With Othis you gain a comprehensive view of your net worth and enjoy simplified management of your familys assets.
WEALTH TRACKING
Track all your assets and liabilities across multiple holding entities.
• Banks: Securely link your bank & brokerage accounts across 8,000+ institutions in Europe (UBS, Julius Bär, Deutsch Bank, Erste Bank, Interactive Brokers, Flatex, Trade Republic, Revolut, …)
• Crypto: Securely link your exchange accounts or add coins directly. Get a daily updated view.
• Companies: Add startup or direct equity investments (equity, convertible loans, SAFE, …)
• Real estate: Add all types of properties (house, apartment, land, …)
• Funds: Add your LP investments (hedge fund, private equity, ventures capital, ...)
• Physical Assets: Add physical assets (car, piece of art, watch, ...)
• Other Assets: Add any other assets (patents, …)
• Debt: Add all types of debt (home mortgage, consumer loan, line of credit, ...)
CASHFLOW PLANNING
• Create different events in any currency: capital calls to a fund, purchase of a house, pro-rata company investment, or recurring rental income.
• View running balance and understand when cash flow is insufficient to cover your capital obligations, and when you need to sell securities
• Scenario planning for different cash flow events across multiple holding entities
DOCUMENT MANAGEMENT
• All important documents in one place
• Smart document categorisation
• Sharing of documents to members
COLLABORATE WITH MEMBERS
• Invite your tax adviser, financial adviser or family members
• Share selected investments and related data to members
• Collaborate to plan future scenarios together
PERSONALISED WEALTH PLANNING
• Future-proof wealth planning services for individuals & families
• Inheritance planning to secure your legacy
• Effective governance for longevity of your wealth
• Personalised, discreet and proven
SECURITY
• High-security data centers located in the EU
• End-to-end encryption using AES & SHA-256
• Compliance with EU GDPR and adherence to strict data privacy policies
• Access control enforced through multi-factor authentication
• Real-time threat detection systems