SlideShare a Scribd company logo
1 of 12
©2015 Cambridge Semantics Inc. All rights reserved.
Anzo Trade Forensics and Compliance
A Smart Data Solution
for Financial Services
Contact:
Ben Szekely
Vice President & Founding Engineer
Solutions & Pre-sales
ben@cambridgesemantics.com
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 2.
Trade Forensics and Compliance: Component Architecture
Anzo Enterprise
(Data cache, Ontologies, Mapping,
Rules)
Anzo Connect
(Live SQL
Connectivity)
Anzo on the Web: Customizable
Analytics, Rules, Queries & Graph
Visualization
Surveillance
Warehouses
Anzo
Unstructured
(Text Monitoring)
Financial news,
Emails, IMs,
Research
reports, Social
Media, Phone
records, Time &
Expense Records
Trading
Systems
Anzo for Microsoft Excel: Live Excel
reports, interactive real-time data cleansing
and on-boarding
Watch
Lists
Anzo Relational Replicator
Confidential
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 3.
Trade Forensics: Ingest structured data
Examples of structured sources
• Watch list – securities listed due to pending deals.
• Market Data – daily price movement and / or tick data.
• Trade blotters – transactions and positions
Molsen-Coors 12/26/2011 TAP Buy-side M&A Constellation Brands
Molsen-Coors 12/30/2011 TAP Open / High / Low / Close Prices
Molsen-Coors 12/28/2011 Equity BUY 123.3 5000 Grant Rice
Confidential
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 4.
Examples of unstructured sources
• New articles – articles mentioning traded securities or companies that
can help correlate market events to trading trends
• Email – Monitor employee communication for the passing of sensitive
information relevant to deals, research reports or other watch-list
activity
Trade Forensics: Ingest internal and external
unstructured, annotate and connect
Confidential
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 5.
• Trade
Security
IndividualWatch List
Research
Report
Expert
Conversation
Deal team
Trader,
Sales person
Equity
Fixed
Income
subclass
News
Article
Email
Message
Trade Forensics: Conceptual Data Model
Intuitive investigation and analytics across all data sources
Confidential
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 6.
1. Watch List Analysis
2. Employee Connections Analysis
3. Watch List Communications
4. Market Price Swings
5. Restricted List
6. Restricted List – Front-Running
7. Conflict of Interest
8. Over the Wall Communications
9. Employee Trading Reviews
10. Market Moving Corporate News
11. Timing of Trades to SEC filings
12. Expert Network Trade Surveillance
13. MNPI Outside the Organization
14. Employee Pre-Approval Surveillance
15. Employee Trading – Outside Account Review
16. Outside Business Activity / Private Securities Transactions
17. Internal Communications Pre-Clearance
18. Email Surveillance
19. External Research Report Pre-Clearance
20. Gifts and Entertainment Surveillance
21. Meetings with Public and Private Side Employees
Trade Forensics: Potential Dashboards
Confidential
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 7.
Flexible Ontology (Model) Management
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 8.
Excel-based mapping for loading data from structured
sources
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 9.
Configurable NLP Pipelines
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 10.
Configurable Investigative Dashboards
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 11.
Declarative Excel-based Rules
©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 12.
Discover and Explore Relationships

More Related Content

What's hot

Deep packet inspection and processing market ppt
Deep packet inspection and processing market  pptDeep packet inspection and processing market  ppt
Deep packet inspection and processing market pptDheerajPawar4
 
Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Capgemini
 
Big data analytics in payments
Big data analytics in payments Big data analytics in payments
Big data analytics in payments Ashish Anand
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking NetworksTigerGraph
 
P.A.ID Strategies - Introduction
P.A.ID Strategies - IntroductionP.A.ID Strategies - Introduction
P.A.ID Strategies - IntroductionJohn Devlin
 
Financial Text Analysis
Financial Text AnalysisFinancial Text Analysis
Financial Text AnalysisBytesview
 
Secure web gateway market ppt
Secure web gateway market pptSecure web gateway market ppt
Secure web gateway market pptDheerajPawar4
 
Dark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential BenefitsDark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential BenefitsPromptCloud
 
Deep Link Analytics Empowered by AI + Graph + Verticals
Deep Link Analytics Empowered by AI + Graph + VerticalsDeep Link Analytics Empowered by AI + Graph + Verticals
Deep Link Analytics Empowered by AI + Graph + VerticalsTigerGraph
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningTigerGraph
 
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasBig data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasProf Dr Mehmed ERDAS
 
Secure web gateway market vendors by size, share & growth strategies 20...
Secure web gateway market vendors by size, share & growth strategies   20...Secure web gateway market vendors by size, share & growth strategies   20...
Secure web gateway market vendors by size, share & growth strategies 20...DheerajPawar4
 
What Is Unstructured Data And Why Is It So Important To Businesses?
What Is Unstructured Data And Why Is It So Important To Businesses?What Is Unstructured Data And Why Is It So Important To Businesses?
What Is Unstructured Data And Why Is It So Important To Businesses?Bernard Marr
 
InsideView Clean Data
InsideView Clean DataInsideView Clean Data
InsideView Clean DataInsideView
 

What's hot (19)

Deep packet inspection and processing market ppt
Deep packet inspection and processing market  pptDeep packet inspection and processing market  ppt
Deep packet inspection and processing market ppt
 
Banking Big Data Analytics
Banking Big Data AnalyticsBanking Big Data Analytics
Banking Big Data Analytics
 
Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry Big Data Analytics in light of Financial Industry
Big Data Analytics in light of Financial Industry
 
Big data analytics in payments
Big data analytics in payments Big data analytics in payments
Big data analytics in payments
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking Networks
 
P.A.ID Strategies - Introduction
P.A.ID Strategies - IntroductionP.A.ID Strategies - Introduction
P.A.ID Strategies - Introduction
 
Financial Text Analysis
Financial Text AnalysisFinancial Text Analysis
Financial Text Analysis
 
Secure web gateway market ppt
Secure web gateway market pptSecure web gateway market ppt
Secure web gateway market ppt
 
Dark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential BenefitsDark Data Revelation and its Potential Benefits
Dark Data Revelation and its Potential Benefits
 
Deep Link Analytics Empowered by AI + Graph + Verticals
Deep Link Analytics Empowered by AI + Graph + VerticalsDeep Link Analytics Empowered by AI + Graph + Verticals
Deep Link Analytics Empowered by AI + Graph + Verticals
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
Graph Database
Graph Database  Graph Database
Graph Database
 
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasBig data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
 
CIO Published Article
CIO Published ArticleCIO Published Article
CIO Published Article
 
Secure web gateway market vendors by size, share & growth strategies 20...
Secure web gateway market vendors by size, share & growth strategies   20...Secure web gateway market vendors by size, share & growth strategies   20...
Secure web gateway market vendors by size, share & growth strategies 20...
 
Etiya White Paper_ABDR
Etiya White Paper_ABDREtiya White Paper_ABDR
Etiya White Paper_ABDR
 
Big Data
Big DataBig Data
Big Data
 
What Is Unstructured Data And Why Is It So Important To Businesses?
What Is Unstructured Data And Why Is It So Important To Businesses?What Is Unstructured Data And Why Is It So Important To Businesses?
What Is Unstructured Data And Why Is It So Important To Businesses?
 
InsideView Clean Data
InsideView Clean DataInsideView Clean Data
InsideView Clean Data
 

Viewers also liked

Real time trade surveillance in financial markets
Real time trade surveillance in financial marketsReal time trade surveillance in financial markets
Real time trade surveillance in financial marketsHortonworks
 
The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0Software AG
 
Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010GHY International
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
Risk and Issue Dashboard ver. 1
Risk and Issue Dashboard ver. 1Risk and Issue Dashboard ver. 1
Risk and Issue Dashboard ver. 1arvinronald
 
Kas Ir Bendijs
Kas Ir BendijsKas Ir Bendijs
Kas Ir BendijsBiaba
 
Videoconferencing[1]
Videoconferencing[1]Videoconferencing[1]
Videoconferencing[1]guest99dc9247
 
Contemporaries: Eleven Abstract Painters
Contemporaries: Eleven Abstract PaintersContemporaries: Eleven Abstract Painters
Contemporaries: Eleven Abstract PaintersRebecca Crowell
 
AIESEC HUST 09Fall 招新——人文学院
AIESEC HUST 09Fall 招新——人文学院AIESEC HUST 09Fall 招新——人文学院
AIESEC HUST 09Fall 招新——人文学院cscguochang
 
B2B Branding Explained
B2B Branding ExplainedB2B Branding Explained
B2B Branding ExplainedSabapathyn
 
Locovore
LocovoreLocovore
Locovoreklee4vp
 
Presentazione Tesi Specialistica
Presentazione Tesi SpecialisticaPresentazione Tesi Specialistica
Presentazione Tesi SpecialisticaGabriella Francia
 
Code Reviews - Vortrag für Innogames
Code Reviews - Vortrag für InnogamesCode Reviews - Vortrag für Innogames
Code Reviews - Vortrag für InnogamesFrank Sons
 
Senior Communicator Briefing.1
Senior Communicator Briefing.1Senior Communicator Briefing.1
Senior Communicator Briefing.1laynera
 
Sooneel Presentation
Sooneel PresentationSooneel Presentation
Sooneel PresentationSoonee Allay
 
Městská karta
Městská kartaMěstská karta
Městská kartabezouska
 
Horizon College 31012011
Horizon College 31012011Horizon College 31012011
Horizon College 31012011Johan Lapidaire
 
Thesis100109
Thesis100109Thesis100109
Thesis100109klee4vp
 

Viewers also liked (20)

Real time trade surveillance in financial markets
Real time trade surveillance in financial marketsReal time trade surveillance in financial markets
Real time trade surveillance in financial markets
 
The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0The 7 Pillars of Market Surveillance 2.0
The 7 Pillars of Market Surveillance 2.0
 
Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010Integrated Trade Compliance Strategy Presentation October 2010
Integrated Trade Compliance Strategy Presentation October 2010
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Pci V2
Pci V2Pci V2
Pci V2
 
Risk and Issue Dashboard ver. 1
Risk and Issue Dashboard ver. 1Risk and Issue Dashboard ver. 1
Risk and Issue Dashboard ver. 1
 
Kas Ir Bendijs
Kas Ir BendijsKas Ir Bendijs
Kas Ir Bendijs
 
Videoconferencing[1]
Videoconferencing[1]Videoconferencing[1]
Videoconferencing[1]
 
Clipagem
ClipagemClipagem
Clipagem
 
Contemporaries: Eleven Abstract Painters
Contemporaries: Eleven Abstract PaintersContemporaries: Eleven Abstract Painters
Contemporaries: Eleven Abstract Painters
 
AIESEC HUST 09Fall 招新——人文学院
AIESEC HUST 09Fall 招新——人文学院AIESEC HUST 09Fall 招新——人文学院
AIESEC HUST 09Fall 招新——人文学院
 
B2B Branding Explained
B2B Branding ExplainedB2B Branding Explained
B2B Branding Explained
 
Locovore
LocovoreLocovore
Locovore
 
Presentazione Tesi Specialistica
Presentazione Tesi SpecialisticaPresentazione Tesi Specialistica
Presentazione Tesi Specialistica
 
Code Reviews - Vortrag für Innogames
Code Reviews - Vortrag für InnogamesCode Reviews - Vortrag für Innogames
Code Reviews - Vortrag für Innogames
 
Senior Communicator Briefing.1
Senior Communicator Briefing.1Senior Communicator Briefing.1
Senior Communicator Briefing.1
 
Sooneel Presentation
Sooneel PresentationSooneel Presentation
Sooneel Presentation
 
Městská karta
Městská kartaMěstská karta
Městská karta
 
Horizon College 31012011
Horizon College 31012011Horizon College 31012011
Horizon College 31012011
 
Thesis100109
Thesis100109Thesis100109
Thesis100109
 

Similar to Introduction to cambridge semantics trade surveillance 2015

Delivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankDelivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankSplunk
 
From Data to Insights to Action: When Transactions and Analytics Converge
From Data to Insights to Action: When Transactions and Analytics ConvergeFrom Data to Insights to Action: When Transactions and Analytics Converge
From Data to Insights to Action: When Transactions and Analytics ConvergeAli Hodroj
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Matt Stubbs
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
MapR Enterprise Data Hub Webinar w/ Mike Ferguson
MapR Enterprise Data Hub Webinar w/ Mike FergusonMapR Enterprise Data Hub Webinar w/ Mike Ferguson
MapR Enterprise Data Hub Webinar w/ Mike FergusonMapR Technologies
 
Oies Big Data and the Internet of the Things Overview
Oies Big Data and the Internet of the Things OverviewOies Big Data and the Internet of the Things Overview
Oies Big Data and the Internet of the Things OverviewFrancisco Maroto
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data MonetisationPSD Group Ltd
 
Incentius - Portfolio of Capabilities
Incentius - Portfolio of CapabilitiesIncentius - Portfolio of Capabilities
Incentius - Portfolio of CapabilitiesSujeet Pillai
 
Market Abuse Detection
Market Abuse DetectionMarket Abuse Detection
Market Abuse DetectionRaja Das
 
Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...
Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...
Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...ShadiTraboulsi1
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Servicesawasay
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_ServicesRamesh Yelugoila
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Servicesvenkat4428
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_ServicesOliver Guirdham
 
RegTech: Leveraging Alternative Data for Compliance
RegTech: Leveraging Alternative Data for ComplianceRegTech: Leveraging Alternative Data for Compliance
RegTech: Leveraging Alternative Data for ComplianceArcadia Data
 
Research Services
Research ServicesResearch Services
Research ServicesEminenture
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldLaurent Pacalin
 

Similar to Introduction to cambridge semantics trade surveillance 2015 (20)

資産運用とビッグデータ解析_2
資産運用とビッグデータ解析_2資産運用とビッグデータ解析_2
資産運用とビッグデータ解析_2
 
Delivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankDelivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING Bank
 
From Data to Insights to Action: When Transactions and Analytics Converge
From Data to Insights to Action: When Transactions and Analytics ConvergeFrom Data to Insights to Action: When Transactions and Analytics Converge
From Data to Insights to Action: When Transactions and Analytics Converge
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Machine Learning For Stock Broking
Machine Learning For Stock BrokingMachine Learning For Stock Broking
Machine Learning For Stock Broking
 
MapR Enterprise Data Hub Webinar w/ Mike Ferguson
MapR Enterprise Data Hub Webinar w/ Mike FergusonMapR Enterprise Data Hub Webinar w/ Mike Ferguson
MapR Enterprise Data Hub Webinar w/ Mike Ferguson
 
Oies Big Data and the Internet of the Things Overview
Oies Big Data and the Internet of the Things OverviewOies Big Data and the Internet of the Things Overview
Oies Big Data and the Internet of the Things Overview
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
 
Incentius - Portfolio of Capabilities
Incentius - Portfolio of CapabilitiesIncentius - Portfolio of Capabilities
Incentius - Portfolio of Capabilities
 
Market Abuse Detection
Market Abuse DetectionMarket Abuse Detection
Market Abuse Detection
 
Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...
Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...
Capturing_the_data_and_advanced_analytics_opportunity_in_capital_markets_2017...
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services
 
160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services160816_The_Business_Research_Company_Research_Services
160816_The_Business_Research_Company_Research_Services
 
RegTech: Leveraging Alternative Data for Compliance
RegTech: Leveraging Alternative Data for ComplianceRegTech: Leveraging Alternative Data for Compliance
RegTech: Leveraging Alternative Data for Compliance
 
Research Services
Research ServicesResearch Services
Research Services
 
Commercial services
Commercial servicesCommercial services
Commercial services
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 

Introduction to cambridge semantics trade surveillance 2015

  • 1. ©2015 Cambridge Semantics Inc. All rights reserved. Anzo Trade Forensics and Compliance A Smart Data Solution for Financial Services Contact: Ben Szekely Vice President & Founding Engineer Solutions & Pre-sales ben@cambridgesemantics.com
  • 2. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 2. Trade Forensics and Compliance: Component Architecture Anzo Enterprise (Data cache, Ontologies, Mapping, Rules) Anzo Connect (Live SQL Connectivity) Anzo on the Web: Customizable Analytics, Rules, Queries & Graph Visualization Surveillance Warehouses Anzo Unstructured (Text Monitoring) Financial news, Emails, IMs, Research reports, Social Media, Phone records, Time & Expense Records Trading Systems Anzo for Microsoft Excel: Live Excel reports, interactive real-time data cleansing and on-boarding Watch Lists Anzo Relational Replicator Confidential
  • 3. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 3. Trade Forensics: Ingest structured data Examples of structured sources • Watch list – securities listed due to pending deals. • Market Data – daily price movement and / or tick data. • Trade blotters – transactions and positions Molsen-Coors 12/26/2011 TAP Buy-side M&A Constellation Brands Molsen-Coors 12/30/2011 TAP Open / High / Low / Close Prices Molsen-Coors 12/28/2011 Equity BUY 123.3 5000 Grant Rice Confidential
  • 4. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 4. Examples of unstructured sources • New articles – articles mentioning traded securities or companies that can help correlate market events to trading trends • Email – Monitor employee communication for the passing of sensitive information relevant to deals, research reports or other watch-list activity Trade Forensics: Ingest internal and external unstructured, annotate and connect Confidential
  • 5. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 5. • Trade Security IndividualWatch List Research Report Expert Conversation Deal team Trader, Sales person Equity Fixed Income subclass News Article Email Message Trade Forensics: Conceptual Data Model Intuitive investigation and analytics across all data sources Confidential
  • 6. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 6. 1. Watch List Analysis 2. Employee Connections Analysis 3. Watch List Communications 4. Market Price Swings 5. Restricted List 6. Restricted List – Front-Running 7. Conflict of Interest 8. Over the Wall Communications 9. Employee Trading Reviews 10. Market Moving Corporate News 11. Timing of Trades to SEC filings 12. Expert Network Trade Surveillance 13. MNPI Outside the Organization 14. Employee Pre-Approval Surveillance 15. Employee Trading – Outside Account Review 16. Outside Business Activity / Private Securities Transactions 17. Internal Communications Pre-Clearance 18. Email Surveillance 19. External Research Report Pre-Clearance 20. Gifts and Entertainment Surveillance 21. Meetings with Public and Private Side Employees Trade Forensics: Potential Dashboards Confidential
  • 7. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 7. Flexible Ontology (Model) Management
  • 8. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 8. Excel-based mapping for loading data from structured sources
  • 9. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 9. Configurable NLP Pipelines
  • 10. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 10. Configurable Investigative Dashboards
  • 11. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 11. Declarative Excel-based Rules
  • 12. ©2014 Cambridge Semantics Inc. All rights reserved. Company Confidential. Page 12. Discover and Explore Relationships