Insight through relevant research and measurement
LEARN MOREStrategy through cutting-edge consulting
LEARN MOREExecution through seamless implementation
LEARN MOREYour Challenges.
Our Solutions.
Realize the benefits of membership
LEARN MOREUnrivaled buy-side expertise
LEARN MORELatest events featured research on IBOR, Data Access for Business Users, and Managing Operating Costs.
Read MoreTrue costs go far beyond licensing fees.
Read MoreFirm relocates headquarters to Hingham, MA.
Read MoreClient demands are changing the ownership, frequency and delivery of client reports. Both Investment Managers and software vendors are recognizing the need for solutions.
Read MoreRich brings a wealth of experience to Cutter Associates and has already been instrumental in leading a number of projects for the firm.
Read MoreTom Sitter joins the team.
Read MoreManual processes and increased risk cited as driving factors.
Read MoreAs the volume of research created by investment firms increases, firms are taking steps to implement tools to ensure that the data is organized, accessible, and reliable.
Read MoreTom Phipps, Cutter Associates' Principal, talks to the Journal of Applied IT and Investment Management about best practices for processing derivatives and alternatives investments and the risks of staying on legacy systems.
Read MoreThe event provided an independent forum for investment technology and operations professionals to meet and discuss ways to improve efficiencies and optimize their use of BRS Aladdin.
Read MoreCutterResearch content is the proprietary property of Cutter Associates and our members who have entered into confidentiality agreements. It contains information that is proprietary and confidential to Cutter as well as to the vendors discussed within the reports (the "Vendors"). Disclosure of the information contained in the reports could cause irreparable harm to Cutter and/or the Vendors.
By selecting "I Agree" below, you agree to safeguard this information with the same care as your firm affords its own confidential information. You will not provide access to this information to anyone who is not an employee of your firm and will not distribute this information outside your firm. Furthermore, you will not provide access to this information to any employee of any subsidiary, unit, department or division of your firm that is engaged in any aspect of the software business involving third parties, including, without limitation, selling or otherwise providing software to third parties, assisting third parties in the selection or implementation of software, or providing investment related software information to third parties (collectively, the "Prohibited Recipients").