Provides real-time fraud detection, case management, suspicious activity reporting, policy and claims fraud analytics, and built-in AML compliance for the global insurance sector.
Solutions that monitor transactions, identify suspicious activities, and ensure compliance with anti-money laundering and fraud prevention regulations.
More Anti-Fraud and AML Compliance Systems
More Compliance and Legal ...
Real-Time Monitoring Ability to evaluate transactions in real-time for potential fraud or AML risks. |
Product advertises real-time fraud detection for insurance transactions. | |
Batch Analysis Supports retrospective analysis of large volumes of historical transactions. |
FIS's analytics includes retrospective analysis and claims fraud, indicating support for batch analysis. | |
Rule-Based Detection Customizable rules or scenarios to flag specific types of suspicious activity. |
Platform supports customizable detection logic/scenario building for fraud, as described in product documentation. | |
Machine Learning Detection Utilizes machine learning models to identify anomalies and advanced fraud schemes. |
Machine learning models are advertised as part of advanced fraud analytics suite. | |
Pattern Recognition Detects complex fraud patterns by analyzing customer and claim behaviors. |
Pattern-based fraud analytics, including behavioral monitoring, is explicitly listed in FIS materials. | |
Alert Generation Speed How quickly alerts are raised after detection of suspicious activity. |
No information available | |
False Positive Rate Percentage of flagged alerts that turn out to be non-fraudulent. |
No information available | |
Threshold Adjustment Allows dynamic setting of thresholds for alert generation. |
Adjustable and customizable alert thresholds are commonly mentioned in FIS AML/Fraud tools. | |
High-Risk List Screening Checks transactions against lists like OFAC, PEPs, and internal blacklists. |
High-risk and sanctions list (e.g., OFAC, PEP) screening is a standard capability for FIS Risk & Fraud. | |
Behavioral Analytics Monitors user and account behavior for changes that may indicate fraud. |
Behavioral analytics is listed as a core offering for fraud prevention. | |
Case Management Integration Links suspicious transactions directly to investigation workflows. |
Case management integration is included, per product notes on suspicious activity reporting and case workflow. | |
Customizable Workflows Ability to adapt workflows to the insurer’s unique requirements. |
Customizable investigative and compliance workflows are possible based on platform configurability. | |
Geolocation Tracking Monitors transactions and activities for location anomalies. |
Many FIS fraud tools include location anomaly detection and geolocation tracking. | |
API Access Availability of API endpoints for event/transaction data input and results output. |
API access and integration for data ingestion/output is referenced in FIS solution briefs. | |
Historical Data Support Handles long-term storage and analysis of transaction records. |
Historical data storage and long-term record analysis available for compliance and trend analytics. |
Identity Verification Automated verification of customer identity documents. |
Identity verification (KYC) is included as part of AML insurance compliance module. | |
Risk Scoring Assigns risk scores to customers based on profile and transaction history. |
Customer and transaction risk scoring capability highlighted in FIS compliance solutions. | |
Sanctions Screening Checks customers against global and domestic sanction lists. |
Global and domestic sanctions screening explicitly delivered for insurance customers. | |
Politically Exposed Person (PEP) Screening Identifies and flags politically exposed persons during onboarding and ongoing monitoring. |
PEP identification and monitoring referenced for onboarding and ongoing customer screening. | |
Adverse Media Checks Regularly screens for negative news or legal actions associated with customers. |
Adverse media and negative news checks are available as part of EDD in FIS product suites. | |
Automated Document Extraction Extracts and analyzes data from submitted identification documents. |
FIS documentation describes automated extraction of document/ID data for CDD/KYC workflows. | |
Ongoing Customer Monitoring Periodically reassesses customers for potential risk changes. |
Ongoing customer and policyholder monitoring, with periodic risk review, included in AML suite. | |
Enhanced Due Diligence (EDD) Extra checks for high-risk customers, including deeper background checks and monitoring. |
Enhanced due diligence functions are available for high-risk clients in FIS compliance platform. | |
Custom Risk Rules Create and adapt risk rules for specific products or geographies. |
Custom risk rule creation and adaptation available in FIS's configurable compliance modules. | |
Customer Data Storage Duration Duration for which customer due diligence data is retained. |
No information available | |
ID Verification Time Average time required to verify customer identity. |
No information available | |
Blacklist Integration Supports custom and industry blacklists for screening. |
Blacklist screening (internal/industry lists) supported within insurance fraud offering. | |
Bulk Processing Capability Ability to verify large volumes of customers simultaneously. |
System is designed to handle bulk/batch verification for large insurance groups. | |
Multi-language Support Availability of customer verification in multiple languages. |
No information available | |
Investor Suitability Checks Evaluates customer suitability for insurance products based on profile. |
No information available |
Automated Case Creation Automatically opens cases when alerts are triggered. |
Automated case creation upon alert suggested by case management system inclusion. | |
Investigator Assignment Assigns cases to appropriate teams or individuals for review. |
Investigator/case assignment referenced in FIS case management tools. | |
Case Prioritization Automatically prioritizes cases based on severity and risk. |
Prioritization of cases by severity/risk is a common feature in enterprise case management (supported by FIS). | |
Evidence Attachment Stores all related documents, proofs, or analytics with a case record. |
System allows attachment of case-related evidence and documentation. | |
Case Status Tracking Monitors and updates the progress of the investigation. |
Supports tracking and updating status of ongoing investigations. | |
Audit Trails Detailed histories and logs of all case actions for compliance. |
Audit trail and case actions logging supports compliance requirements in FIS solutions. | |
Notes and Collaboration Allows multiple investigators to add notes and collaborate on a case. |
Allows notes/collaboration between multiple investigators inside the case management system. | |
Automated Escalation Rules Escalate cases based on predefined rules or deadlines. |
Automated escalation for unresolved/critical cases enabled in case workflow tools. | |
Role-based Access Control Restricts access to sensitive case data based on roles. |
Role-based access to case data included for privacy and compliance assurance. | |
Case Resolution Time Average time to resolve an investigation case. |
No information available | |
Case Reassignment Ability to transfer cases between investigators or teams. |
Case reassignment features are standard in FIS and other insurance case management software. | |
Case Linking Links related cases for context in wider investigations. |
Related alert/case linking supported by case management system as documented. | |
Automated SAR/STR Drafting System assists in creating Suspicious Activity/Transaction Reports. |
Automated SAR/STR draft generation explicitly listed under suspicious activity reporting features. | |
External Data Integration Link case investigations to third-party or external databases. |
Links to external data (watchlists, claims, etc.) referenced in product's interoperability documentation. | |
Case Analytics Aggregate and analyze case data for trends and improvements. |
Case analytics and reporting built into FIS case management dashboards. |
Automated SAR/STR Filing Systematically prepares and submits suspicious activity reports to authorities. |
Automated SAR/STR reporting/filing is a core compliance deliverable of the FIS solution. | |
Currency Transaction Report Automation Handles volume-based reports (like CTRs) for high-value transactions. |
Currency transaction and threshold-based reporting included for AML compliance. | |
Regulatory Format Compliance Processes and exports reports in regulator-mandated formats. |
Output and support for regulator-mandated report formats provided as a compliance feature. | |
Regulation Library Maintains up-to-date regulatory requirements. |
FIS maintains an up-to-date regulatory requirements library within platform. | |
Report Filing Audit Trail Keeps a detailed log of all report generations and submissions. |
Audit trails for report filing and submission are referenced under compliance recordkeeping. | |
Submission Confirmation Receipt Stores official acknowledgments of filed reports. |
Stores electronic copies/confirmations of filings as part of submission workflow. | |
Reporting Timeliness Average time from identification to report filing. |
No information available | |
Automated Data Validation Checks completeness and accuracy of reports prior to submission. |
Data validation/quality checks prior to regulatory submission referenced in product materials. | |
Bulk Reporting Capability Enables batch generation and filing of large numbers of reports. |
Batch/bulk reporting and filings specifically supported for compliance efficiency in FIS. | |
Multi-Jurisdiction Support Supports simultaneous compliance with regulations across countries/regions. |
Multi-jurisdiction regulatory support for global insurance sector is featured on product page. | |
Automated Filing Scheduling Configurable scheduling for recurring regulatory filings. |
No information available | |
Template Customization Allows editing of report templates to match specific regulatory needs. |
Report templates are customizable as noted in product solution description. | |
E-signature Integration Permits digital signing and approval of regulatory reports. |
No information available | |
Alert-to-Reporting Automation Directly escalates flagged alerts to the regulatory reporting workflow. |
Alert-case-regulatory workflows are built in to automate alert escalation and reporting. | |
XML/XBRL Export Exports reports in structured formats for electronic submission. |
XML/XBRL and similar formats referenced in reporting/export features. |
Single Sign-On (SSO) Supports enterprise authentication systems for secure user login. |
Enterprise login and SSO integration is referenced in FIS's user management documentation. | |
Multi-Factor Authentication (MFA) Adds extra account protection during login. |
Multi-factor authentication can be enabled for enhanced login security. | |
Role-Based Permissions User access is granted according to job function or responsibility. |
Role-based user access and permissions included in the FIS security/access model. | |
User Activity Logging Comprehensive logs of all user activity for auditing. |
Monitors/logs all user activity for audit and compliance review. | |
Inactive User Timeout System automatically logs out inactive users. |
Automatic timeout/logoff after a period of inactivity described in technical control documentation. | |
Granular Data Access Controls Fine-grained access management for different data and workflows. |
No information available | |
Password Policy Enforcement Ability to enforce password expiry and complexity requirements. |
Password policy (expiration, complexity) enforcement is referenced within documentation for security compliance. | |
Encryption of Data at Rest Ensures all stored data is encrypted. |
Data at rest is encrypted to meet regulatory/security requirements. | |
Encryption of Data in Transit Secures data exchanged between components and external parties. |
Encryption in transit (TLS/SSL) is standard for FIS enterprise platforms. | |
User Session Monitoring Tracks and manages concurrent user logins and sessions. |
No information available | |
Access Revocation Speed Average time to revoke user access upon termination or suspicion. |
No information available | |
Privileged Access Monitoring Monitors usage of elevated privileges or admin accounts. |
Privileged/admin user access is monitored to ensure security and compliance. | |
Compliance with Security Standards Conforms with standards like ISO 27001, SOC 2, etc. |
FIS meets multiple security/compliance (ISO 27001, SOC 2) standards as part of its offering. | |
Integration with IAM Solutions Works with third-party identity and access management systems. |
No information available | |
Audit-ready Reporting Ability to generate user access and activity reports for audits. |
Audit-ready reporting included in access and compliance documentation. |
Open API Availability Supports open APIs for inbound and outbound data exchange. |
Open API support, including for integration and interoperability, is highlighted in platform materials. | |
Pre-built Connectors Out-of-the-box integrations with industry leading core and claims systems. |
Ecosystem connectors with core/claims systems cited as a competitive advantage. | |
Data Import Flexibility Supports diverse file formats (CSV, XML, JSON) for data intake. |
Supports multiple input formats (CSV, XML, etc.) for data import and onboarding. | |
External Watchlist Integration Ability to import and update external sanctions/PEP watchlists. |
Integration with external watchlists and regular updating referenced. | |
Webhook Support Real-time notifications and event forwarding to external systems. |
Webhook/event notification support is noted for integrations and real-time data push. | |
Legacy System Compatibility Facilitates interoperability with older insurance platforms. |
Legacy (mainframe, older systems) integration described as available, supporting wide insurance adoption. | |
Data Enrichment Integration Connects to third-party data providers for enrichment and validation. |
Data enrichment with third-party sources, including validation, is a documented feature. | |
CRM Integration Direct connection with customer relationship management systems. |
No information available | |
Core Insurance System Integration Time Average time to integrate with main insurance platforms. |
No information available | |
Custom Mapping Tools Tools for mapping data fields and records to internal schemas. |
No information available | |
Data Export Automation Automated pushing of compliance data to external data warehouses. |
No information available | |
Batch Processing Support Handles large volumes of data during off-peak hours. |
Batch processing and handling of data/alerts during off-peak is specifically listed. | |
SOAP/REST API Support Compatibility with different web service technologies. |
SOAP and REST API support available for interoperability. | |
Real-time Data Sync Instant synchronization with integrated systems. |
Real-time data sync across integrated systems referenced on technical architecture descriptions. | |
Customization Services Offers configuration and integration customization. |
No information available |
Customizable Alert Rules Enables creation and editing of alert rules and escalation paths. |
Customizable alert rules and escalation paths included in alerting configuration. | |
Multi-Channel Notification Supports notifications via email, SMS, dashboard, or instant messaging. |
Multi-channel notification (email, SMS, dashboard) supported for critical fraud/AML alerts. | |
On-Call Scheduling Assigns alerts to on-duty investigators based on schedule. |
No information available | |
Alert Suppression/Grouping Advanced rationalization to avoid duplicate or low-impact alerts. |
Alert suppression/grouping supported to reduce noise and optimize incident response. | |
Severity Levels Categorizes alerts by threat level or regulatory risk. |
Alerts categorized by severity/threat, configurable by client. | |
Alert Rate Throttling Controls the frequency of notifications to avoid overload. |
No information available | |
Notification Acknowledgement Requires recipients to confirm receipt of critical alerts. |
No information available | |
Alert Remediation Automation Automatically initiates certain actions based on alert type. |
FIS solutions include automatic alert remediation for certain types of fraud/AML alerts. | |
Escalation Matrix Configurable escalation workflows for unresolved issues. |
Configurable escalation matrix available for unresolved/critical issues. | |
Alert-to-Case Conversion Speed Average time for converting an alert into a case. |
No information available | |
Alert Retention Policy How long alerts are stored for review and audit. |
No information available | |
Visual Alert Dashboard Centralized, real-time alert and incident dashboard. |
Visual dashboards for fraud/AML alerting and incident monitoring are a key selling point. | |
Real-Time Anomaly Notification Immediate notification of flagged anomalies or threats. |
Real-time notification of anomalies integrated with dashboard and alerting. | |
Bulk Alert Management Handles large incident volumes efficiently. |
Bulk incident/alert management referenced as necessary for large insurance organization deployments. | |
Integration with Incident Management Automatic logging of alerts in enterprise incident management systems. |
No information available |
Comprehensive Audit Trail Tracks all actions, configurations, and events for compliance validation. |
Detailed, comprehensive audit trail maintained for all compliance actions and configurations. | |
Automated Compliance Checklists Guided checklists to ensure procedures are followed. |
No information available | |
Regulatory Documentation Repository Centralized storage for all policy and regulatory documents. |
Regulatory document repository (centralized storage) present in compliance management suite. | |
Policy Change Logging Tracks and logs every change to compliance policies. |
Policy change logging and audit referenced under compliance tracking. | |
Automated Audit Preparation Prepares documentation and evidence for audits. |
Automated audit preparation features highlighted in compliance and legal solutions. | |
Third-party Auditor Access Grants temporary access to auditors for system review. |
Temporary, granular system access for external/third-party auditors mentioned. | |
Gap Analysis Tools Identifies areas of non-compliance or risk. |
No information available | |
Compliance Dashboard Visual overview of compliance status and activities. |
Compliance dashboard and monitoring delivered on platform dashboards. | |
Audit-ready Data Export Exports required audit data on demand. |
Audit-ready export capability confirmed in product documentation for compliance. | |
Policy Version Control Maintains a version history of all compliance policies. |
Compliance policy version control included among product features. | |
Automated Reminders Notifies users of upcoming compliance tasks and deadlines. |
Automated reminders/notices for deadlines and renewals available for compliance team. | |
Control Effectiveness Ratings Tracks effectiveness of implemented compliance controls. |
No information available | |
Compliance Training Tracking Monitors completion rates for required training modules. |
Tracks completion of compliance and AML training modules for users. | |
Exception Management Manages and documents compliance/AML exceptions. |
Compliance exception management workflow present for onboarding and ongoing monitoring. | |
Audit Trail Data Retention Duration for which audit trail data is kept. |
No information available |
Data Validation Checks for completeness, accuracy, and correctness upon data entry. |
Data validation and data quality processes implemented as part of client onboarding and ongoing maintenance. | |
Data Cleansing Automated correction and standardization of input data. |
Automated data cleansing included in data management capabilities. | |
Duplicate Detection Identifies duplicate or redundant entries within the data. |
Duplicate detection and remediation is part of FIS data integrity assurance tooling. | |
Data Lineage Tracking Monitors the history and journey of data across the system. |
Data lineage tracking is available for audit and compliance reporting. | |
Field-level Encryption Protects sensitive fields with granular encryption. |
Field-level encryption available for sensitive data fields in compliance contexts. | |
Data Backup Frequency How often backups of critical data are performed. |
No information available | |
Data Restoration Time Average time to restore data from backup. |
No information available | |
Data Retention Policy Compliance Conformance to regulatory or organizational data retention requirements. |
Product retains data per regulatory requirements (GDPR, CCPA, insurance regulation). | |
Metadata Management Captures descriptive information about each data asset. |
Metadata management for compliance, client, and process data referenced in platform materials. | |
Audit Logs on Data Changes Maintains logs of changes to any compliance data. |
Data change logs (audit logs) maintained for all compliance-relevant data. | |
Automated Data Archiving Moves older data to secure storage locations automatically. |
Automated data archiving to secure storage locations included for compliance. | |
Redundancy and Failover Duplicate data and process paths to ensure availability. |
Redundancy and failover for process/data availability specially highlighted. | |
Data Access Monitoring Monitors and logs every access to sensitive or critical data. |
Data access monitoring and audit logs are generated for all user data accesses. | |
Data Masking Conceals confidential data when displayed or exported. |
Data masking for sensitive fields when exporting or viewing referenced under privacy controls. | |
GDPR/CCPA Compliance Meets international privacy and data governance regulations. |
Product addressed GDPR/CCPA compliance for global insurance customers. |
Custom Dashboard Creation Allows users to create personalized analytics dashboards. |
Users can create custom dashboards for analytics/reporting purposes. | |
Pre-built Reports Library of standard reports for compliance and fraud monitoring. |
Library of pre-built compliance/fraud reports is part of analytics offering. | |
Ad Hoc Query Capability Users can create custom queries and reports on demand. |
Ad hoc reporting and querying capability discussed in advanced analytics literature. | |
Drill-down Analytics Ability to explore analytics from summary views into detailed views. |
Drill-down analytics and ability to explore data interactively referenced. | |
Scheduled Reporting Automatic report generation and distribution on a fixed schedule. |
Reports can be scheduled for automatic generation and distribution. | |
Historical Trend Analysis Analyzes changes and patterns over time in compliance activities. |
Historical/trend analysis of fraud, cases, and compliance activities available. | |
Alert/Case Analytics In-depth analysis of alert and case performance and statistics. |
In-depth alert/case analytics referenced in dashboard breakdowns. | |
Export Formats Range of formats (PDF, Excel, CSV, etc.) for exported reports. |
Export to various formats (PDF, Excel, CSV, etc.) noted in reporting documentation. | |
Interactive Data Visualization Dynamic charts, graphs, and heatmaps for visual analysis. |
Dynamic/interactive dashboard widgets, charts, graphs included. | |
User Level Analytics Tracks productivity and actions by investigator or reviewer. |
Tracks actions/productivity at individual user and team level. | |
Regulatory KPI Tracking Monitors compliance with regulatory key performance indicators. |
Regulatory KPI tracking available for compliance performance monitoring. | |
Report Delivery Time Average time to generate and deliver standard reports. |
No information available | |
Live Data Feeds Real-time streaming of analytics and monitoring metrics. |
Live (real-time) analytics/dashboard feeds available for fraud and compliance teams. | |
Cohort Analysis Analyze behavior and outcomes for customer/claim segments. |
No information available | |
Self-Service Reporting Non-technical users can access and build their own reports. |
Self-service query/report setup for non-technical users highlighted. |
User Interface Simplicity Easy to use and navigate for all user roles. |
Product is described as user friendly and simple to navigate for typical insurance operations. | |
Role-specific Views Improves productivity through customized dashboards for different roles. |
Role-based dashboard/views available to optimize for individual/team workflows. | |
Contextual Help In-app assistance and training resources available. |
Context-sensitive help and in-platform tutorials included in product suite. | |
Onboarding Support Comprehensive training and onboarding for new teams. |
Onboarding, implementation, and training support explicitly mentioned. | |
24/7 Technical Support Round-the-clock technical support availability. |
24/7 technical support referenced for all major clients. | |
Multi-language User Interface Supports multiple languages for global teams. |
No information available | |
User Feedback Mechanism Easy submission of user feedback and product suggestions. |
User feedback channels are included for ongoing platform improvement. | |
System Uptime Guarantee Percentage of time the system is guaranteed to be operational. |
No information available | |
Release Frequency Average time between major product updates. |
No information available | |
Knowledge Base Access Documentation and FAQs available for self-service help. |
Knowledge base/FAQ and documentation access provided as part of self-service support. | |
Customizable User Preferences Users can personalize display, notifications, and workflow settings. |
Supports user customization of notifications and dashboard/user preferences. | |
Accessibility Compliance Meets standards for barrier-free access (WCAG, ADA). |
No information available | |
Guided Walkthroughs Built-in tutorials and interactive walkthroughs for new features. |
No information available | |
Mobile Compatibility Available on mobile or responsive to mobile browsers. |
Mobile platform and browser compatibility are referenced in materials for insurance teams. | |
Change Management Support Tools and resources to help teams adopt new workflows. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.