Document authentication and identity verification platform with AI-powered document validation, facial recognition matching, liveness detection, and integration with global AML watchlists. Offers customizable risk-based approach with detailed verification results and compliance reporting.
More about Acuant (Acquired by GBG)
Platforms for verifying customer identities, assessing risk, and meeting regulatory requirements for customer onboarding.
More Know Your Customer (KYC)
More Compliance ...
Document Verification Verifies government-issued identity documents such as passports, driver's licenses, or identity cards. |
AssureID offers government-issued document verification for passports, driver’s licenses, and other IDs as part of its KYC solution. | |
Biometric Authentication Uses facial recognition, fingerprints, or other biometrics for identity validation. |
Product documentation and marketing indicate support for facial recognition and biometric validation in identity checks. | |
Liveness Detection Validates that a real person is present during the verification process to prevent spoofing. |
Liveness detection is listed as a feature on Acuant AssureID materials to ensure a real person is present. | |
Data Cross-Checking Automatically cross-checks customer data against third-party databases or watchlists. |
Acuant AssureID cross-checks customer data against global AML and watchlists as stated in official product brochures. | |
Optical Character Recognition (OCR) Extracts and auto-fills information from documents using OCR technology. |
Acuant AssureID uses OCR to extract information from identity documents per their technical specifications. | |
Verification Speed Average time taken to verify identity documents and update status. |
No information available | |
Multi-Language Support Supports document types and interfaces in multiple languages. |
Acuant supports multiple languages for both document types and user interfaces per product documentation. | |
Video Verification Enables recorded or live video sessions for compliance with regulatory requirements. |
Video verification capabilities are described as available for regulatory compliance scenarios. | |
Name Matching Accuracy Rate at which the system accurately matches submitted names against government data. |
No information available | |
Geolocation Check Confirms the customer's location during onboarding. |
No information available |
Automated Risk Scoring System assigns risk scores based on customer profiles and behaviors. |
Product documentation mentions configurable risk scoring based on AI-powered analysis. | |
PEP Screening Checks for Politically Exposed Persons among customers. |
Marketing states support for PEP screening in customer onboarding processes. | |
Sanctions and Watchlist Screening Verifies customers against domestic and international sanctions lists. |
Sanctions and watchlist screening is a prominent feature listed as compliant with global AML regulations. | |
Adverse Media Checks Automated scanning for negative news regarding the customer or entity. |
Acuant states it provides adverse media checks for enhanced due diligence. | |
Custom Risk Rules Bank can configure custom criteria for risk assessment. |
Risk-based approach includes configurable custom risk rules per bank or FI requirements. | |
Transaction Monitoring Integration Integrates customer risk scores with transaction monitoring systems for continuous compliance. |
Cites integrations with transaction monitoring solutions enabling risk scoring linkage. | |
Ongoing Due Diligence Frequency Frequency with which ongoing due diligence checks are automatically performed. |
No information available | |
Risk Scoring Algorithm Transparency Provides auditability and explainability for risk score decisions. |
Acuant advertises audit trails and explainability for risk-based decisions as part of its compliance support. | |
Alert Generation Rate The average number of risk or compliance alerts generated per month. |
No information available | |
Remediation Workflow Enables escalation and case management for high-risk findings. |
The solution includes remediation workflows for escalation and compliance investigations. |
Data Encryption at Rest Customer data is encrypted when stored in databases. |
States data storage uses encryption at rest per security documentation. | |
Data Encryption in Transit All communications and data transfers are encrypted. |
States data in transit is encrypted (TLS/SSL) as standard for compliance. | |
Role-Based Access Control Granular control of access levels for different users and roles. |
Technical details indicate support for role-based user and admin rights assignments. | |
Audit Trails Comprehensive logging of all user activities for compliance monitoring. |
Audit trail and logging for user activity are listed in compliance features. | |
Data Retention Policy Management Configurable policies for how long KYC data is retained. |
Product offers configurable data retention and purge policies in accordance with KYC regulations. | |
GDPR Compliance Product is compliant with European Union General Data Protection Regulation. |
Lists EU GDPR compliance on website and in documentation. | |
Data Anonymization Ability to anonymize personal data for analysis or testing. |
Support for data anonymization for analysis and test environments is stated in privacy policy and documentation. | |
Consent Management Mechanisms for capturing and tracking customer consent for data usage. |
Consent management for data use is included in onboarding and data privacy features. | |
Incident Response Time Average time to respond to data breach or privacy incident. |
No information available | |
Third-Party Audit Certifications Availability of SOC 2, ISO 27001, or similar security certifications. |
Acuant AssureID is SOC 2 and ISO 27001 certified according to website and third-party audit listings. |
Automated Regulatory Reporting Generates and submits compliance reports automatically. |
Product generates automatic compliance reports as part of regulatory features. | |
Country-Specific Compliance Modules Supports legal requirements unique to different jurisdictions. |
Documented support for country/jurisdiction-specific compliance options. | |
Audit Logs Stores detailed, tamper-evident records of actions for regulatory audits. |
Audit logs are maintained, as part of regulatory compliance support. | |
Change Management Logging Tracks all system configuration and policy changes. |
No information available | |
Regulatory Update Alerts Notifies users of regulatory or legal changes affecting compliance processes. |
No information available | |
SAR/CTR Filing Automation Supports Suspicious Activity Report (SAR) and Currency Transaction Report (CTR) generation and filing. |
Acuant AssureID supports SAR/CTR filing automation for regulatory reporting according to compliance documentation. | |
Regulatory Filing Accuracy Accuracy rate of generated compliance reports. |
No information available | |
Exception Management Tools for handling and resolving compliance exceptions. |
Exception management capability is part of case management and compliance modules. | |
Compliance Dashboard Central dashboard displaying current regulatory status and key compliance metrics. |
Compliance dashboard showing regulatory status is part of admin/user features. | |
E-signature Support Allows digital signing of regulatory documents. |
Digital e-signature support is available for regulatory documents per feature lists. |
Mobile Onboarding Customers can complete onboarding entirely from mobile devices. |
Mobile onboarding is emphasized as a core functionality for customer convenience. | |
Self-Service Portal Customers can update information or complete KYC tasks without direct assistance. |
Self-service onboarding and updating of information is supported through online portals. | |
Guided User Flows Step-by-step guidance for users to complete KYC requirements. |
Guided, step-by-step onboarding user flows are marketed as a usability feature. | |
Status Tracking Customers and bank staff can track the status of KYC verification in real time. |
Status tracking is available for both customer and staff in dashboards. | |
Multilingual Interface User interface available in multiple languages for diverse populations. |
Multilingual user interface is referenced in product literature for global coverage. | |
Accessibility Compliance Interfaces conform to accessibility standards such as WCAG. |
Compliance with accessibility standards (WCAG) is listed for inclusivity. | |
Onboarding Completion Rate Percentage of users who successfully complete onboarding. |
No information available | |
Onboarding Time Average time for a customer to complete the KYC onboarding process. |
No information available | |
Real-Time Support Chat Live assistance during onboarding to resolve customer queries. |
Product claims support for real-time chat or assistance during onboarding process. | |
Custom Branding Ability to brand the onboarding interface with the bank’s logo and colors. |
Custom branding for bank or partner onboarding experience is mentioned. |
API Availability Provides documented APIs for programmatic integration. |
A documented API is available for integration with external systems. | |
Core Banking System Integration Seamless connection to the bank's core systems. |
Supports integration to bank core systems via APIs and partner modules. | |
Third-Party Data Source Integration Connects to external data sources for validation checks. |
Third-party data source integrations are available for validation and watchlist checks. | |
Identity Provider Integration Supports common SSO and identity providers for staff user authentication. |
No information available | |
Webhook Support Triggers real-time notifications to other platforms via webhooks. |
Webhook support for real-time notification and status is in API documentation. | |
Batch Upload/Processing Supports bulk uploads and processing for large volumes of KYC requests. |
Batch document/image upload and processing are available for institutions with high volumes. | |
Custom Workflows Supports creation of organization-specific onboarding and KYC workflows. |
Supports custom workflows for customer onboarding/KYC requirements. | |
Data Export Options Multiple export formats (CSV, XML, JSON) for KYC data. |
Data can be exported in multiple formats (CSV, XML, JSON), per product FAQs. | |
Sandbox Environment Provides a non-production environment for integration testing. |
Acuant provides sandbox environments for partners and clients to test integrations. | |
Integration SLA Service level agreement for integration uptime and support. |
No information available |
Synthetic Identity Detection Detects attempts to create accounts with fabricated identities. |
Synthetic identity detection/AI-driven alerts are referenced in fraud detection feature summaries. | |
Device Fingerprinting Identifies devices used by customers to detect and prevent fraud. |
No information available | |
IP Reputation Analysis Assesses whether a customer's IP address is associated with suspicious activity. |
No information available | |
Behavioral Analytics Uses AI/machine learning to identify abnormal user behaviors. |
Behavioral analytics is highlighted in descriptions of fraud and risk modules. | |
Fraud Detection Rate Proportion of fraudulent accounts or attempts detected by the system. |
No information available | |
Fraud Response Time Average time to respond to a suspected case of fraud. |
No information available | |
Blacklist/Whitelist Management Maintains lists of suspected or trusted customers for screening. |
Blacklist/whitelist management included as part of fraud and risk controls. | |
Velocity Checks Identifies rapid, repeated attempts to onboard or bypass controls. |
Velocity checks are provided as part of the fraud monitoring suite. | |
Rule and Threshold Management Allows the bank to set and adjust fraud detection parameters. |
Configurable rules/thresholds for fraud detection are supported. | |
Case Management Integration Integrates with case management for escalated investigations. |
Case management and integration for ongoing investigations is mentioned in technical specs. |
Periodic KYC Refresh Automated reminders and workflows for routine re-verification. |
Platform supports periodic KYC refresh with automated reminders as part of compliance routines. | |
Event-Based KYC Triggering Automatically triggers reviews based on significant customer actions. |
Event-based re-verification/triggering on significant customer events is a documented workflow. | |
Continuous Transaction Monitoring Links KYC data to transaction analysis for real-time alerts. |
Continuous monitoring of transactions for KYC/AML linkage is supported. | |
Change Detection Detects and flags changes to customer information. |
Change detection for customer info is implemented for audit and compliance. | |
Ongoing Sanctions Monitoring Continuous screening against updated sanctions and watchlists. |
Ongoing sanctions/watchlist monitoring is mentioned in product compliance features. | |
Risk Profile Updating Frequency How often customer risk profiles are reviewed and updated. |
No information available | |
Automated KYC Reminders Automatic notifications sent to customers for compliance tasks. |
Automated reminders for compliance and KYC refresh are included in user and admin workflows. | |
KYC Status Dashboards Provides staff with overview dashboards of KYC statuses. |
KYC status dashboards available for staff review, as mentioned in product UI screenshots. | |
Escalation Workflow Configurable workflows for cases that fail ongoing checks. |
Configurable escalation workflow is supported when ongoing KYC checks fail. | |
Bulk Update Capability Ability to update KYC records for multiple customers at once. |
Bulk update capabilities are referenced for large customer portfolios. |
Custom Report Builder Create tailored reports on KYC processes and outcomes. |
Advanced reporting tools for custom report building are available. | |
Predefined Regulatory Reports Templates for standard compliance reports. |
Standard report templates for compliance purposes are provided. | |
Real-Time Analytics Dashboards Live dashboards for monitoring KYC performance metrics. |
Real-time analytics dashboards are referenced for monitoring onboarding and KYC verifications. | |
Data Export for BI Tools Exports data for integration with business intelligence tools. |
Data export specifically to BI tools (CSV, JSON, APIs) is supported. | |
KYC Failure Rate Percentage of KYC applications that fail to meet compliance requirements. |
No information available | |
Average Verification Time Report Analysis of time taken for verification steps. |
Reporting for average verification time is highlighted in analytics modules. | |
Trend Visualization Visualizes changes in KYC-related KPIs over time. |
Trend visualization for KYC metrics and KPIs is provided on reporting dashboards. | |
Data Quality Checks Automated flagging and reporting of data inconsistencies. |
Automated data quality checks are implemented to improve onboarding accuracy. | |
User Audit Logs Exportable activity logs for user actions. |
Exportable user audit logs are available for compliance review. | |
API Access for Reporting Allows third-party reporting and data analysis tools to access KYC data via API. |
API access for external reporting tools is supported through documented RESTful endpoints. |
Concurrent User Capacity Maximum number of users that can simultaneously access the platform. |
No information available | |
KYC Processing Throughput Number of KYC verifications processed per hour. |
No information available | |
System Uptime SLA Guaranteed system uptime as per service agreement. |
No information available | |
Cloud Deployment Support Can be deployed in cloud environments for scalable infrastructure. |
Cloud deployment and SaaS model is the default; documentation covers AWS and Azure deployments. | |
Horizontal Scalability System can scale by adding more servers or instances. |
Product can scale horizontally in cloud environments, as described in technical architecture. | |
Disaster Recovery RPO Recovery Point Objective in case of disaster. |
No information available | |
Elastic Resource Allocation Automatically adjusts resources based on workload. |
No information available | |
Load Balancing Distributes workload evenly across system resources. |
Elastic resource allocation is available in the cloud-hosted model. | |
Queue Management Manages high load and processing queues efficiently. |
Load balancing and queue management features are available for high-volume clients. | |
Performance Monitoring Real-time monitoring of system performance metrics. |
Real-time and historical system performance monitoring features are available for admins. |
24/7 Customer Support Round-the-clock availability of customer service. |
24/7 customer support is offered, as specified by vendor website and datasheets. | |
Dedicated Account Manager Assigned vendor representative for ongoing support. |
A dedicated account manager is assigned for enterprise clients, per sales collateral. | |
User Training Resources Availability of training materials and programs for staff. |
Training resources and onboarding support are available. | |
Knowledge Base Access Comprehensive articles and documentation available online. |
Comprehensive online knowledge base is provided for end users and partners. | |
Regular System Updates Scheduled updates for new features and compliance changes. |
Regular system and regulatory compliance updates are included in SAAS agreement. | |
Custom Feature Development Ability to request and implement bespoke product features. |
Custom feature development is available for enterprise customers (per RFP, enterprise tier). | |
Support Ticket Resolution Time Average time to resolve a standard support ticket. |
No information available | |
SLAs for Issue Escalation Contracted timeframes for addressing critical issues. |
No information available | |
User Community Forum Online forum for peer support and knowledge sharing. |
User community forum access is listed as available for product users. | |
API Versioning & Deprecation Notices Advance communication of changes to integration APIs. |
API versioning and deprecation notices are included as part of developer documentation. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.