Wealth management solutions provider, Advisor Software (ASI) has teamed up with Orion Advisor Services (Orion) to integrate the two companies’ financial advisor software applications....  more>>
Friday, February 7, 2014
INDATA, industry provider of SaaS (Software as a Service) launches iPM Epic— Intelligent Portfolio Management, the industry’s first investment technology platform designed exclusively for the ...  more>>
Friday, February 7, 2014
Security solutions vendor BeyondTrust comes up with new IT risk management platform that integrates two security methodologies: privileged account management and vulnerability management, to assist Managed Services Providers ...  more>>
Wednesday, February 12, 2014
FolioDynamix, a provider of web-based technology, content and services for managing the full investment and wealth advisory lifecycle, ...  more>>
Tuesday, February 18, 2014
RAGE Frameworks, a provider of technology enabled solutions and services, released a white paper on real time Credit Risk monitoring, assessing global events for risk ...  more>>
Monday, March 10, 2014
Majority of the executives from investments management firms agree that Investment Book of Record is important to have an on-demand access to portfolio ...  more>>
Friday, March 14, 2014
Bonaire, provider of software solutions for asset managers, mutual funds and capital market firms announced that its revenue and expense management solution has been selected by The ...  more>>
Tuesday, March 11, 2014
nvestment Management Company TCW group selects revenue and expense management solution by a Broadridge financial solution company, Bonaire for automating and streamlining its institutional fee billing. Bonaire ...  more>>
Wednesday, March 12, 2014
Broadridge’s Access Data, provider of data and reporting solutions to financial companies has announced an agreement with Pension Data Resources (PensionPlanet.com) that caters ...  more>>
Thursday, March 13, 2014
In capital markets, information is as much a currency as money is. Yet this fact is not reflected in how we protect sensitive data or IT-enabled conversations. Why is this? ...  more>>
Tuesday, March 25, 2014
<<Previous  1   2   4   5   6   Next>>