Architecture Diagram
Interactive node graph demonstrating the data pipeline.
Trigger
External Data Feed Ingestion
Initiates the process upon receiving new or updated security master data feeds from external market data vendors.
Solved by:ICE Data Services, Bloomberg Terminal API, Refinitiv Eikon
Processing
Data Validation & Transformation
Validates incoming raw data against pre-defined business rules, enriches it, and transforms it into a standardized internal format.
Solved by:GoldenSource, Eagle Investment Systems (now BNY Mellon Pershing X)
Processing
Central Security Master Database
Persists the validated and standardized security master data, establishing it as the firm's single source of truth.
Solved by:Markit EDM, Internal SQL Database (e.g., PostgreSQL)
Execution
Distribution to Downstream Systems
Publishes updated security master data to various internal systems such as OMS, PMS, CRM, and risk management platforms.
Solved by:FIX Protocol, Apache Kafka, Internal API Gateway
Execution
Reconciliation & Reporting
Monitors data consistency across integrated systems and generates audit trails and discrepancy reports for data integrity.
Solved by:Alteryx, Tableau, Internal BI Dashboards
Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.
Related Workflows
Similar architecture patterns you may find useful.