK WITH MILLENIALS
Robo Advisory-
Steps Involved
Step 1 Step 4
Classification Based on Machine Portfolio Optimization
Learning
Many optimization methods to use
Use of advance Machine Learning to arrive at an optimum
Algorithm to classify investors based on the investment recommendation
Risk Profile
RiskMark 4.0
Market Risk Management Platform
RiskMark 4.0
Market Risk Management Platform
HTTPS REST
Controller View
Filters Web Services JSPs JSON
Application
Layer Validators Config Files
Model
Action Controller Resource Bundles
Built using secure design patterns, best practices & guidelines as defined by Open Web
Application Security Project (OWASP)
Presentation Services are rich client browser based user interface developed using
HTML5 & AJAX components
Application tier components and services are developed using MVC Model 2 design
pattern
View Helper
& Authorization
Action Controller
Authentication
Web Browser
Business service
Secure Base
Enforcer
Business
Delegate
Action
Object
Client-side JavaScript Validator
Data Store
Logger Logger
The User
Only Action
the Controller
accesses
Secured the ishides
responsible
application
HTTP on forsecured
the page navigations.
connection (HTTPS)
The All
The
All
The authenticated,
authenticated
business
Data Access
application delegate
Object
is dividedis port
&authorized
authorized
used
into
isrequests
and
the toopened
validated
complexities
encapsulate
secured
on the
are
and
HTTP
requests
processed
ofall
business
access
non-secured
server
are (port
byprocessed
service
the
to 443).
by Secure
Validation
the
zones. object
underline Base Action.
Interceptor.
creations.
data source. Validation Interceptor validates all the request
7
18
2
3
4
5
6 parameters
It
The
Iftakes
All
The the
the the
server against
data
requestdecision
accepts
posted
istriesa set
to
by
marked of
use
requests
the validation
the
useron
as invalidBusiness
isthe rules
using
by HTTPS configured
Delegate
asynchronous
port
the Validation to in the
invoke Application.
business
JavaScript
Interceptor, and
then services
XML and
(AJAX)
it redirects where
to checks
the to page
error transfer
andthe request.
Data When business
Access
the user delegate
Object to then
manages
access calls
theany the Business
connection
secured services
with
URL, the
then data in source
the the business
to obtain
Authentication tier.and store
Enforcer data. if the user isdisplays the error
authenticated. messages
It only allows
on
the
In the
Incase
order
The browser.
iftoany
keep
application
authenticated of the validation
ausers
separation
performsto a rules
between
sanity
access the fails,
check theitfor
secure creates
presentation
the
zone data a the
in list of error messages
services
submitted andthe
by
application. business
user and marks
services,
(using the request
the
client-side Action as invalid
Controllers
JavaScript never directly access
validator).
All the components/frameworks build as part of the enterprise architecture uses Data Access Objects for performing database
the
IfIfBusiness
the request Services.
is marked asround
validthe by the
operations. all
thethe
IfThis is parameters
just
user istonot
reduce are
thevalidated
authenticated, trips to Validation
successfully against
the server.
Authentication Interceptor,
the set
Enforcer then
of
logs only it isevent
avalidation
security passed
rules, then
and toredirect
the request
the individual actiontocontrollers.
is marked
the request as valid.
the login page.
They always use Business Delegate to access the business services
Overall Security
Secure
Internal Router / JEE application Authentication
External Router / firewall
Authorized Secure access firewall Web services and secure
access SSL/TLS configuration Business logic access
Reverse proxy
Data
Business logic
Web Application
Firewall
Firewall
Server Server
Browser/
Mobile Web Database
Applications
Application
Security – Web Application
XSS Request Preventing
Handling Protecting
Authenticating Wrapper Parameter
Exception Sensitive
User Manipulation
Data
Web Application
Server Server
Firewall
Firewall
Browser Database
Web
Applications
Application
• Role
• Portfolio
• Organization Hierarchy Level
• Approval Level, where applicable
Web Server
Web servers receive requests from the load balancer
Farm
and share the requests that come form internet
www.credenceanalytics.com
Thank You