The Reference Data Center allows you to composite, validate, and cleanse security reference data from external vendors and internal sources, creating one or more "gold copies" that downstream systems can leverage.
Info |
---|
There are multiple validation checks throughout the workflow. For example, the system can optionally validate the vendor data, the enrichments to the gold copy security, and the gold copy security information. You can also perform validations when you create a new security in the Reference Data Center UI. |
The workflow consists of the following steps:
Load the security reference data
Validate the vendor data (optional)
Create the gold copy security record
Enrich the gold copy security record (optional)
Validate the gold copy security record (optional)
Resolve the exceptions
Release the gold copy security record
Distribute the gold copy security record
A description of each step in the workflow follows.
...
The security reference data is loaded from external vendors and internal systems into the SECURITY database tables in the Eagle data warehouse, creating a centralized data repository. This includes the following data:
Securities
Analytics
Ratings
Variables rates
Prepayment time series
Underlying securities
Vendor History (view only)
You can also load, view, and edit the following related security detail information, without compositing, validation, and enrichment:
Corporate actions
Call and Put schedules
Factors
Third Party cash flows
Anchor | ||||
---|---|---|---|---|
|
...