Sage vs Northern Trust Family Office Technology
You are looking for alternatives to Sage. Here you can compare the best Investment Management Software and other family office technologies based on our annual benchmark and comparison surveys.

Sage Intacct
Category
Accounting
Sage Intacct is a cloud-based accounting and financial management software invested in meeting the needs of financial professionals focused on customer success. Customers ranging from startups to public companies and family offices rely on Sage Intacct’s best-in-class cloud ERP software to deliver the efficiencies and insights that keep them on the fast track of growth, from their first million to their first billion.
Read more
Northern Trust Family Office Technology
Category
Consolidated Reporting
Northern Trust is a global financial institution that provides asset servicing, investment management and wealth management services for institutions, high-net-worth individuals and families or their family offices.
Read moreCompany
100-500 (in GFO’s division)
$6.1 billion ($286.3 million – GFO’s trust fees)
- 1889
-
- United States of America
- Chicago
- London
- Guernsey
- Luxembourg
- Abu Dhabi
-
- $114 billion (Northern Trust’s GFO)
$900 million (median $350 million)
Client
- Single-family offices
- Individual wealth owners
- Approx. 500 GFO clients
Product
- Consolidated reporting
- Portfolio management
- Accounting
- Governance
- Compliance
- Trading
- Data aggregation
- Risk management
- Impact/ESG reporting
- Holistic, aggregated single source of data
- Automated cash & trade transaction tools
- Comprehensive user report library
- Ad-hoc custom reporting
- Easily-accessible mobile platform
- Dedicated client service team
- Integrated partnership accounting & general ledger
- Security & integrity of your data
- All marketable and non-marketable assets
- Bankable assets
- Private equity
- Real estate
- Rare collectibles (e.g. luxury cars, boats, high-value jewellery)
- MiFID II
- GDPR
- AIFMD
- UCITS
- Yes
Technology
- Serviced software
- Multi-factor authentication
- Anti-fraud programs & IT security team
- Three-tiered network architecture with redundant firewalls and DMZ layer
- Network intrusion detections systems.
- Regular network- and application-level penetration tests
- Anti-virus practices at network, app and database levels
- Several limits to employees’ ability to see and manage client data
- Dedicated fraud prevention and investigations unit
- Linux
- Java
- We interact with a variety of external vended software and send data (once authorized by the client) daily. Existing connectivity can be confirmed on request.
- Yes