© 2007 Northern Trust Corporation northerntrust.com The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Nirup Krishnamurthy Chief Technology.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Misys Treasury & Capital Markets
Company Philosophy Desktop Solutions for the New Age of Banking Internet and intranet desktop solutions that simplify and streamline trust management.
Association Management System Norman Campbell Director, Information Systems.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
| Copyright © 2012 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions,
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
E-banking.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Ajay Joshi. Function  Simple opening screen with large icons for each ‘grouping’ (Efficient)  Opens through a web browser (Efficient)  First time you.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Commercial Bank. Company background The biggest commercial bank in the world The first financial services company in the U.S. Have branches in more than.
“Electronic Payment System”
At STEM we have a passion for a controlled business environment, and continue to explore workable and innovative solutions in order to simplify business.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Northern Trust Corporation northerntrust.com The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Greg Yaeger Senior Vice President.
The Internetworked E-Business Enterprise
MD-EXPERT Designed with doctors for doctors. One solution for multiple platforms
MD-EXPERT Medical Practice Management System. Product Overview Primary markets Family Practice Internal medicine General Practitioner Small to mid-size.
SUBTITLE TEXT. Optimal Solutions What is E- Business Suite Oracle E-Business Suite is the most comprehensive suite of integrated, global business applications.
 It is an integrated investment and financial management solution which enables portfolio management and investment and financial accounting for single.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
Chapter 9: Novell NetWare
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
RiT ’ s Dashboard. An intuitive graphical online management tool with unique personalization capabilities enabling managers to flexibly and proactively.
The EWMS Insurance Administration System. 9/24/2015POWERING TOTAL FINANCIAL MANAGEMENT2 Agenda Total Financial Management & Insurance The EWMS Insurance.
2005Harbinger TechAxes PVT. LTD. TechAxes Services TechAxes Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Module 6 Planning and Deploying Messaging Security.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Enterprise Reporting Solution
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Actuate Corporation © 2007 Next-Generation Online Client Reporting Capabilities Rich Internet Reporting for Online Financial Management.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Grow your business... Protect their investment. Property Technologies International, LLC Presentation of PTI’s suite of web-based applications for real.
© 2008 Northern Trust Corporation northerntrust.com The Northern Trust Experience FOCUSING ON WHAT REALLY MATTERS Southeast Region Louise F. Dill Managing.
Has Agent Scripting Got You FRUSTRATED?. Agent Scripting Simplified!
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Finance SCOOP Indiana University September 16, 2003.
FFIEC Cyber Security Assessment Tool
Providing intelligent maintenance solutions for intelligent aircraft.
Introducing the New iManage Dan Carmel, Chief Marketing Officer.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
Copyright © Sumantra Tech Services Pvt. Ltd. All Rights Reserved. PE Front Office Solution.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Welcome to our Presentation on ORACLE Flexcube & Bank Asia- Banking Technology.
Using Microsoft Azure, Crowdnetic Launches Innovative Lending Gateway Platform That Connects Borrowers to Alternative Lenders MICROSOFT AZURE SOLUTION.
Personal Finance Portfolio Management App for Better ROI and Control As portfolios become more diverse, they naturally become more complex. This increased.
Contact Center Security Strategies
Global One Communications
Web portals-B2B-B2C-B2E TRAVELOPRO
Presentation transcript:

© 2007 Northern Trust Corporation northerntrust.com The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Nirup Krishnamurthy Chief Technology Officer September 11, 2007 Migration of Technology Innovations from the Institutional to Personal Market

2 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Agenda Northern Trust’s Technology Foundation Evolution of Institutional Products & Services for Personal Clients Next Generation Personal Products and Services Security and Privacy – Always a Priority

3 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Sustaining our Foundation – Building for the Future The mission of Worldwide Operations & Technology is to enhance Northern Trust’s personal and institutional businesses by creating, delivering and supporting innovative products and services that anticipate and meet client needs and improve relationships through unrivalled client service, increased productivity and greater operational efficiency. Integrated World-Class Operations & Technology Platform Personal Financial Services Corporate & Institutional Clients Asset Servicing Asset Management One log-on ID One password Earliest point of integration One delivery system Accuracy of output

4 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Corporate & Institutional Services (C&IS) Reporting Analytics Advisory Transactional Custody Securities Lending Foreign Exchange Retirement Treasury Management FOR Single Platform C&IS Capabilities Northern Trust Passport ® Online Information Delivery Platform for Northern Trust’s Corporate & Institutional Clients

5 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Personal Financial Services (PFS) Banking Bill Payment Trust Investment Management Mutual Funds Brokerage Accounts Advanced Data Aggregation & Reporting Net Worth & Performance Measurement Seamless Integration of Alternative Asset Servicing: Cash Flow Processing, Transaction Activity Audits, Valuation Status and Detailed reporting Wealth Passport TM Industry Leading Web-Based Platform for Family Members, Family Offices and Advisors Private Passport SM Online Financial Services for Northern Trust’s Personal Financial Services Clients

6 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Leveraging Business Technology for Personal Clients Three-Tiered Open Application Architecture Performance and Analytics Calculation – Single Engine across All Clients Reporting Infrastructure Enables Consolidation and Customization Institutional Capabilities Benefiting the Personal Client Technology solutions for Corporate & Institutional clients benefit Northern Trust’s Personal clients through an open architecture system and our continual investment in application development and systems enhancement.

7 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Open System Architecture Processing Layer  Software & hardware solutions implemented rapidly  Integrity and consistency of data  Interactive communication confirms transaction accuracy  Integrated multi-currency accounting Intelligent Network  Single repository of data  Worldwide access to inbound and outbound transaction information  Data consolidated regardless of unique processing and timing needs demanded by various markets and financial institutions. Customized Reporting  Array of reports from which to select  Filters enable customization with grouping & sorting functionality  Previewing and saving features Three-Tiered Open Architecture Benefits Empowering Clients Worldwide

8 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Net Worth Summary for Personal Clients & Families Single Source of Performance Data Fully Customizable by User Multiple Net Worth Summaries Allowed Graphical Representation of Portfolio of Assets Multiple Rate of Return Displays Leveraging Northern Trust’s Global Performance, Analytics & Calculation Engine The same engine that does the work for Corporations & Institutions… …goes to work for Northern Trust’s Personal clients.

9 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Net Worth Summary Collapsed

10 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Net Worth Summary Expanded

11 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Consolidated Statements for PFS Clients Benefits of Consolidation  Clients with several accounts receive consolidated statement package in one envelope  Full versions of individual statements included in consolidated package  Enables client, advisors and Northern Trust’s Relationship Manager to monitor and evaluate performance against objectives Enhanced information  Total Asset Allocation  Accrued Income  Value Over Time  Net Contributions / Withdrawals Leveraging Northern Trust’s Reporting Infrastructure & Tools

12 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Consolidated Statements and Reports Enabling Clients To Focus On What Really Matters Consolidated Account Statement Performance Report

13 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Passport of the Future Any Time / Any Place  Hawaii or Istanbul, Blackberry or Laptop, Central Time or Asia Pacific User-Defined Experience  Customize the look and feel  Serve up what they ask for Intuitive Navigation  No experience required  Short learning curve  Shortcut links – limited steps to get to what matters most

14 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Passport of the Future Holistic portfolio view of client’s Northern Trust held and held- away assets and liabilities, with graphical display option Ability to create and customize personal financial dashboards Robust search capabilities with secure file cabinet Enhanced alerts capability, including secure on-line send & receive ability Personal Account Management – central location, viewed through one browser Third Party viewing option available (e.g. attorney, accountant) Consolidated view of all account activity (Northern Trust and external) Research & News – fully customizable, interactive content Planning & Advice: Estate, Financial Planning, Retirement, Tax, Philanthropy and Education Leading Edge Functionality for Clients Who Know What They Want

15 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Security – Always a Priority Strong External Perimeter  Firewalls  Intrusion Detection Sensors  24 x 365 Real-Time Incident Monitoring Sophisticated Virus Protection to Prevent Trojan Attacks  6 + Layers of Protection, Multiple Vendors  Automated Real-time update of Virus configuration files Transmission of Sensitive Information is Encrypted  Web Encryption using SSL Protocol  Data Feeds Encrypted  Encryption using S/MIME  Northern Trust Laptops Encrypted – data theft protected Northern Trust Layered Security Model

16 The Northern Experience A C C E S S. E X P E R T I S E. S E R V I C E. Privacy – Always a Priority Anti-Phishing Service  24 x 365 Managed Service  Monitors Global Internet Traffic and s for attacks against Northern Trust  Shuts down Phishing sites within hours Multi-Factor Authentication, FFIEC Compliant  Verisign Fraud Detection  Enrolls clients with 8 personal questions  Prompts client for answers to questions when suspect login is attempted  Token authentication for transaction systems Northern Trust Fraud Detection Technology