Module overview

In its basic function, magnet allows the administration of all master data such as accounts, counterparties, users and much more. It thus forms the foundation for all other magnet™ modules and also allows the exchange of data between the different modules. In addition, magnet also contains the configuration of the security-relevant settings, which are explained in more detail in the section below.

Cash Management

  • Payment transactions
  • Dashboards

Liquidity Management

  • Dashboards
  • AutoDisposition


  • FX
  • Money market
  • Credits / Loans
  • Derivatives
  • 360T Interface

Liquidity Planning

  • FX-Exposure
  • Hedge-Ratio
  • FX-Hedging
  • Rate simulations
  • Deviation analyses (is, plan)


  • Multilateral Netting
  • Service-/Profitcenter
  • Payable/Receivable
  • EFT-Processing
  • IC-Bookings

Financial Accounting - Interface

  • Creation of debtor payment files
  • Posting batch
  • Posting file
  • Different reports

Introduction video


Like our software, the usage fees are modular. Therefore, they are calculated individually for each configuration. In addition to these monthly usage fees for licence costs, server rental, maintenance/updates, the estimated one-off implementation costs are also adapted to the customer and their magnet™ configuration.

We invite you to fill out the price request form. We will then send you an individualised rough offer as soon as possible.

If you are unsure which modules and e.g. the number of users you need, we recommend a presentation of our software in advance. On the occasion of this product presentation, we will address your individual needs. You will then receive a price quotation based on your needs.

Contact us today to arrange a presentation appointment.

Security and Compliance

Compliance is essentially about separation of functions and process monitoring. There are legal requirements for due diligence. Among other things, a company must know its financial and asset situation at all times. Separation of functions means that whoever trades is not allowed to process, book and value these transactions. And of course the other way round.

The security-critical processes in magnet™ meet the highest standards and are divided into three areas:

User management:
This includes, for example, role-based authorisations per company as well as a signature regulation with amount limits.

4-eyes principle:
All changes in the system administration and user administration of magnet™ are subject to the “4-eyes principle”.

System administration:
This is where the security-critical processes are defined, e.g.:

  • Policies for payment transactions
  • Security Policy and everything regarding passwords (e.g. how structures, length, validity, etc.).
  • Two-factor authentication with codes for login procedures, signatures and payees
  • IP restrictions

Software documentation

Of course, the most comprehensive product descriptions are no replacement for getting to know magnet™ in a live version. The following documentation (available for download as a PDF document) will at least give you a brief first impression.

Presentation registration

Anmeldung Präsentation