Infrastructure

10:27 AM
Arin Ray and and Sreekrishna Sankar
Arin Ray and and Sreekrishna Sankar
Commentary
50%
50%

Technology Adoption Brings Change to Indian Capital Markets

While foreign brokers have influenced the adoption of high-touch DMA and the FIX protocol in India, Celent analysts say fully automated DMA remains a distant pipe dream as regulators are skeptical.

FIX: The Basis for Technological Advancement

FIX protocol is essential for the adoption of DMA, algorithmic trading, and other technologically sophisticated techniques. Most of these services cannot be handled manually; automation is key. FIX protocol solves this fundamental issue by providing a protocol of communication on top of which all these other sophisticated techniques operate.

The story of FIX adoption in India is intricately tied to the foreign institutional investment (FII) flow into the country. As FII participation has grown over the years, it has indirectly affected the adoption of technologies like FIX in the marketplace. Many international investors have made significant investments in FIX networks and order management systems (OMS) and place their orders through them. Some Indian vendors have developed FIX-enabled order management systems and plan to launch FIX-enabled advanced electronic trading capabilities.

Another driver has been the introduction of DMA. DMA support means support for FIX, and demand from clients for DMA support has spurred FIX adoption. Currently, the FIX protocol has been actively implemented by international players in India for their global operations. Buy side firms that use FIX are typically large traders or part of a global franchise. Sell side firms implement it to meet client expectations and enhance their value. Other firms that trade exclusively in Indian markets do not really require this, unless volumes are high enough to justify the cost involved in using FIX.

—Arin Ray and Sreekrishna Sankarwith are analysts with Celent based in Bangalore, India. They are co-authors of the Celent report, “Indian Capital Markets: Trends and Prospects" For more information, visit Celent.

Previous
3 of 3
Next
Comment  | 
Print  | 
More Insights
More Commentary
One Size Fits Nobody in End User Services
How building profiles from employees' roles and behaviors can help optimize your end user services.
'Enlightened' Non-IT Execs More Likely To Run Secure Organization
Do senior executives understand their role in data security? On the whole, unsurprisingly, no.
No Screwups, Please, We’re Banks
Changing a bank's culture is not going to happen overnight, but having the right tools and levers in house will surely make a big difference over time.
You’re Doing BYOD Wrong: These Numbers Prove It
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
Citibank Brazil Deploys Award-Winning BPM Solution: Now What?
Citibank Brazil automated commercial customer onboarding and reduced cycle time by 70%. But how can a global organization harness the successes of its islands of solutions?
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.
Video
7 Unusual Behaviors That Indicate Security Breaches
7 Unusual Behaviors That Indicate Security Breaches
Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.