SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Sherif Rasmy - MDM
1
Enterprise Application Integration
The Master Data Manager – MDM
Sherif Rasmy - March 13, 2014
Introduction
KGX is a broker-dealer that recently made unpleasant appearances in the Wall Street Journal. It was
fined multiple times by the Security Exchange Commission (SEC) and reported major losses due to
trading errors. The SEC warned KGX of losing its trading license for the following reasons:
 Failure to accurately report ownership of public companies (SEC-Schedule-13G)
 Frequent trade errors and cancellation (Trade Busts).
 Failure to capture market manipulative activities (Front Running and Wash)
KGX’s systems use multiple versions of master data. In many cases, these are incomplete, inaccurate
and inconsistent. The bad data quality caused trading errors, failure to fulfill regulatory reporting and
inability to implement effective trade surveillance models.
A Master Data Management solution is required to provide operational systems with high quality
master data. Although master data issues spanned across customer, security and market data;
security data was the most problematic. For example, missing derivative’s conversion rate eliminated
many trades from being reported to the SEC. KGX decided to adopt a Master Data Management
solution to get a single version of the truth for all its master and reference data. KGX decided to start
its MDM experience with building Security Master.
The Problem
 KGX is comprised of multiple home grown systems and databases (Figure 1)
 There are multiple copies operational security data sourced from multiple security data vendors.
OLTP High Frequency
Trading Engine DB
OLTP Retail Brokerage
Trading Desk DB
SecutiySEFY Securities
Data VEndor
LTI Securities
Data Vendor
UI
UI
Read
Secutiy
Front Office Systems
Back Office Systems
NYSE-NASDAQ
Securities
UI
OLTP Back Office DBs
Secutiy
Front Office
Data warehouses
Secutiy
Back Office
Secutiy
Risk
Secutiy
Compliance
Secutiy
ETL
ETL
ETL
ETL
ETL
ETL
ETL
Read/Write
Read/Write
ETL
ETL
ETL
ETL
Figure 1 – Current Architecture
Sherif Rasmy - MDM
2
 The data quality of the data warehouses is not much better than that of the operational ones.
dependent on the quality of the sources
 Many ETL processes that are owned and maintained by different business and IT units
 Security data in many instances is incorrect, incomplete, inconsistent, duplicated and can hardly
be grouped and categorized (Figure 2)
OLTP Retail Brokerage
Trading Desk
CUSIP: 345900145
UNDR CUSIP: 80004584876
TYPE: OPT
CONVR:
TICKER: IBMOPX
UNDRL TICKER:
TYPE: 12
CONVR: 100
ISIN: 889774584876
CONVR: 1
OLTP High Frequency
Trading Engine OLTP Back Office
Figure 2 – Current Data Characteristics
 KGX’s growing number of software components increased operational risk & cost.
The Solution
Architecture Overview
 Security Master is a Transactional MDM Hub (Figure 3).
 Master security data is stored in the MDM database and operational databases. However, the MDM
data base serves as the single source of security data
 Security data lifecycle is centrally controlled through MDM services
OLTP High Frequency
Trading Engine DB
OLTP Retail Brokerage
Trading Desk DB
Secutiy
SEFY Securities
Data VEndor
LTI Securities
Data Vendor
UI
UI
Secutiy
Front Office Systems
Back Office Systems
NYSE-NASDAQ
SecuritiesUI
OLTP Back Office DBs
Secutiy
Front Office
Data warehouses
Secutiy
Back Office
Secutiy
Risk
Secutiy
Compliance
Secutiy
The Master Data Manager
UI
Read
Read
Read
Extractors
Cleanse Correct Complete Match
Master Database
Security Master
Batch
Load
Synchronous Real
Time Update
Asynchronous Near
Real Time Update
Services Interface
Data Synchronizer
Other Security
Data Sources
Life Cycle
Web Services
Clients
Read/Write
Figure 3 – Security Master Architecture
Sherif Rasmy - MDM
3
The Master Data Manager
 MDM is comprised of three key components:
o Services Interface: A central multiprotocol interface for security data maintenance. Data
will be maintained (created/updated/deleted) through: ETL batch processes. Web Services
and User Interfaces.
o Master Database: Stores a single consolidated view of security data
o Data Synchronizer: Responsible for synchronizing master security data with operational
security data with any changes. This done either in real-time, near real-time or batch.
 IBM and Oracle are the leading providers of MDM solutions. IBM InfoSphere MDM was selected
because it will blend with existing IBM InfoSphere solutions KGX uses including: Data Warehouse,
Analytics and Business Intelligence.
 Best efforts are made by the MDM engine to create a complete, correct and consistent version of
each security (Figure 4). Security master supports all attributes for all operational sources it feeds.
MDM matching algorithms determined that all options are the same. It assigned it an internal id
7789954326 that is imported to all operational sources.
SMID: 7789954326
NAME: IBMOPX 120914 C
CUSIP: 345900145
UNDR: 80004584876
TYPE: OPT
CONVR: 100
SMID: 7789954326
TICKER: IBMOPX
UNDRL TICKER: IBM
TYPE: 12
CONVR: 100
SMID: 7789954326
NAME: IBM OPT 12/09/14
ISIN: 889774584876
CONVR: 100
Security Master
SMID: 7789954326
NAME: IBMOPX 120914 CLS A
CUSIP: 345900145
ISIN: 889774584876
TICKER: IBMOPX
UNDR CUSIP: 80004584876
UNDR ISIN: 443274589823
UNDR TICKER: IBM
TYPE: OPT
CONVR: 100
Figure 4 – Security Master Data Characteristics
 All vendor data sources are moved from feeding operational databases feeding MDM.
 Although, security master data is stored in standardized canonical structure, the MDM is
responsible for transforming the data in the operational format during synchronization.
Return on Investment
 Reduced Operational Risk and Cost: Security Master reduced the number of ETL components
dramatically. The reduced number of software components reduced the cost associated with
maintenance, licensing and support
 Increased Agility: New security data sources to improve the data quality can be plugged in one
location. We can more rapidly integrate new acquisitions
Sherif Rasmy - MDM
4
Master Data Governance
Master Data Governance is about defining policies to ensure ownership and accountability associated
with master data metadata, life-cycle, quality, security and usage. KGX created a simple governance
organization from councils and stewards (Figure 5)
implements
Stewards
Procedures
Policies
establish develop
develop
outline- Business representative from Front Office, Back
Office and Information Technology
- Establishing the policy and procedures of the
organization
- Business representative from Front Office, Back
Office and Information Technology
- Establishing the policy and procedures of the
organization
- Business representative from Front Office, Back Office and
Information Technology
- Responsible for master data quality and work closely with the
corresponding Information Stewards to develop and implement
governance procedures in line with expectations set forth under
governance policies.
- Business representative from Front Office, Back Office and
Information Technology
- Responsible for master data quality and work closely with the
corresponding Information Stewards to develop and implement
governance procedures in line with expectations set forth under
governance policies.
Councils
Figure 5 – Security Master Data Governance
Project Planning
An MDM project is like any software project and should follow typical SDLC. Security Master went
through the following steps (Figure 6).
- SEFY Security Data Vendor
- LTI Securities Data Vendor
- NYSE-NASDAQ Securities
Identify Sources of Security Data1
Develop Master Security Data Model5
SMID
NAME
CUSIP
ISIN
UNDR TICKER
TYPE
CONVR
TICKER
ISIN
TICKER
UNDR CUSIP
UNDR ISIN
Choose an MDM Solution Provider6
- Front Office Systems and DB
- Back Office Systems and DB
- Data warehouses
Modify Producing & Consuming Systems7
- Security Master Services Interfaces
- Security Master Data Synchronizer
Implement Maintenance Processes8
- Name councils, stewards and custodian
- Establish policies
- Develop procedures
Implement a Data Governance Program4
- No Standard Security Identifier
- Underlying Securities not Available
- Inaccurate Conversion Rate
- Inconsistent Reference Data
Analyze Security Data Quality3
- Front Office Systems and DB
- Back Office Systems and DB
- Data warehouses
Identify Who Uses Security Data2
Figure 6 – Security Master Project Plan
Challenges
- Buy in and Commitment
- Data efforts Realignment
- Projects Prioritization
- Clear Mission Statement
- Adequate Training and Support
- Strong Leadership
Executive Challenges
- Behavior Change
- Adherence to New Policies & Procedures
- Implementation of new Procedures
- Resourcing
- Resistance to Change and Losing Control
Managerial Challenges
- Data Analysis
- Resistance to Change and Losing Control
- Choosing an MDM vendor
- Achieving proper QoS
Technical Challenges
Figure 7 – Security Master Implementation Challenges
Sherif Rasmy - MDM
5
Conclusion
Nowadays, enterprises can’t grow and survive without quick access to correct and complete
information. Data issues not only affect enterprise’s profitability but its existence. This paper covered
the reasons for adopting master data management, the process of developing a solution and several
options for technological implementation of the solution.

Contenu connexe

Tendances

Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
DATAVERSITY
 
IBM InfoSphere MDM v11 Overview - Aomar BARIZ
IBM InfoSphere MDM v11 Overview - Aomar BARIZIBM InfoSphere MDM v11 Overview - Aomar BARIZ
IBM InfoSphere MDM v11 Overview - Aomar BARIZ
IBMInfoSphereUGFR
 

Tendances (20)

Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
Informatica Presents: 10 Best Practices for Successful MDM Implementations fr...
 
Harmonize Your Enterprise Processes with Product Master Data Management Solut...
Harmonize Your Enterprise Processes with Product Master Data Management Solut...Harmonize Your Enterprise Processes with Product Master Data Management Solut...
Harmonize Your Enterprise Processes with Product Master Data Management Solut...
 
Tips & tricks to drive effective Master Data Management & ERP harmonization
Tips & tricks to drive effective Master Data Management & ERP harmonizationTips & tricks to drive effective Master Data Management & ERP harmonization
Tips & tricks to drive effective Master Data Management & ERP harmonization
 
Multidomain MDM at Amadeus
Multidomain MDM at AmadeusMultidomain MDM at Amadeus
Multidomain MDM at Amadeus
 
5 Level of MDM Maturity
5 Level of MDM Maturity5 Level of MDM Maturity
5 Level of MDM Maturity
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprison
 
Master Data Management - Gartner Presentation
Master Data Management - Gartner PresentationMaster Data Management - Gartner Presentation
Master Data Management - Gartner Presentation
 
Lean Master Data Management
Lean Master Data ManagementLean Master Data Management
Lean Master Data Management
 
Credit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global ScaleCredit Suisse, Reference Data Management on a Global Scale
Credit Suisse, Reference Data Management on a Global Scale
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodology
 
Informatica MDM Presentation
Informatica MDM PresentationInformatica MDM Presentation
Informatica MDM Presentation
 
Master Data Management: Extracting Value from Your Most Important Intangible ...
Master Data Management: Extracting Value from Your Most Important Intangible ...Master Data Management: Extracting Value from Your Most Important Intangible ...
Master Data Management: Extracting Value from Your Most Important Intangible ...
 
Infosys best practices_mdm_wp
Infosys best practices_mdm_wpInfosys best practices_mdm_wp
Infosys best practices_mdm_wp
 
A Reference Process Model for Master Data Management
A Reference Process Model for Master Data ManagementA Reference Process Model for Master Data Management
A Reference Process Model for Master Data Management
 
Ebook - The Guide to Master Data Management
Ebook - The Guide to Master Data Management Ebook - The Guide to Master Data Management
Ebook - The Guide to Master Data Management
 
IBM InfoSphere MDM v11 Overview - Aomar BARIZ
IBM InfoSphere MDM v11 Overview - Aomar BARIZIBM InfoSphere MDM v11 Overview - Aomar BARIZ
IBM InfoSphere MDM v11 Overview - Aomar BARIZ
 
5 Steps To Master Data Management
5 Steps To Master Data Management5 Steps To Master Data Management
5 Steps To Master Data Management
 
Reference master data management
Reference master data managementReference master data management
Reference master data management
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 

Similaire à EAI - Master Data Management - MDM - Use Case

Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!
Jeffrey T. Pollock
 

Similaire à EAI - Master Data Management - MDM - Use Case (20)

Kaizentric Presentation
Kaizentric PresentationKaizentric Presentation
Kaizentric Presentation
 
NZS-4532 - Bringing Historical Data to Life with IBMs SMF Data Engine
NZS-4532 - Bringing Historical Data to Life with IBMs SMF Data EngineNZS-4532 - Bringing Historical Data to Life with IBMs SMF Data Engine
NZS-4532 - Bringing Historical Data to Life with IBMs SMF Data Engine
 
Fbdl enabling comprehensive_data_services
Fbdl enabling comprehensive_data_servicesFbdl enabling comprehensive_data_services
Fbdl enabling comprehensive_data_services
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 
Complexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP EnvironmentComplexities of Separating Data in an ERP Environment
Complexities of Separating Data in an ERP Environment
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Empowering you with Democratized Data Access, Data Science and Machine Learning
Empowering you with Democratized Data Access, Data Science and Machine LearningEmpowering you with Democratized Data Access, Data Science and Machine Learning
Empowering you with Democratized Data Access, Data Science and Machine Learning
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
Enterprise Data Management “As-a-Service”
Enterprise Data Management “As-a-Service”Enterprise Data Management “As-a-Service”
Enterprise Data Management “As-a-Service”
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationKASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking Overview
 
AtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White PapaerAtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White Papaer
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Intro to big data and applications -day 3
Intro to big data and applications -day 3Intro to big data and applications -day 3
Intro to big data and applications -day 3
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

EAI - Master Data Management - MDM - Use Case

  • 1. Sherif Rasmy - MDM 1 Enterprise Application Integration The Master Data Manager – MDM Sherif Rasmy - March 13, 2014 Introduction KGX is a broker-dealer that recently made unpleasant appearances in the Wall Street Journal. It was fined multiple times by the Security Exchange Commission (SEC) and reported major losses due to trading errors. The SEC warned KGX of losing its trading license for the following reasons:  Failure to accurately report ownership of public companies (SEC-Schedule-13G)  Frequent trade errors and cancellation (Trade Busts).  Failure to capture market manipulative activities (Front Running and Wash) KGX’s systems use multiple versions of master data. In many cases, these are incomplete, inaccurate and inconsistent. The bad data quality caused trading errors, failure to fulfill regulatory reporting and inability to implement effective trade surveillance models. A Master Data Management solution is required to provide operational systems with high quality master data. Although master data issues spanned across customer, security and market data; security data was the most problematic. For example, missing derivative’s conversion rate eliminated many trades from being reported to the SEC. KGX decided to adopt a Master Data Management solution to get a single version of the truth for all its master and reference data. KGX decided to start its MDM experience with building Security Master. The Problem  KGX is comprised of multiple home grown systems and databases (Figure 1)  There are multiple copies operational security data sourced from multiple security data vendors. OLTP High Frequency Trading Engine DB OLTP Retail Brokerage Trading Desk DB SecutiySEFY Securities Data VEndor LTI Securities Data Vendor UI UI Read Secutiy Front Office Systems Back Office Systems NYSE-NASDAQ Securities UI OLTP Back Office DBs Secutiy Front Office Data warehouses Secutiy Back Office Secutiy Risk Secutiy Compliance Secutiy ETL ETL ETL ETL ETL ETL ETL Read/Write Read/Write ETL ETL ETL ETL Figure 1 – Current Architecture
  • 2. Sherif Rasmy - MDM 2  The data quality of the data warehouses is not much better than that of the operational ones. dependent on the quality of the sources  Many ETL processes that are owned and maintained by different business and IT units  Security data in many instances is incorrect, incomplete, inconsistent, duplicated and can hardly be grouped and categorized (Figure 2) OLTP Retail Brokerage Trading Desk CUSIP: 345900145 UNDR CUSIP: 80004584876 TYPE: OPT CONVR: TICKER: IBMOPX UNDRL TICKER: TYPE: 12 CONVR: 100 ISIN: 889774584876 CONVR: 1 OLTP High Frequency Trading Engine OLTP Back Office Figure 2 – Current Data Characteristics  KGX’s growing number of software components increased operational risk & cost. The Solution Architecture Overview  Security Master is a Transactional MDM Hub (Figure 3).  Master security data is stored in the MDM database and operational databases. However, the MDM data base serves as the single source of security data  Security data lifecycle is centrally controlled through MDM services OLTP High Frequency Trading Engine DB OLTP Retail Brokerage Trading Desk DB Secutiy SEFY Securities Data VEndor LTI Securities Data Vendor UI UI Secutiy Front Office Systems Back Office Systems NYSE-NASDAQ SecuritiesUI OLTP Back Office DBs Secutiy Front Office Data warehouses Secutiy Back Office Secutiy Risk Secutiy Compliance Secutiy The Master Data Manager UI Read Read Read Extractors Cleanse Correct Complete Match Master Database Security Master Batch Load Synchronous Real Time Update Asynchronous Near Real Time Update Services Interface Data Synchronizer Other Security Data Sources Life Cycle Web Services Clients Read/Write Figure 3 – Security Master Architecture
  • 3. Sherif Rasmy - MDM 3 The Master Data Manager  MDM is comprised of three key components: o Services Interface: A central multiprotocol interface for security data maintenance. Data will be maintained (created/updated/deleted) through: ETL batch processes. Web Services and User Interfaces. o Master Database: Stores a single consolidated view of security data o Data Synchronizer: Responsible for synchronizing master security data with operational security data with any changes. This done either in real-time, near real-time or batch.  IBM and Oracle are the leading providers of MDM solutions. IBM InfoSphere MDM was selected because it will blend with existing IBM InfoSphere solutions KGX uses including: Data Warehouse, Analytics and Business Intelligence.  Best efforts are made by the MDM engine to create a complete, correct and consistent version of each security (Figure 4). Security master supports all attributes for all operational sources it feeds. MDM matching algorithms determined that all options are the same. It assigned it an internal id 7789954326 that is imported to all operational sources. SMID: 7789954326 NAME: IBMOPX 120914 C CUSIP: 345900145 UNDR: 80004584876 TYPE: OPT CONVR: 100 SMID: 7789954326 TICKER: IBMOPX UNDRL TICKER: IBM TYPE: 12 CONVR: 100 SMID: 7789954326 NAME: IBM OPT 12/09/14 ISIN: 889774584876 CONVR: 100 Security Master SMID: 7789954326 NAME: IBMOPX 120914 CLS A CUSIP: 345900145 ISIN: 889774584876 TICKER: IBMOPX UNDR CUSIP: 80004584876 UNDR ISIN: 443274589823 UNDR TICKER: IBM TYPE: OPT CONVR: 100 Figure 4 – Security Master Data Characteristics  All vendor data sources are moved from feeding operational databases feeding MDM.  Although, security master data is stored in standardized canonical structure, the MDM is responsible for transforming the data in the operational format during synchronization. Return on Investment  Reduced Operational Risk and Cost: Security Master reduced the number of ETL components dramatically. The reduced number of software components reduced the cost associated with maintenance, licensing and support  Increased Agility: New security data sources to improve the data quality can be plugged in one location. We can more rapidly integrate new acquisitions
  • 4. Sherif Rasmy - MDM 4 Master Data Governance Master Data Governance is about defining policies to ensure ownership and accountability associated with master data metadata, life-cycle, quality, security and usage. KGX created a simple governance organization from councils and stewards (Figure 5) implements Stewards Procedures Policies establish develop develop outline- Business representative from Front Office, Back Office and Information Technology - Establishing the policy and procedures of the organization - Business representative from Front Office, Back Office and Information Technology - Establishing the policy and procedures of the organization - Business representative from Front Office, Back Office and Information Technology - Responsible for master data quality and work closely with the corresponding Information Stewards to develop and implement governance procedures in line with expectations set forth under governance policies. - Business representative from Front Office, Back Office and Information Technology - Responsible for master data quality and work closely with the corresponding Information Stewards to develop and implement governance procedures in line with expectations set forth under governance policies. Councils Figure 5 – Security Master Data Governance Project Planning An MDM project is like any software project and should follow typical SDLC. Security Master went through the following steps (Figure 6). - SEFY Security Data Vendor - LTI Securities Data Vendor - NYSE-NASDAQ Securities Identify Sources of Security Data1 Develop Master Security Data Model5 SMID NAME CUSIP ISIN UNDR TICKER TYPE CONVR TICKER ISIN TICKER UNDR CUSIP UNDR ISIN Choose an MDM Solution Provider6 - Front Office Systems and DB - Back Office Systems and DB - Data warehouses Modify Producing & Consuming Systems7 - Security Master Services Interfaces - Security Master Data Synchronizer Implement Maintenance Processes8 - Name councils, stewards and custodian - Establish policies - Develop procedures Implement a Data Governance Program4 - No Standard Security Identifier - Underlying Securities not Available - Inaccurate Conversion Rate - Inconsistent Reference Data Analyze Security Data Quality3 - Front Office Systems and DB - Back Office Systems and DB - Data warehouses Identify Who Uses Security Data2 Figure 6 – Security Master Project Plan Challenges - Buy in and Commitment - Data efforts Realignment - Projects Prioritization - Clear Mission Statement - Adequate Training and Support - Strong Leadership Executive Challenges - Behavior Change - Adherence to New Policies & Procedures - Implementation of new Procedures - Resourcing - Resistance to Change and Losing Control Managerial Challenges - Data Analysis - Resistance to Change and Losing Control - Choosing an MDM vendor - Achieving proper QoS Technical Challenges Figure 7 – Security Master Implementation Challenges
  • 5. Sherif Rasmy - MDM 5 Conclusion Nowadays, enterprises can’t grow and survive without quick access to correct and complete information. Data issues not only affect enterprise’s profitability but its existence. This paper covered the reasons for adopting master data management, the process of developing a solution and several options for technological implementation of the solution.