The 'Technology Innovations 2020' special report comprises nine separate articles listed below, these can be read individually or as a sequence.

Story

Achieving one source of truth

Achieving one source of truth

When it comes to technology solutions, five to 10 years ago, private capital firms used to try to select a single software vendor to deliver all functional requirements across the front, middle and back office. This approach had limited success. Most vendors had strengths in certain areas but key weaknesses in others. None could deliver all functionality well. 

Story

Why GPs need to move beyond Excel to move their firms forward

Why GPs need to move beyond Excel to move their firms forward

Simply put, portfolio performance data is a GP’s most valuable asset. It is their record of achievement, their recipe for future success, and their best fundraising tool, all in one. That is why it is unfathomable that most GPs are still relying solely on spreadsheets, 30+ year-old software, as their primary tool for collecting, managing, and analysing their performance data. 

Story

Secondary PE market primed for strong growth

Secondary PE market primed for strong growth

The secondary market is on an upward trajectory. More institutional investors are looking to streamline their holdings and take an active approach to portfolio management. This, in conjunction with travel restrictions resulting from the Coronavirus pandemic, has led to investors becoming more comfortable with the concept of trusting an online platform. 

Story

Cybersecurity crucial as data warehousing increases

Cybersecurity crucial as data warehousing increases

As private equity managers become more comfortable adopting technology, a measure of which has been accelerated by the Covid-19 crisis, their needs are also developing further. The increased adoption of public cloud services is leading to more data-warehousing which in turn results in more in-depth analysis of that data. However, as these firms progress along the technology adoption timeline, they must ensure their cybersecurity is air-tight.