Digital KYC onboarding, AML transaction analytics, risk rating, case management, and custom rule-building for capital markets and brokerage compliance.
More about IdentityMind (Acquired by Prove)
Systems for screening clients against watchlists, monitoring transactions for suspicious activity, and maintaining regulatory compliance documentation.
More AML/KYC Compliance Software
More Compliance ...
Identity Document Verification Ability to verify government-issued identity documents (passports, national IDs, etc.) electronically. |
IdentityMind core offering lists government ID and digital KYC onboarding, indicating electronic document verification. | |
Facial Recognition/Matching Matches client-provided photos with ID documents using facial recognition technology. |
Product marketing and technical documentation state inclusion of biometric/facial matching for onboarding. | |
Sanction List Screening Checks clients against global and local sanction, PEP, and watchlists. |
Transaction analytics leverages sanction/PEP/watchlist screening as confirmed by product web materials. | |
Adverse Media Screening Searches for negative news related to clients using media and public data sources. |
Adverse media screening is referenced as part of enhanced due diligence in product info. | |
Ongoing Customer Monitoring Continuously screens existing clients for changes in status or newly published risks. |
Ongoing monitoring and continuous KYC are described in product features. | |
Risk Scoring Engine Assigns dynamic risk scores to clients based on risk factors and behaviors. |
Risk rating/scoring engine is a highlighted market differentiator. | |
Regulatory Jurisdiction Coverage Number of countries or jurisdictions supported for compliance checks. |
No information available | |
Language Support Number of languages supported for global client onboarding and screening. |
No information available | |
Enhanced Due Diligence Handling Supports additional data collection and review for high risk clients. |
Enhanced due diligence capabilities (EDD) specifically mentioned on product page. | |
Batch Processing Capability Ability to process multiple client screenings at once. |
No information available | |
Customizable Screening Criteria Allows modification of threshold and parameters for screening rules. |
Indicated as custom rule-building for screening and risk assessment. |
Real-Time Transaction Monitoring Automatically scans transactions for suspicious patterns as they occur. |
Real-time transaction analytics/monitoring is a primary product feature. | |
Behavioral Pattern Detection Uses profiling and analytics to detect unusual or unexpected patterns. |
Behavioral/typology analytics for AML included as core differentiator. | |
Rule-Based Alert System Configurable rules trigger alerts for pre-defined risk scenarios. |
Configurable rules for alerts on suspicious transactions is a key function. | |
Machine Learning/AI Analytics Employs AI models to detect previously unknown or emerging risks. |
Explicit mention of machine learning/artificial intelligence for AML/fraud detection. | |
Alert Prioritization Ranks alerts based on severity and risk relevance for efficient case handling. |
No information available | |
False Positive Management System features to reduce unnecessary alerts and streamline review. |
Product claims reduction in false positives and efficiency in AML case workload. | |
Volume Handling Capacity Maximum number of transactions monitored per second. |
No information available | |
Integration with Trade/Order Systems Direct connection to brokerage trade/order platforms for seamless monitoring. |
Integration with trading platforms (for AML in capital markets) is supported per use cases. | |
Peer Group Analysis Compares client behavior against similar client group averages. |
No information available | |
Historical Data Analysis Supports backtesting and review of historical transactions for compliance audits. |
Audit, case management, and forensic features cover historical transaction review. | |
Automated Case Escalation Automatically escalates suspicious cases for compliance officer review. |
Cases with automatic escalation for compliance analyst review described in solution workflow. |
Integrated Global Lists Supports all major regulatory and financial watchlists (OFAC, EU, UN, etc.). |
Integrates with global regulatory lists (OFAC, UN, etc.), as detailed for watchlist management. | |
Custom List Support Allows firms to upload and manage their own internal or regional watchlists. |
Supports custom/internal watchlists as indicated by list management features. | |
Automated List Updates Regularly and automatically fetches the latest list changes. |
Automated and regular watchlist updates are included in documentation. | |
Version Control Tracks list changes and maintains history for audit purposes. |
No information available | |
List Capacity Maximum number of entries supported per watchlist. |
No information available | |
Fuzzy Matching Algorithms Detects similar names or entities with variable spellings. |
Fuzzy/approximate name/entity matching is mentioned among advanced entity resolution capabilities. | |
Alias Handling Supports multiple aliases/names for the same person or entity. |
Alias/AKA management part of core identity graph offering. | |
Bulk List Import/Export Allows batch file management for lists. |
Ability to import/export watchlists in bulk is included in API documentation. | |
Automated Screening Scheduling Configurable schedules for periodic screening runs. |
No information available | |
Geo-Restriction Handling Manages restricted or high-risk regions and jurisdictions. |
Jurisdiction/restriction logic part of risk/monitoring rules. |
Integrated Case File Creation Automatically creates case files upon detection of alerts or suspicious activities. |
Case management system creates files upon flagged events. | |
Investigation Workflow Engine Guided process for analysts through investigation, review, and resolution steps. |
No information available | |
Audit Trail Logging Maintains detailed logs of all actions taken on a case for compliance. |
Audit trail and detailed event logging described for regulatory compliance. | |
Automated Regulatory Filing Generates and submits regulatory reports (e.g., SAR/STR) in the required formats. |
No information available | |
Role-Based Access Control Restricts and manages access to cases based on user roles or responsibilities. |
Role-based access management included for compliance workflows. | |
Escalation and Reassignment Supports multi-level escalation and assignment of cases. |
No information available | |
Case Review SLAs Tracks and enforces service-level agreements for case review duration. |
No information available | |
Document Storage Capacity Maximum storage allocated per case for supporting documents. |
No information available | |
Automated Case Notification Notifies relevant users upon updates, assignment, or need for action. |
Case notifications for assignment/changes included in product workflow diagrams. | |
Case Linking and Relationship Mapping Connects related cases or associates individuals/entities across cases. |
No information available |
Pre-Built Regulatory Report Templates Includes standard report formats required by regulators (e.g., SAR, CTR, STR, KYC logs). |
Product sheet describes standard regulatory reporting template support (e.g. SAR, KYC logs). | |
Custom Report Builder Enables users to design bespoke compliance reports. |
Custom compliance report building capability included. | |
Automated Scheduled Reporting Systematically delivers compliance reports at defined intervals. |
Scheduled/ad-hoc automated reporting functionality mentioned. | |
Regulatory Data Retention Period Number of years for which compliance data is retained. |
No information available | |
E-Filing Integration Supports direct submissions via regulatory authority electronic channels. |
No information available | |
Multi-Jurisdictional Compliance Built-in features for different global regulatory regimes. |
Multi-regulatory regime screening and configuration for global jurisdictions is emphasized. | |
Audit Readiness Toolkit Compilation of tools and logs enabling rapid response to audits. |
No information available | |
Data Anonymization/Redaction Ability to redact or anonymize sensitive customer information in reports. |
No information available | |
Custom Regulatory Mapping Supports mapping of new or changing regulatory requirements. |
No information available | |
Compliance Attestation Support Module for documentation and certification of compliance by officers. |
No information available |
API Access and Documentation Provides detailed APIs for integration with proprietary or third-party systems. |
API access described in product technical resources; REST API offered. | |
Batch Data Import/Export Handles large data sets for bulk upload or download operations. |
Bulk import/export supported via API and UI for client, transaction and list data. | |
Real-Time Data Feeds Supports consumption/production of streaming financial or compliance data. |
No information available | |
Third-Party Data Provider Integration Easy integration with external KYC/AML data sources, credit bureaus, etc. |
References to integration with third-party data vendors (e.g., KYC/credit bureaus/FI data). | |
Compatibility with Core Banking Systems Designed for easy adoption by common brokerage and core financial platforms. |
No information available | |
Customizable Webhooks Triggers actions in other systems upon specific compliance events. |
No information available | |
SSO and Identity Provider Support Integrates with identity management and SSO for organizational identity control. |
Supports SAML/SSO for enterprise identity. | |
Plugin/Extension Support Can be extended with add-ons for specific compliance needs. |
No information available | |
Connector Library Size Number of pre-built connectors to standard systems/platforms. |
No information available | |
Legacy System Support Compatible with non-modern or legacy brokerage infrastructures. |
Stated ability to integrate into legacy infrastructure, supporting capital markets/brokerage use cases. |
Customizable Dashboards Personalized views for compliance officers, executives, or investigators. |
No information available | |
Mobile Accessibility Access to key features via mobile apps or responsive web interfaces. |
No information available | |
User Workflow Automation Guided flows minimizing manual inputs in common compliance activities. |
Automated/guided onboarding and case workflow described as reducing manual effort. | |
Search and Filtering Tools Advanced tools for rapid data retrieval and case filtering. |
System includes search/filters for cases, clients, and transactions. | |
Bulk Action Tools Support for batch processing and bulk updates. |
Bulk tools for reviewing and updating cases and screening batches. | |
Multi-Language UI User interface offered in multiple languages. |
No information available | |
Accessibility Compliance Meets accessibility standards such as WCAG for user inclusivity. |
No information available | |
User Training and Help Center Built-in education modules and real-time assistance features. |
Training resources and real-time support, as referenced by help center in onboarding materials. | |
Custom User Roles Tailorable user permissions for granular security and workflow management. |
No information available | |
Performance/Load Times Average time taken for the UI to load main dashboards. |
No information available |
Data Encryption In Transit/At Rest Encrypts all sensitive data both in motion and when stored. |
Data encrypted both in transit and at rest by design (industry standard and stated by vendor). | |
Multi-Factor Authentication Requires multiple authentication factors for system access. |
Multi-factor authentication described in access and compliance controls. | |
Access Logging and Monitoring Extensive logs of all user access and administrative actions. |
Extensive logging/monitoring of access and administrator actions confirmed. | |
Penetration Testing Frequency How often the system undergoes external security assessment. |
No information available | |
Data Residency Options Supports choice of specific regions/countries for data storage. |
Vendor supports data residency selection for regulated verticals. | |
Compliance with Industry Standards Adheres to standards such as ISO 27001, PCI DSS, GDPR. |
References to GDPR, ISO 27001 and global compliance in all collateral. | |
User Session Time-Outs Automatic log-off after a period of inactivity. |
Session time-outs/inactivity logoff mentioned as an available control. | |
Field-Level Data Masking Sensitive fields can be masked or hidden from unauthorized users. |
No information available | |
Secure Audit Log Storage Ensures immutability and backup of critical audit logs. |
No information available | |
Incident Response Procedures Documented processes for breach detection and notification. |
Incident response/Breach notification policy mentioned as part of security documentation. |
Concurrent User Limit Maximum number of users supported simultaneously. |
No information available | |
Transaction Processing Latency Average time to process and analyze a single transaction. |
No information available | |
Uptime/Availability SLA Guaranteed system availability often expressed as a percentage. |
No information available | |
Data Ingestion Rate Speed at which system can ingest new compliance data. |
No information available | |
Horizontal Scaling Support System supports scaling across servers/nodes to accommodate growth. |
Product described as horizontally scalable (cloud microservice architecture). | |
Performance Monitoring Tools Built-in dashboards and alerts on system performance metrics. |
No information available | |
Cloud Deployment Option System can be deployed as a cloud (SaaS) or hybrid solution. |
IdentityMind/Prove solutions run as SaaS/cloud by default. | |
On-Premise Deployment Option Supports local/internal hosting for sensitive or regulated data. |
No information available | |
Disaster Recovery RTO Recovery Time Objective in case of system outage. |
No information available | |
Database Size Limit Maximum database size supported without performance loss. |
No information available |
24/7 Support Availability Round-the-clock access to technical and compliance support. |
Support is advertised as 24/7 for enterprise/B2B clients. | |
Dedicated Account Manager Single point of contact for service and issue escalation. |
No information available | |
Self-Service Knowledge Base Extensive library of documentation, FAQs, and training material. |
Self-service knowledgebase and documentation is accessible online. | |
Regular System Updates Frequency of non-disruptive security, functionality and rule updates. |
No information available | |
Custom SLA Options Ability to define support levels and response times contractually. |
No information available | |
Uptime Guarantee Contractual uptime guarantee for system operation. |
No information available | |
Automated Backup Scheduling Scheduled, automated backups of all system and client data. |
No information available | |
Patch Management Tools Automation of system security patching and compliance rule changes. |
No information available | |
User Feedback Loop Mechanisms for users to submit feedback and feature requests. |
No information available | |
Multi-Tier Support Levels Choose from basic to premium support plans based on needs. |
No information available |
Transparent Pricing Model Clearly published and predictable licensing or usage costs. |
Public pricing and fee structure are transparent via vendor site. | |
Pay-As-You-Go Option Usage-based billing for modular feature access. |
Pay-as-you-go pricing and modular/bundled feature access documented. | |
Volume Discounts Available Lower per-unit pricing as transaction or client count increases. |
Volume/usage-based discounts referenced in enterprise pricing. | |
Free Trial/POC Period for free evaluation or proof of concept. |
Proof-of-concept/free trial periods commonly offered and referred on vendor site. | |
Feature-Based Licensing Modular pricing per individual function/module. |
Feature-level/module add-ons are a documented licensing option. | |
Perpetual License Option Option to purchase software outright rather than as a subscription. |
No information available | |
Annual Billing Option Discounted pricing for annual upfront payment. |
Annual billing option is mentioned in the vendor's pricing information. | |
Multi-Entity Licensing Special terms for multi-subsidiary or group licensing. |
No information available | |
Seat/User License Cap Maximum number of named users included without additional charges. |
No information available | |
Additional Data Storage Pricing Published price per additional unit of data storage. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.