Untapped growth prospects lure PE firms to non-banking finance companies - Economic Times Untapped growth prospects lure PE firms to non-banking finance companies - Economic Times

Monday, June 4, 2012

Untapped growth prospects lure PE firms to non-banking finance companies - Economic Times

Untapped growth prospects lure PE firms to non-banking finance companies - Economic Times
The NBFC segment continues to be niche and lacks penetration, thus holding huge growth potential. Though there are some 12,000 NBFCs in the country, a majority of them are not active and also it is not easy to get a licence due to stringent regulatory guidelines.

Over the past year, the Reserve Bank of India has been tightening its grip over NBFCs. Some of the measures it has taken include advising banks to cut exposure to gold finance companies to 7.5% from 10% in six months and introduction of securitisation rules that discourage direct bilateral sales of loans to banks.

In addition, the regulator is likely to come up with a host of regulations for the sector in the next couple of months. The RBI is expected to issue draft guidelines based on Usha Thorat Committee recommendation this month.
The committee had recommended a higher capital adequacy norm and asset classification and provisioning norms similar to those for banks. To add to the woes of the NBFCs, another committee headed by MV Nair has recommended that bank loans to them be stripped of the priority sector tag.

As per RBI norms, banks need to direct 40% of their loans to agriculture and other mandated areas that are together known as priority sectors, limiting banks' exposure to NBFCs to 5%.

However, despite the regulatory clampdown, the sector holds good potential for return. Sequoia Capital got five-fold returns on exiting from Kerala-based NBFC Manappuram General Finance & Leasing in just three years. In early 2007, Sequoia had invested $14 million (about 75 crore) in the firm for nearly 14% stake. In 2010, Sequoia sold its entire stake for $70 million (about 380 crore) in the open market.

"It is a capital-intensive business. Capital-adequacy requirement has gone up from 12% to 15%," said V Lakshmi Narasimhan, CFO of Magma Fincorp. "Private equity players are investing in NBFCs that are present in niche segments and have good governance. Long-term story is attractive." Private equity firms like KKR and IFC had invested in Magma Fincorp in June, 2011.

Thakkar of FIDC adds: "Once the final guidelines of the Usha Thorat Committee and Nair Committee are in place, this sector will see more interest."

According to I Unnikrishnan, managing director of Kerala-based gold finance company Manappuram Finance, NBFCs raise funds through debt depending upon the management's comfort. "We need to have minimum capital in terms of equity. Raising funds through PE or debt is a function of how comfortable the management is," says Unnikrishnan.



Finance Minister Pranab Mukherjee favours 25 per cent cut in states taxes on petrol - Economic Times
NEW DELHI:Finance Minister Pranab Mukherjee today made out a strong case for a 25 per reduction of taxes levied by states on petrol to bring down its price.

Speaking at the day-long meeting of the Congress Working Committee (CWC), he justified the high price of petrol because of the overall international price of crude.

He said the states needed to also do their bit on reduction of petrol price.

Corruption and price rise were the most important issues during the discussion at the CWC.

KPCC President Ramesh Chennithala attacked the petroleum companies for raising the petrol prices, especially at a time when Kerala was witnessing a bye election, that put the party in trouble.

He wanted the government to take back the power to decide oil prices.



Finance Services Leaders Appeal for Limited Government Aid to Fight Cyber Attacks - PC Advisor

A group of industry experts representing the financial services industry, an increasingly popular target for cyber criminals, on Friday appealed to members of a House subcommittee for limited government action to help banks and other institutions protect themselves and their customers from the growing breadth and sophistication of online attacks.

Their wish list includes policy changes to facilitate greater sharing of threat information among public- and private-sector entities, stricter law enforcement in the United States and abroad, and a more holistic approach to the policing the Internet ecosystem.

Banks and other financial services firms already have sophisticated cybersecurity mechanisms in place, of course, but even state-of-the-art perimeter defenses can't guard against every threat vector, according to Michele Cantley, senior vice president and chief information security officer with Regions Bank, who testified at Friday's hearing on behalf of the Financial Services Information Sharing and Analysis Center. That group counts more than 4,400 members, accounting for the majority of the U.S. financial services sector.

"[C]orporate account takeover attempts cannot be stopped solely by the financial institutions," Cantley said. "All participants in the Internet ecosystem have roles to play. Banks, for instance, have no direct control over the end customers' computers, nor can banks control what emails bank customers open or what websites they visit prior to accessing their online systems."

Cantley concurred with other witnesses in their appeal for removing legal and compliance barriers to sharing threat information, an issue addressed by a bill that recently won approval in the House and awaits consideration in the Senate, where it faces an uphill climb amid competing cybersecurity legislation in an election season. Though they expressed some reservations about privacy and confidentiality concerns in the bill, the witnesses said they broadly supported the Cyber Intelligence Sharing and Protection Act.

But Cantley also told lawmakers that financial firms and others across the public and private sectors need to do more to educate users about safe computing, training them to detect the warning signs of phishing attacks, malware and other threats. Additionally, Cantley suggested that lawmakers could pursue legislation that would give Internet service providers more flexibility to filter out traffic carrying malicious content so that fewer threats would ever make to unsuspecting users' desktops.

Those appeals came with the predictable caveat that industry groups would resist initiatives to impose more prescriptive regulations that would oversee their cybersecurity efforts on a technical level.

Friday's hearing comes amid rising concerns about vulnerabilities not only to individuals transacting with financial institutions, but to the corporate networks themselves. After all, as the notorious outlaw Willie Sutton is said to have quipped when asked why he robbed banks, "That's where the money is," recalled Rep. Scott Garrett (R-N.J.), chairman of the House Financial Services Committee's Subcommittee on Capital Markets and Government-Sponsored Enterprises.

"Unfortunately, just as there have been many and numerous instances of identity theft out there, where individuals have credit cards stolen or accounts looted, there has also been a significant rise in corporate account takeovers as well," Garrett said.

But there is an important distinction between the garden-variety denial-of-service attacks perpetrated by hacker collectives such as Anonymous that can knock a site off line—grabbing headlines in the process—and the attacks that can infiltrate the inner walls of critical digital infrastructure such as financial trading platforms or top-secret nuclear systems, said Mark Graff, chief information security officer at NASDAQ OMX.

Graff, who only joined NASDAQ in April, has spent more than two decades in information security, including a recent stint overseeing the defenses at Lawrence Livermore National Laboratory, where nuclear secrets were among the more sensitive assets under his guard.

"I changed industries, but most of the challenges and many of the adversaries remain the same," said Graff, who stressed the need for tiered security that isolates mission-critical assets behind additional firewalls or in distinct network zones, keeping them away from the Internet.

"One key message in both institutions is the isolation of critical systems from the Internet at large. While many of the services we deliver to customers worldwide are housed on Internet-facing Web services, our trading and market systems are safely tucked away behind several layers of carefully arranged barriers," he said. "This is an important distinction to remember, and we should all keep this in mind when you hear about denial-of-service attacks against one institution or another. Any troublemaker can run up to the front door of a house and ring the doorbell over and over again, and that's what most denial-of-service attacks amount to."

Graff said that those attacks, while they might temporarily block consumers from accessing certain websites, are typically nothing more than an act of "vandalism," hardly a sign that anyone has gained entry to the house, by his metaphor.

But even in seeking to remove the sensationalism from the often breathless media coverage of cyber attacks, Graff acknowledged that the threats are very real.

"Effectively, all of the systems represented at this table," he said, "they're all under attack all the time at some level, in contrast to the situation just a few years ago. Today Internet attacks are a little bit like weather. We have a little bit more rain or a little less rain. Sometimes there's a hurricane that comes at us, but generally speaking they're all under attack."

In addition to a more fluid information-sharing framework—a point on which nearly all observers agree— Graff argued that corporate systems could achieve a higher degree of stability if hardware manufacturers and software producers did a better job of building security in at the time of production.

Additionally, he suggested that lawmakers and government officials could dramatically improve the nation's security posture if they took steps to shore up the supply chain for parts that tech companies import from overseas, citing concerns that compromised hardware could provide hostile foreign actors, including those working at the behest of their government, with an entry point into critical U.S. systems.

"The supply chain problem, the threats of supply chain attack, are really, I think, perhaps the knottiest problem, the most serious issue that faces us, and the one that would be most susceptible to help from government," Graff said. "I think it's one where the U.S. government really could make the biggest assistance."

Kenneth Corbin is a Washington, D.C.-based writer who covers government and regulatory issues for CIO.com.

Follow everything from CIO.com on Twitter @CIOonline, on Facebook, and on Google +.

Read more about government in CIO's Government Drilldown.


No comments:

Post a Comment