FTI Journal
FTI Journal | Critical Thinking at the Critical Time
 

Chinese Companies Want in on the US Market. Here’s Their Instruction Manual

Chinese Companies Want in on the US Market. Here’s Their Instruction Manual

What steps do Chinese companies need to follow to take advantage of the goldmine of investors and liquidity of the U.S. market? 

O

pportunities abound for companies listing in the U.S. — the country ranks in the top echelon for doing business, with rigorous listing and disclosure standards. But getting a foot in the door simply isn’t enough to tap into the vast liquidity available while attracting and maintaining long-term shareholders. To thrive, companies must perform due diligence and be fully engaged in day-to-day activities. 

The New York Stock Exchange (NYSE) has been encouraging Chinese companies to consider the U.S. as either their primary listing venue or as a complementary one in addition to their primary listing. Even with turbulent trade talks continuing between the U.S. and China, investors can expect to see new Chinese companies looking to enter the NYSE after a long period of uncertainty.

Choosing how to enter the U.S. public markets is a critical process. The investment community puts the onus of good, transparent business practices on listed companies — and there are no shortcuts to addressing investor concerns and expectations. Chinese companies that can develop a strong governance policy, effectively communicate with investors and bridge the cultural gap, have the brightest futures. By following expected policies and practices, they can potentially tap into a sophisticated investor base with additional visibility and a more stable valuation that hopefully compounds over time in tandem with their growing businesses.

While foreign companies have numerous international options for public listing, the U.S. capital market provides a multitude of benefits, including:

  1. A positive regulatory environment that supports the path to listing and being a public company
  2. The deepest pool of liquidity in the world
  3. Access to sophisticated and diversified investors

To more fully understand the process companies should follow to ensure a smooth entry into the U.S. markets, as well as the challenges and opportunities they will face, click here. 

Published November 2018

© Copyright 2018. The views expressed herein are those of the authors and do not necessarily represent the views of FTI Consulting, Inc. or its other professionals.

About The Authors


Glenn Tyranski
glenn.tyranski@fticonsulting.com
Managing Director
Forensic & Litigation Consulting
FTI Consulting

Paul Downie
paul.downie@fticonsulting.com
Senior Managing Director
Strategic Communications
FTI Consulting

Share This

Related Articles

Latest Articles

  • Stay Protected While Connected: Wi-Fi Safety
    Stay Protected While Connected: Wi-Fi Safety
    Think your Wi-Fi connection is secure? Think again. Whether at home or in public, the connection may leave a window open for nefarious actors to climb inside your digital life. In the third of four articles for National Cybersecurity Awareness Month (October), FTI’s cybersecurity team presents essential best practices for protecting your wireless connection.
  • Secure Your Data by Tightening Your Weakest Links
    Secure Your Data by Tightening Your Weakest Links
    The old adage “you’re only as strong as your weakest link” is spot-on when it comes to safeguarding your computer systems from cyber attack. In the second of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents essential best practices for fortifying basic barriers that secure your most sensitive data.
  • Keep Your Phone Close — And Your Data Closer
    Keep Your Phone Close — And Your Data Closer
    With employees depending heavily on their mobile devices to accomplish business goals, the need to keep those devices secure is imperative. Here, in the first of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents best practices for securing your mobile device.

Related Articles

Latest Articles

  • Stay Protected While Connected: Wi-Fi Safety
    Stay Protected While Connected: Wi-Fi Safety
    Think your Wi-Fi connection is secure? Think again. Whether at home or in public, the connection may leave a window open for nefarious actors to climb inside your digital life. In the third of four articles for National Cybersecurity Awareness Month (October), FTI’s cybersecurity team presents essential best practices for protecting your wireless connection.
  • Secure Your Data by Tightening Your Weakest Links
    Secure Your Data by Tightening Your Weakest Links
    The old adage “you’re only as strong as your weakest link” is spot-on when it comes to safeguarding your computer systems from cyber attack. In the second of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents essential best practices for fortifying basic barriers that secure your most sensitive data.
  • Keep Your Phone Close — And Your Data Closer
    Keep Your Phone Close — And Your Data Closer
    With employees depending heavily on their mobile devices to accomplish business goals, the need to keep those devices secure is imperative. Here, in the first of four articles for National Cybersecurity Awareness Month (October), FTI Cybersecurity presents best practices for securing your mobile device.
It looks like you're enjoying this article. If you'd like to receive email updates from the FTI Journal, please consider subscribing.
The views expressed in this article(s) are those of the author and not necessarily those of FTI Consulting, Inc., or its professionals.
©Copyright, FTI Consulting, Inc., 2012. All rights reserved.

http://ftijournal.com/article/chinese-companies-want-in-on-the-us-market.-heres-their-instruction-manual