Asset Vantage vs Northern Trust Family Office Technology
You are looking for alternatives to Asset Vantage. Here you can compare the best Investment Management Software and other family office technologies based on our annual benchmark and comparison surveys.
Category
Based in the USA, Asset Vantage offers an intelligent technology platform leveraging integrated performance reporting and general ledger technology. Providing a consolidated view of the family office's entire net worth, Asset Vantage is a tool for single family offices, multi family offices and CPA firms to gain a holistic view of financial health.
Read more
Northern Trust Family Office Technology
Category
Consolidated Reporting
Northern Trust is a global financial institution that provides asset servicing, investment management and wealth management services for institutions, high-net-worth individuals and families or their family offices.
Read moreCompany
100-500 (in GFO’s division)
$6.1 billion ($286.3 million – GFO’s trust fees)
- 1889
-
- United States of America
- Chicago
- London
- Guernsey
- Luxembourg
- Abu Dhabi
-
- $114 billion (Northern Trust’s GFO)
$900 million (median $350 million)
Client
- Single-family offices
- Individual wealth owners
- Approx. 500 GFO clients
Product
- Consolidated reporting
- Portfolio management
- Accounting
- Governance
- Compliance
- Trading
- Data aggregation
- Risk management
- Impact/ESG reporting
- Holistic, aggregated single source of data
- Automated cash & trade transaction tools
- Comprehensive user report library
- Ad-hoc custom reporting
- Easily-accessible mobile platform
- Dedicated client service team
- Integrated partnership accounting & general ledger
- Security & integrity of your data
- All marketable and non-marketable assets
- Bankable assets
- Private equity
- Real estate
- Rare collectibles (e.g. luxury cars, boats, high-value jewellery)
- MiFID II
- GDPR
- AIFMD
- UCITS
- Yes
Technology
- Serviced software
- Multi-factor authentication
- Anti-fraud programs & IT security team
- Three-tiered network architecture with redundant firewalls and DMZ layer
- Network intrusion detections systems.
- Regular network- and application-level penetration tests
- Anti-virus practices at network, app and database levels
- Several limits to employees’ ability to see and manage client data
- Dedicated fraud prevention and investigations unit
- Linux
- Java
- We interact with a variety of external vended software and send data (once authorized by the client) daily. Existing connectivity can be confirmed on request.
- Yes