End-to-end encrypted collaboration and chat, robust compliance monitoring features, archival and e-discovery, support for surveillance and supervision tools, and integrations with leading risk and compliance solutions tailored for financial institutions and asset managers.
More about Cloud9 Technologies (acquired by Symphony)
Systems that capture, archive, and monitor electronic communications including email, chat, and voice to ensure compliance with recordkeeping requirements and prevent inappropriate communications.
More Secure Communication Monitoring
More Risk & Compliance ...
End-to-End Encryption Ensures all data transmissions are encrypted between communicating parties. |
Product documentation and marketing materials state end-to-end encrypted collaboration and chat. | |
Data at Rest Encryption Protects stored data from unauthorized access using encryption. |
Robust compliance monitoring solution for financial institutions implies encryption of data at rest. | |
Transport Layer Security (TLS) Utilizes TLS protocols for secure communications. |
Vendor security resources mention use of TLS for external and internal communications. | |
Key Management Robust system for managing encryption keys, including rotation and revocation policies. |
No information available | |
Data Masking Ability to mask sensitive data to prevent unauthorized disclosure. |
No information available | |
Zero Trust Architecture Implements principles of zero trust to restrict lateral movement and access. |
No information available | |
Secure APIs APIs are protected with authentication and rate-limiting to prevent abuse. |
API documentation references secure OAuth for authentication and rate limiting. | |
Audit Logging Maintains secure logs of all actions and changes for audit trail. |
Marketing references detailed audit logging and e-discovery support. | |
Data Loss Prevention (DLP) Monitors and prevents unauthorized data exfiltration. |
No information available | |
Anonymization/Pseudonymization Ability to anonymize or pseudonymize sensitive data for compliance. |
No information available | |
Multi-Factor Authentication Requires multiple forms of authentication for system access. |
Product materials cite MFA as a core access requirement for compliance. | |
Intrusion Detection Monitors data environments for signs of intrusion or compromise. |
Materials mention continuous monitoring for suspicious activity, which implies intrusion detection. | |
Compliance with Standards Adheres to recognized security standards such as ISO 27001 or SOC 2. |
The platform targets financial institutions and refers to compliance with standards such as SOC 2. | |
Security Patch Management Ensures prompt deployment of security updates and patches. |
No information available | |
Granular Access Controls Fine-grained user and role-based access permissions. |
Marketing states support for granular, role-based access controls. |
Email Monitoring Can capture and analyze email communications from various providers. |
Supports email archiving and monitoring for compliance-driven workflows. | |
Instant Messaging Monitoring Supports chat applications like Bloomberg, Teams, Slack, and WhatsApp. |
Includes chat surveillance for platforms including Symphony and third-party chat integrations. | |
Voice Communication Monitoring Records and analyzes voice calls for compliance. |
No information available | |
Social Media Monitoring Monitors platforms such as Twitter, LinkedIn, and Facebook. |
No information available | |
SMS/Text Message Monitoring Captures and analyzes text messages including SMS and MMS. |
No information available | |
Video Conferencing Monitoring Supports monitoring of Zoom, WebEx, and similar video platforms. |
No information available | |
Mobile Device Integration Ability to monitor communications on mobile platforms. |
Emphasis on secure mobile collaboration and compliance monitoring from mobile devices. | |
Multi-Language Support Understands and processes communications in multiple languages. |
No information available | |
Cloud App Integration Integrates with SaaS communication tools. |
Platform offers SaaS-based integrations (e.g., with Salesforce and other cloud apps). | |
Real-time Data Capture Ability to monitor and capture communications in real time. |
Real-time monitoring and alerting are highlighted in compliance solution documentation. | |
Legacy System Integration Compatibility with on-premise and older systems. |
Integration partners and professional services support legacy infrastructure integrations. | |
Custom Channel Support Option to configure and monitor bespoke channels. |
Professional services and APIs enable custom channel support for bespoke communication channels. |
MiFID II Compliance Ensures monitoring features enable compliance with MiFID II. |
MiFID II compliance is explicitly mentioned for European clients. | |
SEC/FINRA Compliance Features suited for SEC/FINRA communication surveillance requirements. |
Documented support for SEC/FINRA compliance standards and regulatory requirements. | |
GDPR Support Facilitates privacy and data protection under the European GDPR. |
GDPR-compliant data handling mentioned for EU customers. | |
Retention Policy Management Configurable message retention periods for regulatory requirements. |
Retention policy management advertised for region-specific legal and regulatory requirements. | |
Automated Compliance Reporting Generates reports and monitoring summaries for auditors and regulators. |
Enables automated report generation for compliance reviews and auditors. | |
Pre-configured Policy Templates Templates for standard compliance monitoring based on best practices. |
No information available | |
Exportable Audit Trails Easily exportable, immutable logs to share with regulators. |
Audit trail export is a key component of regulatory and internal reviews per site. | |
Data Sovereignty Controls Ensures data remains within legally required geographic boundaries. |
No information available | |
Certification Documentation Provides compliance certificates and documentation support. |
Platform provides downloadable certification documentation for SOC, GDPR, etc. | |
Workflow for Legal Hold Supports litigation hold requirements on communication records. |
No information available |
Keyword and Phrase Detection Advanced filtering to detect sensitive, risky, or banned terms. |
Marketing and support documentation note keyword/phrase surveillance for risky terms. | |
Machine Learning/AI Detection AI-based pattern recognition for advanced risk insight and anomaly detection. |
AI-driven risk and anomaly detection capabilities referenced in compliance and risk descriptions. | |
Natural Language Processing (NLP) Uses NLP to understand context and intent in communications. |
Uses Natural Language Processing (NLP) in communication surveillance as per product page. | |
Sentiment Analysis Determines sentiment/tone to help flag negative or escalating conversations. |
No information available | |
Behavioral Analytics Identifies unusual behaviors such as off-channel or after-hours contact. |
No information available | |
Insider Threat Detection Flags activities indicative of insider threats or compliance breaches. |
No information available | |
Automated Alert Generation Automatically generates alerts for high-risk communications. |
Product suite offers customizable alerts on risky or sensitive communications. | |
False Positive Reduction Tools Features for tuning and fine-tuning engines to minimize false positives. |
Marketing materials and documentation note tools for tuning alert policies to reduce false positives. | |
Rule-Based Monitoring Flexible creation of rules and scenarios for detection. |
Product supports custom rule creation for detection logic in compliance systems. | |
Customizable Risk Scoring Assigns risk scores based on detected patterns and behaviors. |
No information available | |
Volume of Communications Processed Maximum amount of data/messages processed per day. |
No information available |
Case Management Integrated dashboards for assigning, tracking, and closing compliance cases. |
Case management for compliance workflows and evidence tracking presented in site materials. | |
Alert Workflow Management Custom workflows for triaging and resolving flagged incidents. |
Custom workflow configuration for managing and resolving compliance alerts described on product pages. | |
Evidence Preservation Capabilities to lock and secure critical evidence for legal or compliance needs. |
Archival and e-discovery features highlight preservation of evidence for compliance purposes. | |
Search and Filtering Advanced querying, filtering, and sorting for efficient review. |
Advanced search and filtering capabilities emphasized across compliance suite documentation. | |
Keyword Highlighting Highlights detected keywords and phrases in investigator view. |
Keyword highlighting in investigator dashboards referenced in demo and product screenshots. | |
Bulk Actions Supports bulk tagging, commenting, escalation, or closure of alerts. |
Bulk escalation and management for compliance alerts described in workflow support documentation. | |
Collaboration Tools Allows multiple reviewers to collaborate, communicate, and add notes. |
Enables collaborative review and annotations according to feature descriptions. | |
Annotation and Tagging Ability to annotate and tag communications for future reference. |
No information available | |
Export and Print Options Enables secure export or print of evidence for regulatory requests. |
Export and download options for compliance evidence referenced. | |
Time to Resolution Average time taken to close an alert or investigation. |
No information available |
User Scalability Maximum concurrent or supported users. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored. |
No information available | |
Processing Speed Average speed at which messages or records are processed. |
No information available | |
Cloud Deployment Options Availability of cloud-native, on-premises, or hybrid deployment. |
Cloud-native, on-premises, and hybrid deployment options detailed in technical and sales resources. | |
High Availability Designed for minimal downtime with autoscaling and redundancy. |
Mission critical messaging and monitoring marketed as high-availability. | |
Disaster Recovery Built-in capabilities to recover from failures or outages. |
Disaster recovery is mentioned in enterprise product infrastructure resources. | |
Load Balancing Distributes workload across resources to ensure stability. |
No information available | |
Elastic Storage Automatically scales storage with data growth. |
No information available |
Intuitive Dashboard Modern, clear user interface for quick overview and navigation. |
Modern user interface and intuitive dashboard presented in screenshots and demos. | |
Customizable Views Personalized dashboard, reporting, and alert configurations. |
Dashboards, alerts, and reports can be personalized by user per marketing materials. | |
Role-Based Access Control Functionality and access limited by user roles and permissions. |
Access for different compliance, review, and supervision user roles as mentioned on product specs. | |
Single Sign-On (SSO) Integration with enterprise SSO providers for seamless access. |
Integration with enterprise SSO advertised for seamless enterprise access management. | |
Mobile Access Ability to access monitoring functions from mobile devices. |
Mobile apps and web access from mobile devices described. | |
Accessibility Compliance Adherence to standards such as WCAG for disabled users. |
No information available | |
Multi-Lingual Interface User interface available in multiple languages. |
No information available | |
Self-Service Help/Training Embedded support resources, tutorials, and documentation. |
No information available | |
Notification Preferences Users can customize the types and frequency of alerts/notifications. |
Notification preferences and alert configurations customizable per user. |
Open API Comprehensive API for integrating with other enterprise systems. |
Open API support inferred from mention of RESTful APIs for integration. | |
HR System Integration Ability to import user/entity metadata from HR databases. |
Integrations with HR and policy metadata systems referenced. | |
SIEM Integration Integrates with Security Information and Event Management tools. |
SIEM and SOC integration options stated for enterprise deployments. | |
Data Export Capabilities Supports export of raw and processed data to external systems. |
Exporting processed and raw data to external storage and systems is supported. | |
Active Directory Compatibility Syncs with corporate directory and identity management solutions. |
Synchronization with Active Directory for user and group management listed. | |
Custom Integration Support Provides professional services for custom integrations. |
Professional services for custom connector development highlighted. | |
Webhook Notifications Supports real-time event notification through webhooks. |
No information available | |
Third-party Marketplace Connectors Integration-ready connectors for popular SaaS and compliance tools. |
Marketplace connectors for integration with risk, archive, and compliance tools promoted on website. |
Custom Report Builder Easy-to-use interface for generating tailored reports. |
Report customization tools described for compliance and risk reporting. | |
Scheduled Reporting Automated delivery of regular reports to specified recipients. |
Support for automatically scheduled compliance and surveillance report delivery. | |
Export to Multiple Formats Reports can be exported to PDFs, Excel, CSV, etc. |
Export to multiple formats like PDF and CSV referenced in reporting documentation. | |
Data Visualization Tools Graphs, heatmaps, and other visual tools to spot trends. |
Visualizations (graphs, charts) are available in compliance dashboards. | |
Drill-Down Capabilities Ability to investigate from aggregated data down to individual messages. |
Drill-down from aggregated alerts to message-level detail shown in demos. | |
Regulatory Filing Support Templates and exports for regulatory reporting. |
Regulatory-specific export and reporting formats mentioned. | |
Access Control on Reports Limits report access by user/role. |
Report access controlled by role and user per compliance configuration options. | |
Historical Data Comparison Compare metrics and alert rates over different timeframes. |
Historical report comparison and benchmarking features highlighted in documentation. |
Privacy-by-Design Features Default settings and architectures protect user privacy. |
Default to strong privacy controls and minimization, privacy by design referenced on website. | |
Ethical Filtering Opportunities to exclude personal or confidential discussions from monitoring. |
No information available | |
Employee Consent Management Tracks and enforces employee consent for monitored channels. |
No information available | |
Privacy Notices and Disclosures Built-in mechanisms for notifying monitored users. |
No information available | |
Redaction Tools Ability to redact data from records before access or sharing. |
Documented as having redaction features for e-discovery and reviews. | |
Right to be Forgotten Supports deletion of records upon legitimate requests. |
GDPR right to be forgotten/workflow support announced for EU clients. | |
Data Minimization Collects and retains only necessary data. |
No information available | |
Access Review Automation Monitors and reports on who accesses what data and when. |
No information available |
24/7 Support Availability Round-the-clock customer or technical support. |
24/7 and global technical support options offered for financial industry clients. | |
Onboarding Assistance Help with initial setup, configuration, and migration. |
Onboarding and migration support described under professional services. | |
Regular Updates Continuous improvement and maintenance with regular updates. |
Continuous improvement and regular product updates are highlighted. | |
Knowledge Base Access Comprehensive support portal with documentation and FAQs. |
Online knowledge base with documentation and FAQs available. | |
User Community Active online community for sharing best practices and troubleshooting. |
No information available | |
Dedicated Account Manager Single point-of-contact for customer relationship. |
Enterprise plans assign a dedicated account manager for large institutional clients. | |
Service Level Agreement (SLA) Defined response and resolution times for support inquiries. |
Service Level Agreement (SLA) available for enterprise deployments. | |
Training Options Availability of live or web-based training sessions. |
Live and web-based training sessions offered as part of the onboarding process. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.