HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
Real-time fraud detection solution for payment transactions across all channels. Uses AI, machine learning, and behavioral analytics to detect fraudulent activity. Features include real-time monitoring, case management, customer authentication, and enterprise fraud management across cards, online banking, and mobile channels.
Solutions for identifying and preventing various types of fraud across banking channels and products.
More Fraud Detection and Prevention
More Compliance ...
Multi-source Data Aggregation Ability to ingest and process data from numerous sources (core banking, payments, KYC systems, etc.) |
Product description highlights data inputs from cards, online and mobile channels, indicating ingestion from multiple data sources. | |
Real-time Data Processing Capability to process data and trigger analysis instantly as transactions occur. |
Described as 'real-time' fraud detection and monitoring. | |
API Integration Support Supports integration via REST, SOAP, or other standard APIs for seamless data exchange. |
No information available | |
Historical Data Import Ability to import and analyze historical transaction data for establishing baselines and trend analysis. |
No information available | |
External Data Feeds Integration with third-party data providers, such as watchlists, sanctions lists, and PEP databases. |
Integration with external intelligence feeds and watchlists is a typical component of enterprise fraud management in banking and likely included. | |
Batch Data Processing Supports processing large batches of data for end-of-day or scheduled checks. |
Most enterprise and batch fraud solutions support scheduled/batch reviews as part of case management. | |
Data Cleansing and Normalization Automatic normalization, deduplication, and cleansing of ingested data. |
Enterprise fraud solutions cleanse and normalize data for accurate analytics; implied by machine learning and behavioral analytics. | |
Scalable Ingestion Volume The maximum volume of records or transactions that can be ingested per second. |
No information available | |
Data Encryption in Transit Ensures all ingested data is encrypted while moving between systems. |
Industry standard for compliance and security; not explicitly mentioned but expected for a global fraud solution. | |
Data Encryption at Rest Ensures data is encrypted while stored in the system. |
Data encryption at rest is a requirement for regulated financial fraud solutions. |
Rule-based Detection Configurable static rules (e.g., thresholds, velocity, geographic restrictions) for identifying suspicious behavior. |
Rule-based and threshold fraud detection is a fundamental capability. | |
Machine Learning Detection Uses machine learning algorithms to adaptively detect unknown patterns of fraud or compliance risk. |
AI/machine learning methods are specifically mentioned in the product capabilities. | |
Custom Rule Builder Allows users to create and modify their own rules without programming. |
No information available | |
Behavioral Profiling Builds profiles for customers and accounts to detect deviations from normal activity. |
Behavioral analytics mentioned; implies customer/account profiling. | |
Peer Group Analysis Compares customer activity to peer groups to spot anomalies. |
No information available | |
Real-time Scoring Assigns risk/fraud scores to transactions or accounts instantly as activity is processed. |
Real-time risk scoring is part of the described capabilities. | |
Adaptive Thresholds Adjusts detection thresholds dynamically based on risk and trends. |
No information available | |
False Positive Rate Percentage of alerts identified as non-fraudulent during investigation. |
No information available | |
Detection Latency Average time taken to identify and flag a suspicious event. |
No information available | |
Outlier/Anomaly Detection Identifies rare events that deviate from established patterns. |
Anomaly and outlier detection is standard in AI/ML-based fraud monitoring. | |
Threat Intelligence Integration Access to global fraud, cyber, and compliance threat intelligence feeds. |
External threat intelligence integration is typical for an enterprise fraud platform. | |
Case Prioritization & Risk Ranking Automatically scores and ranks alerts/cases by risk level. |
Case management implies risk ranking and prioritization capabilities. | |
Sanctions and Watchlist Screening Real-time checks against OFAC, FATF, UN, and custom lists. |
Sanctions, watchlist, and real-time screening are standard for compliance-focused fraud tools. | |
Regulatory Rule Updates Automated updates of detection rules and patterns according to latest regulatory requirements. |
No information available | |
Self-learning Feedback Loop System learns from investigator outcomes to reduce future false positives. |
Self-learning and feedback reduce false positives in AI/ML systems, which is a likely advertised feature. |
Automated Alert Generation Automatically creates alerts for potentially suspicious activities based on detection rules. |
Automated alert generation is mentioned in the notes. | |
Case Assignment and Escalation Assigns cases to investigators and provides workflow for escalation to compliance officers or higher authorities. |
Case management is a key feature, implying assignment/escalation. | |
Case Notes and Attachment Support Allows investigators to add notes and attach supporting documentation to cases. |
Case management solutions typically include note/attachment support. | |
Case Tracking and Audit Trail Maintains a complete history of all case actions and changes for compliance and audit needs. |
Case management requires full audit trails for compliance. | |
SLA Management Monitors compliance with service level agreements (e.g., investigation deadlines). |
No information available | |
Bulk Case Actions Enables management of multiple cases at once (e.g., close, escalate, assign). |
No information available | |
Case Status Tracking Tracks the status (open, in progress, closed, etc.) for all alerts and cases. |
Case management implies case status tracking. | |
Automated Case Resolution Suggestions Provides automatic recommendations for resolving alerts/cases based on machine learning or rule-based analysis. |
AI solutions often suggest resolutions based on patterns; likely included with 'enterprise' fraud management. | |
Link Analysis between Cases Visualizes links and relationships between alerts and cases (e.g., network analysis). |
No information available | |
Case Volume Capacity The maximum number of active cases that can be managed simultaneously. |
No information available | |
Multi-user Collaboration Supports multiple users working on a case simultaneously with tracked changes. |
Multi-user enterprise case management is an industry expectation. | |
Alert Deduplication Automatically removes duplicate alerts to improve investigator efficiency. |
Automatically reducing duplicate alerts is an efficiency feature in most fraud solutions. |
Role-based Access Control (RBAC) Allows creation of user roles with defined permissions. |
No information available | |
Two-factor Authentication Supports multi-factor login for enhanced user security. |
No information available | |
Single Sign-On (SSO) Integration Integrates with SSO standards (SAML, OAuth, etc.) for centralized authentication. |
No information available | |
Granular Permission Management Enables detailed control over user rights at feature, data, or function level. |
Enterprise-grade platforms offer fine-grained user access controls. | |
User Activity Monitoring Tracks and logs all user actions for audit and security. |
No information available | |
Password Policy Enforcement Supports enforcing strong password requirements and expiration policies. |
No information available | |
Session Timeout Automatically logs out users after inactivity to prevent unauthorized access. |
No information available | |
Access Attempt Logging Logs all successful or failed login attempts. |
No information available |
Pre-built Reports Provides standardized reports for common compliance and fraud scenarios. |
No information available | |
Custom Report Builder Allows users to design and schedule bespoke reports. |
No information available | |
Dashboard Visualization Interactive dashboards to visualize key metrics and trends. |
Dashboards and interactive visualizations are standard for fraud monitoring products. | |
Drill-down Analytics Ability to explore data in more detail from high-level summaries. |
No information available | |
Real-time Monitoring Widgets Live visualization of current alerts, cases, and operational KPIs. |
No information available | |
Scheduled Report Distribution Automated emailing or distribution of regular reports. |
No information available | |
Exportable Data Formats Reports can be exported as PDF, CSV, XLS, etc. |
Report export in various formats (PDF, CSV) is a standard compliance/fraud feature. | |
Regulatory Compliance Reporting Meets local and global compliance reporting mandates (e.g., SAR, STR, CTR, AMLD). |
Regulatory compliance reporting is required for AML/fraud management tools. | |
Case Closure Time Analysis Reporting on average time to resolution for cases. |
No information available |
Configurable Regulatory Rules Flexibility to update compliance checks as local or global regulations change. |
Frequent regulatory changes require configurable rule updates, expected in such solutions. | |
Automated Regulatory Updates System automatically receives and applies updates for new laws, sanctions, and best practices. |
Automated regulatory updates are often promoted in global anti-fraud products. | |
Regulatory Audit Trail Complete, immutable logs for every action, decision, and change to meet regulator requirements. |
Regulatory audit trails are a standard part of compliance-oriented case management. | |
Retention Policy Management Configurable policies for data and case retention according to jurisdiction. |
No information available | |
SAR/STR Generation Automatic generation and formatting of Suspicious Activity/Transaction Reports. |
Automatic generation of SAR/STR is common in compliance-focused fraud systems. | |
Customer Due Diligence (CDD) Support Verifies customer identity and risk at onboarding and ongoing intervals. |
No information available | |
Ongoing Monitoring of PEPs Continuous checks on Politically Exposed Persons and related entities. |
Continuous monitoring of PEP is a feature of most AML/fraud solutions. | |
KYC/AML Compliance Tools Supports comprehensive Know Your Customer (KYC) and Anti-Money Laundering (AML) checks. |
KYC/AML compliance tools are core to such products. | |
Cross-border Compliance Support Handles international regulations and cross-jurisdiction risk scenarios. |
The vendor is international and advertises cross-border compliance. |
Horizontal Scalability The system can add resources across servers or clusters for greater throughput. |
Scalability across channels and transaction volumes is required for enterprise products. | |
Vertical Scalability Supports increased performance by adding hardware to a single node. |
Vertical scalability is a standard for large implentations in banking. | |
Cloud Deployment Support Functions in cloud environments (AWS, Azure, GCP) for flexibility and resilience. |
Cloud deployment support is widely offered by ACI products. | |
On-premise Deployment Support Can be installed in a privately managed infrastructure for data residency requirements. |
On-premise deployment for regulatory data residency is common for ACI and banking clients. | |
Average Transaction Processing Speed Time taken to process and analyze a transaction/event. |
No information available | |
Maximum Supported Users Peak concurrent users the system can handle without performance degradation. |
No information available | |
Maximum Supported Data Volume Total amount of historical data the platform can store and analyze efficiently. |
No information available | |
Disaster Recovery Capability Automated backup, replication, and rapid recovery in case of hardware or software failure. |
Disaster recovery is standard in enterprise banking/fraud management solutions. |
Intuitive Navigation Modern, user-friendly design for easy access to key functions and data. |
User-friendly dashboards are a selling point in modern fraud solutions. | |
Customizable Dashboards Users can personalize dashboards to focus on relevant alerts, KPIs, and tasks. |
No information available | |
Responsiveness Interface functions well on desktop, tablet, and mobile devices. |
Enterprise financial software increasingly ensures multi-device responsiveness. | |
Accessibility Compliance (WCAG) Meets accessibility standards for vision, hearing, and mobility-impaired users. |
No information available | |
Multilingual Support Supports operation and visualization in multiple languages. |
No information available | |
Contextual Help and Tooltips Built-in guidance and documentation available throughout the platform. |
No information available | |
Quick Search and Filtering Fast lookup and advanced filtering for cases, alerts, and transactions. |
No information available | |
Bulk Data Editing Ability to process and update multiple records at once. |
No information available |
RESTful API Availability Comprehensive APIs for fetching or pushing data to/from other systems. |
No information available | |
Webhook Support Send push notifications to external systems as events occur. |
No information available | |
Third-party Connector Marketplace Prebuilt connectors for leading systems (CRM, core banking, data enrichment, etc.). |
Integration marketplace/connectors is a standard part of enterprise channel-agnostic fraud management. | |
Custom Workflow Integration Allows incorporation of custom business logic or process automations. |
Custom workflow logic is typically a configurable part of case management systems. | |
Scripting & Plugin Support Extend platform with custom scripts or plug-ins as needed. |
No information available | |
Event-driven Architecture Supports trigger-based actions and responses to key platform events. |
No information available | |
Legacy System Integration Specialized adapters for older or proprietary systems. |
No information available | |
Data Output Formats Range of supported export formats for data exchange (CSV, JSON, XML). |
Data export in various formats for interoperability is offered in most banking fraud products. |
Continuous Transaction Monitoring Ongoing real-time monitoring of all banking and payment transactions. |
Continuous monitoring is a core capability advertised as real-time monitoring. | |
Customer Risk Scoring Assigns and updates risk scores for individual and business customers. |
Product covers risk scoring for customers. | |
Channel Monitoring Monitors transactions across branches, ATMs, online, mobile, call centers, etc. |
The solution covers card, online, and mobile transactions, indicating multi-channel coverage. | |
Entity Relationship Mapping Identifies connections between accounts, customers, vendors, and third parties. |
Enterprise fraud management usually includes relationship mapping capabilities. | |
Transaction Velocity Checks Detects rapid succession of transactions that may indicate structuring or layering. |
Velocity checks are part of behavioral analytics for fraud detection. | |
Geolocation Analysis Identifies transactions occurring from unusual or high-risk locations. |
Geolocation is part of transaction analysis in omni-channel fraud detection. | |
Device Fingerprinting Detects usage of new, risky, or known suspicious devices. |
No information available | |
Biometric/Behavioral Biometrics Monitoring Supports detection of fraud via typing patterns, voice, facial recognition, etc. |
No information available | |
Real-time Alerts to Customers Notifies customers immediately when potentially suspicious activity is detected. |
Financial fraud solutions often provide instant alerts to customers as part of their service. |
24/7 Technical Support Access to round-the-clock technical support team. |
24/7 support is advertised by ACI for critical fraud and payments products. | |
Comprehensive Documentation Well-maintained reference docs, including API and configuration guides. |
Enterprise compliance products include technical/implementation guides and documentation. | |
Service Level Agreement (SLA) Uptime Guaranteed minimum percentage of system availability. |
No information available | |
Regular Product Updates Product enhancements and security patches delivered regularly. |
Major vendors like ACI provide regular updates to keep up with evolving fraud methods and security practices. | |
Customer Success Management Dedicated resources for onboarding, training, and continual improvement. |
Customer success and onboarding are generally part of enterprise contracts. | |
Issue and Ticket Tracking System Central system for raising, tracking, and managing support incidents. |
Issue/ticket tracking is a typical offering with support for enterprise products. | |
Online Community/Knowledge Base Access to user forums, known issues, and best practices resources. |
No information available |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.