Acquiring and Implementing a New Treasury System

What is a treasury system?It may appear rather obvious, but many treasurers have questions about treasury systems, their scope and functionality, and how exactly they fit in with the others systems already in use. A treasury system typically covers the treasury front, mid and back office process, meaning that it processes transactions from and including the doing of the deal, up to and including settlement and generation of accounting entries. In addition, it provides all the analyses, risk management and reporting in respect of the transactions and positions within the system. There are some important aspects of this worth emphasising. Firstly, in relation to starting point, the treasury dealer should be simultaneously inputting the deal while on the phone. There is no ‘deal docket’ being completed; it’s an on-line activity, with no interim steps or recording. In some situations, there can be a requirement for a ‘pre-deal’ phase. The key point is that the TMS should support the business process from the earliest point possible, minimising or eliminating the manual or paper-based elements. Typically, the lifecycle of a treasury transaction is completed when settlement takes place and the transaction is posted within the accounting system.The TMS should generate the settlement instructions for the treasury transactions, delivering those in electronic form to a payment system e.g. Swift or a bank payment system, or in hardcopy if that is the business process. There is less uniformity when it comes to what the various TMS will do when it comes to accounting. Preferably, the TMS will generate all the account postings, including the revaluations, for all treasury transactions, passing those seamlessly to the accounting system. Given the ever-shortening month-end processes, this level of automation is quite important.Transaction processing is just one dimension of a TMS; another is risk management. Sometimes treasurers ask to see the risk management module of the TMS, implying that somehow ‘risk management’ is separable from the rest of treasury. In reality, ‘risk management’ is – or should be – all pervasive and embedded throughout the system, especially if seen as broadly-defined and including operational risks. For this reason, a ‘Risk Module’ is something of a misnomer, confusingly implying that ‘risk’ can be confined to a specific module. The key point is that the system should process the transaction from the point of deal entry, in accordance with an embedded ‘best practice’ control framework, that provides segregation, counterparty checks, limit checks etc.In summary, the TMS would typically interface with the accounting system to deliver the account postings, and with one or more payment/banking system to give settlement instructions and/or upload account balances. In addition, it would link with a market information system to upload interest rates, exchange rates and other market prices as frequently as required. Other interfacing may be required, for example with an on-line FX dealing system, or with secondary market bond trading systems, depending on the specific environment. Managing the Project Treasury should take responsibility for the project to select and implement the new TMS. In some organisations, the IT function takes the responsibility. This can be counterproductive, with technical IT issues becoming the focus and the actual treasury requirements being less than fully understood and somewhat muddled. Clearly, all systems and IT, including those in treasury, should be consistent with the overall corporate IT policy, however, treasury should determine its functional requirements, review these with the vendors, and lead the selection process. In practice, a small team, with enough seniority to take the necessary decisions, comprising treasury, IT and led by a project manager, is the ideal way to proceed. The role of the project manager should include ensuring ongoing coordination and problem solving with the project manager on the vendor side. An agreed project plan with clear milestones should be the constant reference point for managing the project. In terms of timetable, each situation is different but realistically it requires a minimum of three months for a very straightforward application and a maximum of twelve, depending on interfacing and customisation, with six months being a good average. A very important determinant of time required is the degree to which the key users engage with the implementation effort. The ‘business owner’ of the TMS, and the project manager, need to ensure that this engagement is maintained over the life of the project.Defining the RequirementsThe critical part of any project is at the very beginning, getting the basic concept right. The treasurer is the key player and must ensure that the basic concept is appropriate to the organization and the requirements. False assumptions at the beginning can have big costs later on. Treasury systems projects can often get stuck at this point of documenting the requirements because no one involved has been through the process before. It is not an easy task and requires a different mindset than that of day-to-day treasury. For this reason it is good to involve a business analyst to guide and drive the process. Basically, what’s needed is a concise description of the treasury business requirements and the environment in terms of other systems, users and locations. The essential components to specify are: transaction types (i.e. the money market, capital market and fx transactions, current and expected), the business process/scope (e.g. cashflow forecasting, cash management, bank accounts), and analytical/reporting outputs. This need not be a very detailed document, but it should be balanced e.g. not just about ‘front office’, and comprehensive. Rather than seeing this as a single-step exercise, it can be taken as a process, starting at a high-level and detailing this as the picture becomes clearer from interaction with vendors. Most treasurers will get system presentations and seek indicative quotes as part of the initial market scanning phase, and this will allow the specification to be more fully detailed. However, the treasurer must guard against ‘design creep’ i.e. an accumulation of a lot of small additions, each perfectly justifiable on their own but when taken together, results in a moving target of ever expanding size. Importantly, the treasurer needs to watch that s/he is buying, and not getting sold, functionality.Many treasurers are faced with a choice between taking the treasury module of an existing ERP system or acquiring a specialist TMS. This can be a difficult decision for treasury. To some extent the easier option is to favor the ERP Module, however, it is just another option to be evaluated against the criteria set for all the alternatives. An important point to recognise is that systems vendors are well used to reviewing and understanding standard treasury requirements. What is important then is to highlight the unusual or any company specific aspects.That said, it is necessary to guard against the tendency to think that ‘we are very different’ and the standard solution will require a lot of customisation to meet our requirements. It is very important to approach any new systems implementation with the readiness to change the existing business process to match the system, rather than requiring the new system to change to match the existing business process. The latter approach can be very expensive in terms of the customisation itself and, subsequently, the ongoing support and maintenance of such a bespoke solution. A new TMS is an opportunity to review and change the business process and this should form part of the project plan.Reviewing the RFP ResponsesTreasury should aim to get at least three, preferably five, strong RFP responses. While a review and shortlisting of the RFP responses is a necessary step, a system procurement should not be a paper exercise. It is not feasible to document requirements, send them to various vendors, evaluate the responses and select. At best, this can be sufficient for initial screening but beyond that, it is essential to get an in-depth understanding of what each system can actually provide – by focusing on the actual system itself. Frequently, a list of requirements will be issued to a number of vendors, asking for Yes/No responses in terms of fulfillment. However, a ‘Yes’ response to a requirement such as ‘does your systems generate the accounting entries’ is too little information. Each ‘yes’ means something different – maybe something very different – and those differences need to be properly understood. The only way to do this is by going through the system with the vendor in detail. This is more than a ‘system presentation’ – usually a high-level overview by the vendor – but a detailed walk through the system, allowing a full day for this exercise. This is not overkill; once the TMS is selected, treasury will have to live with it for a number of years with little or no room for second thoughts, so the due diligence is worth it.In reviewing the RFP responses, clearly the functionality and price are important but so too is the actual implementation process and ongoing support and maintenance. Critical for a successful implementation process is the team the vendor will assign to the project and commitments on this should be made explicit as part of the due diligence.Build, buy or rent?Very few treasurers today would dwell on the ‘build versus buy’ decision. The systems available on the market mean that an internal systems development simply does not make sense. The costs and the risks are too high. The costs include the resources/time requirement for treasury to provide the functionality specifications; the risks include the chance that the project will fail to deliver the requirements. And then there is the longer term issue on maintaining and developing the system into the future.However, the ‘buy versus rent’ option is something to consider. Basically ‘to buy’ means buying an initial licence (meaning the right to use the software) and paying an annual licence fee (to access ongoing support and maintenance and get system upgrades), with the software being installed on your in-house IT infrastructure. The alternative ‘application service provider’ (ASP) or Software-as-a-Service (SaaS) model means that you pay a periodic user fee and the software is installed/accessed at some external facility, rather than sitting on your in-house servers. From a user perspective, the functionality is the same. Pricing – or perhaps more correctly, cashflow – and contractual and IT policy issues are the differentiating points. The ASP/SaaS approach spreads the payments over time, avoiding the up-front expenditure.BudgetTreasury systems vary significantly in price. In a shortlist of five, it would not be unusual to find that the highest priced was almost double the lowest price. Given this wide range of in pricing, it can be difficult to set a budget at the outset. In practice, treasury should be talking with a number of vendors so as to get an indication of the price and scope/functionality of the various offerings. To avoid overruns on budget or indeed on contract, treasury should look for a fixed price contract, with clarity on what’s included and excluded, and the pricing for the optional extras.The main reasons why costs can get out of control are second-thoughts on requirements and too much customisation. As already explained, treasury should carefully consider the necessity for customisation and limit this as much as possible. Too much customisation means that the benefits of an ‘off-theshelf’ solution can be eroded and the risks on cost overrun and completion increased.As a rule of thumb, the implementation cost can be equal to the software cost. To manage this cost, treasury should spend time developing or agreeing a good project plan, one that includes all the tasks and correctly maps out the critical path. Importantly, treasury needs to recognise that a systems implementation is an additional and demanding task, and a concentrated effort is required to bring it on stream. The vendor cannot do it without that treasury commitment.Conclusion Good treasury systems are essential for effective treasury management. Risk management, control, analyses and reporting can be streamlined and the hidden costs of poor systems removed. The process of acquiring and implementing such a system is a big step but a proper approach means that it need not be a daunting task, and the outcome can be assured.Written by Eddie Fogarty and published in the ACT (Association of Corporate Treasurers UK) Yearbook 2012.

Network Configuration Management Overview

This guide gives a brief overview of Network Configuration Management, otherwise known as Network Change and Configuration Management, or NCCM.Why does it matter?In a large corporate network it is not uncommon to have hundreds or thousands of network devices. If you add up all your switches, routers, firewalls and other network appliances, and then you consider how many lines of configuration settings apply to each one, you can see there is a significant investment in your networks’ configuration which needs to be protected.Contemporary network devices will not only switch and route data, but will vlan, prioritize and shape multi-media traffic in converged networks. The settings and parameters that determine how traffic is handled all forms part of the configuration of the device, and of course, it is vital that all interoperating devices are configured consistently in order to deliver a healthy and reliable network infrastructure.Of course, the security of your network is dependent on the way your devices are configured. Corporate Governance policies all include Data Security considerations, such as Sarbanes Oxley (SOX), GLBA, NERC, PCI DSS, HIPAA, MiFID, SAS 70, ISO 27000, CoCo/GCSx Code of Connection and Basel II. These security standards have all been introduced to ensure certain minimum levels of security and integrity are maintained for company financial information and any stored personal details of customers. Your network is inherently vulnerable while default settings are used and it is vital that all known vulnerabilities are eliminated throughTherefore configuration settings for your network need to be backed up, verified for compliance with any corporate governance policy or security standard, and consistency of configs maintained across the estate.Unapproved changes are the biggest threat to IT Service Delivery and the single most likely cause of failures in IT infrastructures. Any changes that occur outside of established tracking and approval processes are classed as Unapproved Changes and, by definition, are undocumented. No audit trail of a change being made means there is no foothold to start from when troubleshooting a problem. In fact EMA primary research has indicated that greater than 60% of all environment failures would be eliminated if unapproved changes were identified before affecting IT performance.Unapproved changes are introduced from a variety of sources including security violations, inappropriate user activity, and administrator errors. Even a seemingly benign alteration can have far-reaching unintended consequences to IT security, performance and reliability. Over time, system configurations deviate further and further away from established standards. This is referred to as “configuration drift”, and the greater the drift, the greater the risk posed to the reliability of an IT support stack.The Network Change and Configuration Management SolutionA practical solution to address these requirements is to automate config backups and change tracking, which has given rise to the Network Change and Configuration Management, or NCCM, market.Change and Configuration Management (CCM) is the process for minimizing configuration drift by ensuring all environment settings are approved and consistent with established standards. CCM is composed of three distinct practices: configuration management which is the creation, documentation and updating of standard settings for all supported IT components; change management which is the process for identifying and approving new configuration settings and updates; and change detection which is an ongoing process of monitoring for inappropriate changes. Achieving compliance objectives for ensuring IT infrastructure reliability requires automated solutions that address all three CCM disciplines.How does it work?To date, the development of network device hardware has taken place at a much faster rate than the equivalent development of network management or network configuration management software. In some respects it is understandable – Network Devices didn’t need managing or configuring originally as they were black boxes that either passed data or not. It was only with the advent of shared network infrastructures such as Ethernet that the configuration of addresses and protocols became necessary and some consideration made of the network topology to cater for traffic flows and volumes.Simple Network Management Protocol (SNMP) came to the fore as a technology to address the need for performance, security and accounting statistics from the network, and at the same time, provide a means of changing the configuration of a network too.As a standard however, anyone who has used SNMP will know that it is anything but consistent in all but the most basic statistics. It is common to find that the manufacturers’ ‘Management Information Database’ or MIB will purport to support certain performance metrics, only to find that different devices from the same manufacturer do not consistently report information via the MIB.It is a similar story when using SNMP to gather or update configuration data – your version of Cisco Works may work well at backing up your 2950 switch configs but when you next upgrade to 3750 switches, you may quickly find out that Cisco Works suddenly needs an upgrade (at your expense, of course – ‘What do you mean, you pay annual maintenance? That is only to maintain your software, not to actually make it keep pace with product range developments!’)Fortunately there are other, more ‘open’ ways to gather configuration settings from network devices – using TFTP in conjunction with scripted Telnet or SSH Telnet interactions is a consistent and more easily maintained approach that can be applied to all manufacturers and all devices.All the above change and configuration management tasks can be automated using network change and configuration management (NCCM) software solutions, the best of which will cover desktop PCs together with change and configuration management of your servers and all network devices such as firewalls, switches and routers.

A Guide to Help You Pick the Best Air Purifier for Your Loved Ones

Holidays are around the corner. This is the time of year when people start purchasing gifts for their loved ones. If you are going to purchase an air purifier for someone you love, we have some helpful tips for you. If you want to purchase the best unit, you may be able to use this guide to your advantage. Read on to find out more.

1: Set Your Budget

Just like anything you purchase, make sure you have set your budget first. The price of the unit will vary based on a lot of factors, such as the capacity, filter type, features, and brand of the unit. If you don’t have a flexible budget, we suggest that you go for a product that is available to purchase for less than $300.

2: Consider the Needs of the Recipient

Your next move is to consider the needs of your recipient. If you are going to purchase this unit for everyday use, we suggest that you go for a unit that comes with a HEPA filter. On the other hand, if your loved one has a specific need, we suggest that you consider a specialized unit.

For example, if they are more prone to respiratory issues, such as allergies and infections, we suggest that you get a UV purifier for them. The devices are designed to neutralize viruses and bacteria.

3: Think About the Available Space

Another primary factor is to consider the available space in the office or house of the recipient. For example, if they need a general-purpose unit for a small apartment, you may want to consider a filterless unit.

On the other hand, if they have plenty of free space, you may consider a bigger unit that features a higher airflow rating. These units are powerful enough to cover a large face.

4: Consider Extra Features

Lastly, we suggest that you consider additional features that they will just love. For example, some units come with an indicator that turns on when the filter needs to be replaced. This will allow the user to change the filter so that the device continues to work properly.

So, you may want to consider these features before you place your order. These features may not be important to you, but your friend may just be over the moon.

Long story short, we suggest that you consider these four tips if you are going to purchase a gift for your loved one on these holidays. Since the air is full of pollution during winter days, nothing can make a better gift than an air purifier. Therefore, you should consider these tips before looking for an online or physical store to make your purchase decision.