A diversified US financial services company, providing services for financial planning, wealth management, asset management, insurance, annuities, and estate planning, had acquired the fixed income and equity businesses of another organization. Both the acquiring and acquired businesses had invested in updated data management systems and processes, but the buyer felt the systems needed to be enhanced and integrated to support the requirements of the combined organization.
The firm asked Cutter Associates for help developing a plan to integrate the separate data management environments of the two organizations, including help designing a target environment and drawing a high-level roadmap for implementation.
Client Type: US Financial Services Company
Assets Under Management: Over USD 130 billion
Location: North America
After reviewing the initial Point of Arrival (POA) architecture for the combined environment proposed by the firm’s application architect, we proceeded to do the following:
Functional areas within the project scope included the following:
With our help over just three months, our client had in hand a target state data architecture for the combined entity, and a detailed implementation plan including a timeline, resources, and costs to move from the current state to the target state. To ensure that the combined organization achieved a seamless, robust, long term data management solution, the firm subsequently asked us to help them with the initial implementation of the recommendations, which included the following activities:
CutterResearch reports are the proprietary property of Cutter Associates and our members who have entered into confidentiality agreements. They contain information that is proprietary and confidential to Cutter as well as to the vendors discussed within the reports (the "Vendors"). Disclosure of the information contained in the reports could cause irreparable harm to Cutter and/or the Vendors.
By selecting "I Agree" below, you agree to safeguard this information with the same care as your firm affords its own confidential information. You will not provide access to this information to anyone who is not an employee of your firm and will not distribute this information outside your firm. Furthermore, you will not provide access to this information to any employee of any subsidiary, unit, department or division of your firm that is engaged in any aspect of the software business involving third parties, including, without limitation, selling or otherwise providing software to third parties, assisting third parties in the selection or implementation of software, or providing investment related software information to third parties (collectively, the "Prohibited Recipients").