All-in-one advanced analytical platform for risk management and portfolio construction of hedge fund and multi-asset investment portfolios.

Software For Fund of Funds and Multi-Asset Portfolios

Risk Shell is a SaaS software platform that offers advanced risk analytics for risk management and portfolio construction of hedge fund and multi-asset investment portfolios.

Risk Analytics At Your Fingertips

  • Quantitative and qualitative asset screening and manager selection
  • Risk analytics delivering hundreds of statistics
  • Macroeconomic Scenario Screening™
  • Multi-statistic and traditional Peer Group Analysis
  • Returns-Based Analysis and Holdings-Based Analysis
  • Portfolio optimization incl. market-neutral portfolio builder
  • Portfolio What-if analysis
  • Portfolio marginal risk constribution
  • Stochastic simulation and stress testing
  • Risk budgeting
  • Performance attribution analysis, style analysis and factor analysis
  • 50+ interactive charts
  • Shadow accounting for hedge Fund of Funds
  • CRM & Document management
  • Due Diligence tools designed for hedge funds
  • Risk Shell Modules
    Risk Shell Modules
  • Factor Analysis
    Factor Analysis
  • Stress Testing
    Stress Testing
  • Peer Group Analysis
    Peer Group Analysis
  • Portfolio Optimization
    Portfolio Optimization
  • FoF Manager
    FoF Manager
  • FoF Manager Charts
    FoF Manager Charts

Risk Shell Statistics (70+)

Risk Shell Functions


 

FAQs

  • Does Risk Shell support in-house databases?

    Yes, custom data is fully supported. There are two ways of integrating custom data into Risk Shell. First, clients can easily create and maintain their own databases in the Risk Shell framework. Second, we can create a data bridge between our data servers and clients'. Then clients continue maintaining their in-house databases which will by synchronized with Risk Shell.
  • Can I customize Risk Shell configuration?

    Yes, you can select only modules and components you need. We offer several preconfigured Risk Shell packages (Basic, Ultimate I-III etc.) as well as flexible user-defined configurations. Furthermore, you can select required data feeds from the list of supported data vendors as well as use your own data.
  • How often is Risk Shell being updated?

    Usually, we provide 2-3 new Risk Shell releases per month - all based on new development requests of our clients. This way we can ensure a continuous enhancement of the platform as well as address the real needs of our clients.
  • What happens with our workflow if the Risk Shell server is down?

    So far, we have never had a single case of Risk Shell networks failures for the last 10 years. However, in the unlikely event of a network outage, clients can instantly switch to one of our redundant servers, fully synchronized with production servers.
  • Is Risk Shell less secure than desktop applications?

    In fact, Risk Shell is more secure than common desktop applications, because it doesn't require an access to clients' PCs. Risk Shell is hosted on a private dedicated server network and protected by numerous security measures including multiple firewalls and IP validation. It has been thoroughly vetted and approved by top institutional investors imposing strict security requirements.
  • Do you provide backups of clients' data?

    Yes, there are two levels of custom backups: automatic system backups twice a day and user-initiated manual backups. We save system backups for a period of two years.
  • Can you help us migrate our portfolios and data into Risk Shell?

    Yes. Many of our clients come from different analytical platforms where they accumulated significant amounts of research data, portfolio allocations and custom assets (funds). Migrating that data to Risk Shell could be challenging and time consuming. That is why, we offer data migration services covering any data formats across any existing analytical platforms.
  • Does Risk Shell support team environments?

    Yes, it natively integrates special tools for sharing various objects (e.g. portfolios, custom assets, research settings etc.) across team members according to the user-defined access rules. These rules are to set up by system administrators based on clients' requested protocols.
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…