HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Provides enterprise-level counterparty exposure management, real-time credit risk analytics, automated workflows, collateral, and limit monitoring capabilities in corporate treasury.
More about Calypso Technology (Adenza)
Systems that evaluate and monitor credit risk of financial counterparties, setting and tracking exposure limits and providing early warning indicators.
More Counterparty Risk Assessment Tools
More Risk Management ...
ERP Integration Ability to connect with enterprise resource planning systems for enrichment with transactional and master data. |
Calypso integrates with ERP systems, as indicated by its support for enterprise data and enrichment with transactional/master data per product documentation. | |
Bank Connectivity Direct integration with multiple banking platforms to fetch real-time account and transaction data. |
The product provides connectivity to multiple banking platforms for cash and risk analytics. | |
Market Data Feeds Automated import of live or historical market data (credit spreads, ratings, CDS, etc.) from external providers. |
Supports live and historical market data feeds, as treasury risk models require market data (credit spreads, ratings, CDS, etc.). | |
File Import Capability Import of data from CSV, Excel, XML, or other formats for manual updates or data migration. |
Manual import of CSV, Excel and other formats is common per Adenza documentation for data migration. | |
APIs for Custom Data Sources REST or SOAP API endpoints to connect to proprietary or bespoke data sources. |
REST and SOAP APIs available for integration, a stated feature in Adenza's Calypso integration guides. | |
Automated Data Refresh Rate Frequency with which external and internal sources update within the system. |
No information available | |
Data Mapping and Transformation Tools Ability to reconcile and standardize data from diverse formats and structures. |
Product provides mapping tools for onboarding/enriching external and internal data, a core part of its integration layer. |
Credit Exposure Calculation Calculates current and potential future exposures for individual and aggregated counterparties. |
Current and potential future counterparty exposures are core risk outputs. | |
Probability of Default (PD) Incorporation or calculation of PD based on internal or third-party methodologies. |
Probability of Default (PD) is included in credit analytics and risk models documented for Calypso Treasury Risk. | |
Loss Given Default (LGD) Determination of expected loss if a counterparty defaults. |
Calculation of Loss Given Default (LGD) is described in the credit risk module overviews. | |
Expected Exposure (EE) Modeling Computation of expected exposure profiles over different time horizons. |
Expected Exposure (EE) modeling is included as a standard risk analytics feature. | |
Wrong-Way Risk Analysis Identification of risk scenarios where exposure increases as counterparty credit quality deteriorates. |
Wrong-way risk analysis is explicitly mentioned in advanced risk scenario analysis in product brochures. | |
Concentration Risk Measurement Assessment of risk exposure based on industry, geography, or other dimensions. |
Concentration risk calculation by sector, geography, and entity is a supported metric for limit and exposure reporting. | |
Stress Testing and Scenario Analysis Ability to simulate the impact of adverse events or macroeconomic shocks on counterparty risk metrics. |
Provides stress testing and scenario analysis tools tailored to counterparty risk. | |
Custom Risk Modeling Configuration or development of bespoke risk factor models. |
Bespoke/custom risk model configuration is a key differentiator in Calypso’s risk platform. | |
Monte Carlo Simulation Support Utilization of Monte Carlo simulations for assessing potential exposures. |
Monte Carlo simulation is used for exposure, credit, and collateral scenarios. | |
Time to Compute Exposure Metrics Average system time to recalculate exposure metrics after new data ingestion. |
No information available |
Dashboard for Risk Overview Real-time visual dashboards summarizing exposure, risk concentrations, and breaches. |
Dashboards with real-time visualizations are a standard part of Calypso risk monitoring. | |
Customizable Alert Rules User-defined thresholds for financial, market, or credit events triggering alerts. |
Customizable alerting for thresholds and breach monitoring is a promoted feature. | |
Automated Email/SMS Notifications Immediate notification to stakeholders on risk limit breaches or significant events. |
Automated notifications by email and (optionally) SMS for breaches and workflow events. | |
Intraday Risk Updates Frequency at which the risk status is refreshed and checked for exceptions. |
No information available | |
Severity-based Escalation Workflow Escalation paths for critical alerts based on event severity. |
No information available | |
Historical Alert Log Maintains a time-stamped archive of all generated alerts and events. |
Historical alert/event archiving included in Calypso’s compliance and monitoring suite. | |
Mobile App Access Availability of monitoring and alert features via a secure mobile app. |
Mobile web and app access for monitoring and approval workflows is supported per Adenza’s product sheets. |
Limit Assignment and Approval Workflow Configurable process for setting, reviewing, and approving credit limits by hierarchy. |
Limit assignment and approval, including workflows and hierarchies, described in product documentation. | |
Real-Time Limit Utilization Tracking Immediate monitoring of available, used, and breached limits. |
Real-time tracking of limit utilization/breaches is a key real-time control. | |
Automatic Limit Recalculation Adjustment capabilities based on changing exposures or market conditions. |
Automatic recalculation of limits in response to exposures and events part of the engine. | |
Limit Breach Controls Blocking or warning mechanisms for new transactions breaching set limits. |
Blocking/warning mechanisms for breach control described as workflow options. | |
Multi-Currency Limit Support Ability to handle and aggregate limits in different currencies. |
Multi-currency capabilities are explicitly supported, including FX conversion and aggregation. | |
Limit Usage Reporting Frequency The system's interval for updating and reporting on limit usage. |
No information available | |
Historical Limit Utilization Record Archival of credit limit changes and utilizations for audit purposes. |
Historical limit data is archived for audit and review purposes. | |
Bulk Limit Update Capability Ability to update limits for multiple counterparties by batch processes. |
Bulk update of limits is supported through batch processes, including via the UI and import tools. |
Digital Onboarding Workflow Guided input and approval steps for adding new counterparties. |
Workflow for digital onboarding of new counterparties is described in module capabilities. | |
Automated KYC/AML Screening Screening processes for regulatory compliance checks during onboarding and review. |
Automated onboarding KYC/AML functionality is provided and referenced in solution overviews. | |
Document Management Secure collection and storage of counterparty documentation (contracts, risk assessments, financials, etc.). |
Document management (secure storage and audit) is highlighted for onboarding and compliance. | |
Periodic Review Scheduling Automated reminders and workflows for scheduled risk assessment reviews. |
Automated review scheduling for periodic credit/risk reviews is available. | |
Custom Data Fields Ability to add unique data attributes specific to corporate policy needs. |
System supports custom data attributes for counterparties and risk objects. | |
Bulk Data Maintenance Ability to update, merge, and clean large counterparty databases efficiently. |
Bulk update and maintenance tools described for large-scale data operations. | |
Audit Trail for Counterparty Changes Comprehensive logs of all updates, reviews, and approvals for each counterparty. |
Comprehensive audit trails for all counterparty changes are a compliance feature. |
Pre-built Risk Reports Library of standard regulatory, credit, and management reports. |
Standard, regulatory, and management risk reports are included. | |
Custom Report Builder Flexible tools that allow users to select fields, metrics, and filters for custom output. |
Custom report builder and analytics design tools are part of the reporting module. | |
Interactive Visualization Tools Dashboards, heatmaps, and graphical analytics of exposure and risk. |
Interactive dashboards, visualisation, and drilldown are featured and demoed regularly. | |
Scheduled Report Distribution Automated delivery of reports to designated recipients at set intervals. |
Scheduling and automated report distribution are available within reporting workflows. | |
Export to File Formats Support for exporting reports to Excel, PDF, CSV, and other formats. |
Exports to Excel, PDF, CSV, and other formats are advertised in feature documents. | |
Ad Hoc Query Response Time Average time to process user-defined report queries. |
No information available | |
Drill-down Capabilities Ability to view detailed transactional or entity-level data from summary reports. |
Drill-down to transaction/entity level possible from dashboards and reports. |
Role-Based Access Controls (RBAC) Assignment of permissions based on job roles, ensuring users only access required data and functions. |
RBAC with role-based permissions and restriction is a standard enterprise security feature. | |
Single Sign-On (SSO) Integration with enterprise identity management for seamless authentication. |
Single Sign-On support is included and integrates with common IDaaS. | |
Granular Permission Settings Ability to segregate duties (view, edit, approve, etc.) at a field, report, or transaction level. |
Permissions configuration can be set at fine-grained levels according to documentation. | |
User Activity Logging Detailed tracking of user actions within the system for audit and security. |
User activity/event logging with auditability is mandatory for regulated users and implemented in Calypso. | |
Concurrent User Sessions Supported Number of simultaneous logged-in users supported by the system. |
No information available | |
Two-Factor Authentication (2FA) Security measure requiring a secondary validation method for access. |
Two-factor / multi-factor authentication is supported and recommended for access. |
Regulatory Reporting Templates Provision of regulatory-compliant templates (e.g., EMIR, Dodd-Frank). |
Regulatory reporting templates for EMIR, Dodd-Frank, etc., are included in risk and compliance modules. | |
Audit Trail Capabilities Extensive, immutable logs to support regulatory and internal audits. |
Audit trail capabilities are a mandatory feature for regulatory compliance. | |
Policy Enforcement Engine Configurable enforcement of internal risk and compliance rules. |
Policy enforcement (risk/compliance) rules can be configured through business logic manager. | |
Documented Validation Processes In-system workflows and logs for required risk assessment validation. |
Validation workflow and logging for risk assessment is available. | |
Regulatory Change Notification Alerts and updates on relevant regulatory changes impacting counterparty risk. |
Regulatory change notifications are often provided, but may require additional regulatory update service subscription. | |
Retention Period Configuration Ability to set and manage data retention per jurisdictional requirements. |
Retention periods for data can be configured for jurisdictional compliance. |
System Uptime SLA Guaranteed percentage uptime as per service level agreement. |
No information available | |
Maximum Supported Counterparties System's capacity for managing distinct counterparty entities. |
No information available | |
Peak Transaction Throughput Maximum rate at which transactions can be processed. |
No information available | |
Data Storage Scalability Ability to scale data storage seamlessly as volume grows. |
Platform is designed for cloud or on-prem elastic scaling; data storage (DB, big data lakes) auto-scale. | |
Disaster Recovery RTO Recovery Time Objective in the event of system downtime. |
No information available | |
Latency of Core Operations Typical end-to-end time for risk calculations or limit checks. |
No information available |
Implementation Time Average rollout duration from contract to live operation. |
No information available | |
Dedicated Customer Support Access to specialized support teams for issue resolution and inquiries. |
Calypso support includes dedicated technical/customer support teams. | |
Online Help Resources Documentation, FAQs, and how-to guides accessible digitally. |
Comprehensive online help resources documented on the vendor’s site and user portals. | |
Training Programs Provision of onboarding and advanced skills courses for users. |
Product training offerings are available for onboarding and advanced usage. | |
Software Upgrade Frequency Typical frequency for minor and major product enhancements. |
No information available | |
Customization Services Availability of vendor-driven customization to meet bespoke needs. |
Vendor-driven customization (bespoke configuration/build) is available. | |
Community and User Forums Channels for user-to-user knowledge sharing and best practices. |
User forums, knowledge sharing, and community resources are part of the Calypso ecosystem. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.