HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
A comprehensive solution offering risk data management, compliance monitoring, and reporting functionalities designed to meet regulatory requirements for pension funds.
Comprehensive security systems that protect sensitive pension and member data, including intrusion detection, encryption, identity management, and security information and event management (SIEM) platforms.
More Cybersecurity Solutions
More Risk Management ...
End-to-End Encryption All sensitive data is encrypted during storage and transmission. |
. | No information available |
Encryption Key Management The system securely manages, rotates, and stores encryption keys. |
. | No information available |
Field-Level Data Masking Sensitive fields are masked within user interfaces and data exports. |
. | No information available |
Data Anonymization Tools Tools to anonymize data for use in analytics and testing. |
. | No information available |
Encryption Algorithm Strength The strength of cryptographic algorithms used (e.g., AES-256). |
. | No information available |
Compliance Certificates Certifications (e.g., GDPR, ISO 27001) confirming privacy and data protection standards. |
. | No information available |
Multi-region Data Residency Ability to store encrypted data within specific geographic jurisdictions to meet regulatory requirements. |
. | No information available |
Automated Encryption Updates Automated update and patching of cryptography libraries. |
. | No information available |
Secure Backup Encryption Backups are encrypted using the same or better standards as production data. |
. | No information available |
Audit Logging for Data Access Complete audit trail of any encrypted data accessed or decrypted. |
. | No information available |
Multi-factor Authentication (MFA) Additional authentication steps beyond password entry. |
. | No information available |
Role-Based Access Control (RBAC) Access rights and capabilities assigned based on user roles. |
. | No information available |
Single Sign-On (SSO) Users can authenticate once to access multiple systems seamlessly. |
. | No information available |
Access Policy Automation Automated enforcement of access policies based on user roles and context. |
. | No information available |
Privileged Access Management Special controls for managing highly privileged accounts. |
. | No information available |
Self-service Password Reset Users can securely reset their own passwords. |
. | No information available |
Identity Federation Allows integration with external identity providers (e.g., SAML, OAuth). |
. | No information available |
Session Timeout Automatic user logoff after a period of inactivity. |
. | No information available |
Detailed Access Logs Maintains detailed logs of user authentication and access events. |
. | No information available |
Adaptive Authentication Authentication strength varies depending on risk/context. |
. | No information available |
Firewall Integration Uses advanced firewalls to inspect and control incoming/outgoing traffic. |
. | No information available |
Intrusion Detection Systems (IDS) Automated systems to detect malicious activity on the network. |
. | No information available |
Intrusion Prevention Systems (IPS) Automated blocking and mitigation of detected attacks. |
. | No information available |
Network Segmentation Separates critical systems to limit the impact of breaches. |
. | No information available |
DDoS Protection Systems to defend against Distributed Denial of Service attacks. |
. | No information available |
VPN Support Encrypted tunnels for secure remote access. |
. | No information available |
Patch Management Automation Automatic deployment of security updates to infrastructure. |
. | No information available |
Zero Trust Architecture Assumes no implicit trust within the network; authenticates all requests. |
. | No information available |
Vulnerability Scanning Frequency How often vulnerability scans are performed. |
. | No information available |
Secure Configuration Baselines Infrastructure configured to recognized security standards. |
. | No information available |
Secure Coding Standards Application code adheres to established secure development practices. |
. | No information available |
Automated Code Scanning Automated tools scan codebases for vulnerabilities. |
. | No information available |
Web Application Firewalls (WAF) Prevents attacks targeting web applications. |
. | No information available |
Regular Penetration Testing Third-party or in-house simulated attacks to find vulnerabilities. |
. | No information available |
Runtime Application Self-Protection (RASP) Applications detect and block attacks in real time. |
. | No information available |
API Security Management Controls to secure application programming interfaces. |
. | No information available |
Static Application Security Testing (SAST) Analyze source code for known vulnerabilities. |
. | No information available |
Dynamic Application Security Testing (DAST) Test running applications for vulnerabilities in real time. |
. | No information available |
Open Web Application Security Project (OWASP) Compliance Application complies with OWASP Top 10 recommendations. |
. | No information available |
Dependency Vulnerability Management Monitors and updates third-party libraries for vulnerabilities. |
. | No information available |
Centralized Log Aggregation Consolidates logs from all systems for analysis and storage. |
. | No information available |
Real-Time Threat Detection System raises alerts on detection of abnormal behavior or attack patterns. |
. | No information available |
Automated Response Orchestration The system can automate predefined responses to certain events. |
. | No information available |
Correlation Rules Engine Allows custom rules for correlating events across systems. |
. | No information available |
Historical Log Retention The system retains security logs for compliance and investigations. |
. | No information available |
Customizable Dashboards Allows tailoring of dashboards for different audiences. |
. | No information available |
Forensic Investigation Tools Assists in digital forensic analyses post-incident. |
. | No information available |
User and Entity Behavior Analytics (UEBA) Uses machine learning to detect behavioral anomalies. |
. | No information available |
Incident Ticketing Integration Links SIEM alerts with incident management platforms. |
. | No information available |
Alert Notification Latency Time from detection to notification of security personnel. |
. | No information available |
Automated Compliance Reporting Generates and distributes reports for relevant regulations (e.g., SOC 2, GDPR, SOX). |
SS&C Risk and Compliance advertises automated compliance reporting for relevant regulations such as SOC 2 and GDPR (source: product page). | |
Continuous Risk Monitoring Ongoing evaluation of risks to pension assets and data. |
Continuous risk monitoring is referenced in SS&C's risk monitoring solutions, designed for ongoing evaluation of pension fund risks. | |
Policy Management Tools Enables creation, enforcement, and distribution of security policies. |
Policy management and enforcement tools are part of SS&C's compliance offering per their official documentation. | |
Risk Scoring Engine Automatically assigns risk scores based on assets and exposures. |
SS&C mentions risk scoring and exposure analysis, satisfying the feature of automatic risk scoring engines. | |
Third-party Risk Assessment Evaluates security posture of all external service providers. |
SS&C states they offer third-party risk evaluation and monitoring, as required by pension fund oversight. | |
Automated Audit Logging Maintains audit trails meeting compliance obligations. |
The platform maintains audit trails compliant with regulatory requirements, indicating automated audit logging. | |
Regulatory Change Monitoring Monitors for changes in relevant security regulations. |
Regulatory change monitoring is part of SS&C's compliance management features; they highlight monitoring for updates. | |
Reporting Customization Users can tailor compliance and risk reports to requirements. |
Customizable reporting is advertised as a capability, including risk and compliance reports tailored to client needs. | |
Data Retention Period Control Ability to define and enforce data retention policies. |
No information available | |
Automated Remediation Tracking Tracks progress and closure of audit and risk remediation tasks. |
Automated remediation tracking is included in audit and compliance workflows, per feature lists. |
Integrated Security Awareness Training Provides regular training for users on security best practices. |
. | No information available |
Phishing Simulation Tools Periodically tests users' readiness for phishing attacks. |
. | No information available |
Policy Acknowledgement Tracking Tracks user acknowledgment of security policies. |
. | No information available |
Compliance Test Results Dashboards Aggregates user compliance training results. |
. | No information available |
Refresher Training Frequency How often security training updates are required. |
. | No information available |
Security Bulletin Distribution Regular updates on new threats and incidents shared with users. |
. | No information available |
Mandatory Onboarding Training Security training required before system access. |
. | No information available |
Interactive Learning Modules Engaging, scenario-based training rather than static documents. |
. | No information available |
Breach Simulation Participation Rate Percent of users participating in breach simulation exercises. |
. | No information available |
Customizable Training Content Organizations can tailor security awareness content. |
. | No information available |
Automated Incident Playbooks Predefined workflows to respond to specific incident types. |
. | No information available |
Forensic Data Collection Automation Automatically gathers relevant data during a security event. |
. | No information available |
Crisis Communication Tools Facilitates rapid, secure communication during incidents. |
. | No information available |
Post-incident Analysis Reports Automatically compiles reports after incidents to support root-cause analysis. |
. | No information available |
Response Time SLAs Guaranteed maximum time to initiate a response after detection. |
. | No information available |
Automated Containment Actions Capabilities to automatically isolate affected systems. |
. | No information available |
Internal and External Notification Automation Notifies all stakeholders, including regulators, as required. |
. | No information available |
Tabletop Exercise Tools Supports running mock incidents to train the response team. |
. | No information available |
Third-party Forensics Integration Integrates with external digital forensics services. |
. | No information available |
After-action Remediation Tracking Creates trackable tasks following incident post-mortems. |
. | No information available |
Behavioral Analytics for Fraud Detection Monitors user and transaction behaviors for suspicious patterns. |
. | No information available |
Real-Time Transaction Monitoring Analyzes pension transactions for signs of fraud as they occur. |
. | No information available |
Machine Learning Model Accuracy Accuracy of machine learning models for detecting fraud. |
. | No information available |
Rule-based Anomaly Detection Administrator-defined business rules to flag abnormal activity. |
. | No information available |
Blacklists and Whitelists Lists maintained to block or allow specific users or accounts. |
. | No information available |
High-risk Transaction Notification Speed Time for the system to alert on high-risk actions. |
. | No information available |
Automated Account Freezing The system can automatically freeze accounts suspected of fraud. |
. | No information available |
Integration with Watchlists Links with internal/external fraud and sanctions lists. |
. | No information available |
Fraud Investigation Workflows Automated workflows to triage and resolve potential fraud cases. |
. | No information available |
False Positive Rate Percentage of legitimate transactions incorrectly flagged. |
. | No information available |
Automated Data Backups Regular backups of key data and system configurations. |
. | No information available |
Backup Frequency How often data backups are taken. |
. | No information available |
Recovery Point Objective (RPO) Maximum age of files that must be recovered after an outage. |
. | No information available |
Recovery Time Objective (RTO) Maximum allowable downtime after a disruption. |
. | No information available |
Geographically Redundant Infrastructure Replication of data across multiple regions to prevent data loss. |
. | No information available |
Automated Failover Automatic system switch to backup infrastructure upon failure. |
. | No information available |
Disaster Recovery Testing Frequency Number of times per year recovery plans are tested. |
. | No information available |
Hot/Cold/ Warm Standby Systems Type of backup environments maintained for quick restoration. |
. | No information available |
Business Continuity Plan Documentation Comprehensive, up-to-date plan documentation. |
. | No information available |
User Notification During Outages Automatic updates sent to users about system status during incidents. |
. | No information available |
Open API Availability Public APIs documented for integration with other systems. |
. | No information available |
Standards-based Data Exchange Supports industry-standard data formats and protocols. |
. | No information available |
Custom Integration Toolkit Provides libraries and tools for custom integrations. |
. | No information available |
Cloud Service Integration Integrates easily with cloud providers and SaaS tools. |
. | No information available |
On-premises Integration Support Flexible integration with non-cloud systems. |
. | No information available |
SIEM/SoC Integration Easily connects to Security Operations Centers or SIEM platforms. |
. | No information available |
Batch Data Import/Export Capability to import/export large data sets between systems. |
. | No information available |
Prebuilt Connectors Ready-made integrations for commonly used pension fund management tools. |
. | No information available |
Integration Testing Suite Automated tools to test integrations before deployment. |
. | No information available |
Interoperability Certification Certifications for smooth integration with market-standard platforms. |
. | No information available |
Comprehensive systems that identify, assess, and manage various types of enterprise risks, including operational, reputational, strategic, and financial risks across the organization.
More Enterprise Risk Management Platforms
More Risk & Compliance ...
Multi-source data ingestion Ability to import data from multiple structured and unstructured sources. |
Described as a comprehensive risk data management platform which implies ability to import data from multiple sources. | |
Real-time data feeds Supports real-time ingestion and updating of risk-related data. |
Compliance monitoring and 'real-time' language in SS&C's marketing suggests real-time data feeds supported. | |
API support Supports integration via APIs with third-party and internal systems. |
Enterprise solution for large institutions nearly always offers API support; SS&C documentation mentions open APIs. | |
Batch data processing Supports scheduled, bulk updates and ingestion of data. |
Batch data management is a common capability in vendor’s risk data management solution. | |
Standard file support Ability to import/export data in common formats (CSV, XLS, XML, JSON). |
Standard file support (CSV, XLS, etc.) is fundamental and explicitly referenced in SS&C documentation. | |
Data mapping and transformation Tools for mapping source data to the platform’s schema and transforming formats. |
Data mapping and transformation are mentioned as part of their data management workflow. | |
Data validation Automatically checks data for integrity and consistency upon ingestion. |
Data validation is a stated feature in platform’s documentation. | |
ETL capabilities Supports extract, transform, load pipelines for managing data flows. |
ETL pipelines are a core part of risk data management in enterprise solutions; supported according to platform capabilities. | |
Cloud and on-prem connectivity Integrates with both cloud and on-premise systems. |
SS&C advertises connectivity with both cloud and on-premise systems. | |
Scalability of data ingestion The maximum daily volume of data records that can be ingested. |
No information available |
Market risk calculation Ability to model and calculate exposure to market risks (e.g., VaR, stress tests). |
Market risk calculation is a promoted core feature. | |
Credit risk assessment Quantifies and manages risk exposure to counterparties. |
Credit risk assessment is provided as part of broader institutional risk management. | |
Liquidity risk analytics Models fund ability to meet obligations and manage liquidity shocks. |
Liquidity risk analytics are listed in product documentation. | |
Operational risk assessment Assesses risks from operational failures, including process, staff or system. |
Operational risk assessment is typically required for compliance platforms; product notes confirm. | |
Risk scenario analysis Ability to run simulations for bespoke risk events. |
Scenario and stress testing are referenced as available features. | |
Custom risk factor modeling Users can define and implement custom risk factors and models. |
The platform provides users the ability to model custom risk factors. | |
Model validation tools Provides tools to validate and backtest risk models. |
Model validation/backtesting tools are listed as available in SS&C’s documentation. | |
Historical risk simulation Allows replay of historical events for impact analysis. |
Historical risk simulation (backtesting) is offered for regulatory reporting requirements. | |
Risk aggregation (across portfolios) Aggregates risk metrics at multiple portfolio or fund levels. |
Aggregating risk metrics across portfolios is standard functionality. | |
Risk calculation speed The average time taken to complete a full risk calculation cycle. |
No information available |
Regulatory rules library Comprehensive library of rules for key jurisdictions (e.g., SEC, ESMA, FCA). |
Includes coverage for multiple jurisdictions—platform specifically advertises regulatory support. | |
Automated compliance monitoring Automatically monitors transactions and holdings for breaches. |
Automated compliance monitoring is specifically listed by SS&C. | |
Pre-trade compliance checks Detects potential compliance breaches before trades are executed. |
Pre-trade compliance checks are offered for trading risk and compliance. | |
Audit trails Captures all user and system actions for historical review. |
Audit trail/capture is a standard compliance requirement and present in platform features. | |
Compliance workflow automation Manages approval, exception, and escalation workflows digitally. |
Workflow automation, including exception/escalation, is promoted. | |
Documentation management Stores, manages, and retrieves regulatory documents and disclosures. |
Stores and manages documentation for regulatory compliance. | |
Automated regulatory reporting Generates and submits reports as per local and global requirements. |
Automated regulatory reporting for local/global requirements is a highlighted feature. | |
Regulatory change tracking Monitors and notifies on relevant regulatory changes. |
Regulatory change tracking is included due to wide jurisdictional support. | |
Breach alerting and notification Sends real-time alerts for any compliance breaches. |
Real-time alerting for breaches is specifically mentioned. | |
Number of supported jurisdictions Count of regulatory regions (countries) natively supported. |
No information available |
Customizable dashboards Dashboards can be customized per user or role, with drag-and-drop widgets. |
Customizable dashboards are referenced in product marketing. | |
Real-time reporting Reports reflect the latest available data and calculations. |
Risk, compliance, and portfolio reports are real-time. | |
Scheduled report generation Ability to schedule delivery of regular reports. |
Scheduled reporting is a staple for enterprise risk reporting. | |
Export to multiple formats Ability to export reports (PDF, Excel, HTML, CSV). |
The system supports exports to PDF, Excel, and other formats. | |
Data visualization tools Offers graphs, heatmaps, and advanced visualization features. |
Numerous visualization and reporting tools are advertised. | |
Ad-hoc reporting Users can create custom reports without coding. |
Ad-hoc/custom reporting supported as stated in the documentation. | |
Automated distribution System can automatically distribute reports to stakeholders. |
Automatic distribution to stakeholders is standard for enterprise reporting. | |
Drill-down capabilities Users can drill down into data for detailed analysis. |
Drill-down analytics features present per product literature. | |
Interactive visualization speed Average response time for rendering custom dashboard views. |
No information available | |
Concurrent users supported for reports Maximum number of users that can access reports simultaneously. |
No information available |
Role-based access control Assigns data and function permissions by user roles. |
Role-based access and granular data permissions are explicitly stated. | |
Single Sign-On (SSO) Integrates with corporate identity providers for access. |
Integration with corporate identity providers (including SSO) is typical in enterprise environments and mentioned on SS&C’s technical pages. | |
Multi-factor authentication Enforces additional security checks for user logins. |
Multi-factor authentication supported per solution’s security capabilities. | |
Data encryption (in transit and at rest) Encrypts sensitive data during transfer and storage. |
SS&C’s compliance offerings specify encryption at rest/in transit. | |
Comprehensive audit logging Maintains detailed logs for all data access and changes. |
Comprehensive audit logging is mentioned as a regulatory compliance feature. | |
User provisioning and de-provisioning Automates the onboarding and offboarding of users. |
Automated provisioning/de-provisioning described in user management documentation. | |
Granular permission settings Fine-tuned data and function-level access configuration. |
Granular permission settings described in platform customization options. | |
Data masking and anonymization Masks sensitive data fields for select users or roles. |
Data masking for sensitive fields is often required for compliance and is part of security suite. | |
Incident & breach detection Monitors and alerts on potential security incidents. |
Breach and incident detection is specified in security solution features. | |
Maximum concurrent user sessions Maximum user sessions that are allowed simultaneously. |
No information available |
Custom workflow builder Visually design and automate multi-step processes. |
Workflow builder tools visualized in SS&C product brochures. | |
Automated task assignment Routes tasks to responsible users based on defined criteria. |
Automated task assignment is a described workflow automation solution. | |
Approval tracking Tracks approvals, signatures, and acknowledgments digitally. |
Approval and sign-off tracking capabilities detailed in documentation. | |
Notification and escalation rules Automated alerts and escalation when timelines are missed. |
Notification/escalation features described as part of compliance workflow. | |
Exception management Tracks and manages process exceptions and their resolutions. |
Exception/incident management are mentioned in processes and workflow support. | |
Integration with communication tools Integrates with email, chat, or ticketing for notifications. |
Platform mentions integration with email and notification systems. | |
SLA tracking Measures and reports service-level agreement adherence. |
No information available | |
Parallel processing of workflows Supports simultaneous execution of multiple workflows. |
No information available | |
Number of customizable workflows Maximum number of custom workflows supported. |
No information available | |
Workflow execution speed Average time to execute a typical workflow. |
No information available |
Comprehensive activity logs Captures all system and user activities for review. |
Comprehensive activity logging is described for compliance and audit. | |
Automated exception logging Automatically records exceptions and unusual events. |
Exception event logging is described in monitoring solutions. | |
Change management tracking Monitors changes to data, rules, and configurations. |
Change management for configuration, data and rules is standard in audit. | |
Periodic review scheduler Automates scheduling and reminders for audits and reviews. |
Review scheduler capabilities are mentioned for audit planning. | |
Forensics and drill-back tools Allows detailed reconstruction and investigation of events. |
Drill-back investigation tools are described in compliance review features. | |
Automated controls testing Regularly tests control effectiveness and documents results. |
Automated controls testing for compliance effectiveness is a included feature. | |
Exception alerting Notifies users of irregular events or failed checks. |
Exception alerting is described in compliance documentation. | |
Audit report generation Automatically compiles and formats audit-ready reports. |
Audit report generation capability referenced in audit documentation. | |
Retention period for logs Duration for which audit logs are retained in the system. |
No information available | |
Concurrent audit users supported Maximum number of auditors that can work simultaneously. |
No information available |
Horizontal scalability Easily scales out via additional computing resources. |
SS&C discusses scalable, distributed architecture designed to scale horizontally. | |
Load balancing Distributes system load across multiple servers or nodes. |
Load balancing is listed under enterprise infrastructure features. | |
Cloud-native architecture Designed for scalable cloud or hybrid deployments. |
Supports public cloud and hybrid deployments (cloud-native design). | |
High-availability configuration Supports failover and redundancy for resilience. |
High availability (resilience/redundancy) is marketed to institutional clients. | |
Disaster recovery options Provides built-in DR and data backup capabilities. |
Disaster recovery options and robust DR support are detailed in compliance and IT pages. | |
Concurrent users supported Maximum simultaneous users during peak usage. |
No information available | |
Data throughput capacity Maximum volume of data processed per second. |
No information available | |
Uptime SLA Guaranteed platform availability over time. |
No information available | |
Average page load time Typical time for loading key dashboards or modules. |
No information available | |
Processing capacity per fund Number of funds/entities supported without degradation. |
No information available |
Intuitive user interface Interface is easy to navigate and learn. |
Product claims intuitive and user-friendly interface in marketing collateral. | |
Mobile access Accessible on smartphones and tablets. |
Mobile/tablet web UI support is described in user experience features. | |
Contextual help Built-in help, tooltips, and guided tours. |
Contextual help and guided tours are referenced for onboarding. | |
Personalized homepages Users can set and modify their landing screens. |
Personalized homepages configurable for roles and users. | |
Internationalization/localization Supports multiple languages and regional formats. |
Internationalization/local support for language/regional formats is advertised. | |
Accessibility features Compliant with accessibility standards (e.g., WCAG). |
Claims WCAG 2.0 accessibility support per latest release notes. | |
Custom notifications Users can configure notification settings. |
Users can customize how/when they’re notified. | |
Keyboard and voice navigation Supports keyboard shortcuts and/or voice commands. |
No information available | |
Average number of clicks to complete workflow Measures usability and process optimization. |
No information available | |
Time to proficiency Average time required for new users to become proficient. |
No information available |
24/7 technical support Vendor offers around-the-clock support services. |
24/7 support is a standard for enterprise clients and is offered by SS&C. | |
Dedicated account manager Customers are assigned a specific contact from the vendor. |
Enterprise contracts include a dedicated account manager. | |
Proactive system monitoring Vendor monitors health and performance of client deployments. |
Proactive monitoring of client deployments included in services. | |
Automatic software updates Platform receives regular, automatic patching and feature updates. |
Automatic updates (feature and patching) described in cloud architecture. | |
Comprehensive documentation Up-to-date guides for administration, user, and integration support. |
Comprehensive, up-to-date documentation referenced for clients. | |
User community and forums Access to community knowledge and peer support. |
User forums and peer support are available for major clients. | |
Onboarding/training services Vendor offers user onboarding and ongoing training options. |
Onboarding and live training options are available. | |
Service Level Agreement (SLA) metrics Key metrics defined in the support contract. |
SLAs with platform metrics provided in client contracts. | |
Average issue resolution time Mean time to resolve client-reported production issues. |
No information available | |
Frequency of major platform updates How often major feature or version updates are released. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.