HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
Provides a centralized solution for managing fraud and compliance risk with real-time transaction monitoring, machine learning, and customizable rules.
Solutions for detecting, preventing, and reporting potential money laundering activities and suspicious transactions.
More Anti-Money Laundering Systems
More Compliance ...
Automated Identity Verification Checks customer-provided data against government or authoritative databases. |
ACI Proactive Risk Manager offers automated KYC identity verification as part of its onboarding compliance suite. | |
Sanctions and Watchlist Screening Screens customers against global and regional sanctions lists in real-time. |
The product conducts real-time sanctions and watchlist screening for all transactions and account holders. | |
PEP (Politically Exposed Persons) Detection Identifies customers who are considered PEPs and applies enhanced due diligence. |
Supports PEP screening and enhanced due diligence as cited in marketing and compliance documentation. | |
Ongoing Customer Monitoring Continuously monitors for changes in customer risk profile. |
Continuous customer risk profile monitoring is advertised as a core feature for AML compliance. | |
Ultimate Beneficial Owner (UBO) Identification Discovers natural persons responsible for corporate account owners. |
Product materials highlight UBO discovery for business-client compliance. | |
Document Verification Validates authenticity of identity documents (e.g., passports, IDs). |
. | No information available |
Risk Scoring Automation Assigns and updates risk ratings based on data and behavior. |
Risk scoring is automated through machine learning and rule-based systems, as outlined in technical resources. | |
Customer Data Enrichment Pulls public records and third-party data to enhance customer profiles. |
Data enrichment using third-party data and public records is mentioned in capability descriptions. | |
Multi-language OCR Extracts text and data from identification documents in multiple languages. |
. | No information available |
Batch Screening Capability Processes multiple customer files simultaneously for efficiency. |
Batch screening for KYC and transaction monitoring is explicitly listed as a function. |
Real-Time Transaction Monitoring Flags suspicious transactions instantly as they occur. |
Real-time transaction monitoring is central to the product’s value proposition. | |
Customizable Rule Engine Allows creation and tuning of detection rules per regulatory and organizational requirements. |
Detection rule customization is an emphasized feature for different regulatory requirements. | |
Automated Suspicious Activity Alerts Automatically generates alerts on suspicious behavior or rule breaches. |
Automated suspicious activity alerts are featured in promotional and technical documents. | |
Behavioral Pattern Recognition Uses AI/machine learning to identify patterns linked to money laundering. |
Behavioral pattern recognition utilizing AI/ML is cited on the product page and data sheets. | |
Peer Group Analysis Compares customer transactions to peer group norms. |
Not as far as we are aware.* Peer group analysis is not specifically mentioned in available documentation. | |
Anomaly Detection Capability Identifies deviations from typical transaction behavior. |
Anomaly detection is indicated as a primary method for identifying fraud and AML risk. | |
Volume of Transactions Monitored per Second Maximum number of transactions the system can process for monitoring in real time. |
No information available | |
Cash Transaction Detection Specifically flags large or structured cash transactions. |
The system can detect and flag large or structured cash transactions per compliance standards. | |
Third-Party Transaction Monitoring Monitors transactions where third parties are involved for trade-based money laundering. |
Supports third-party transaction monitoring for trade-based money laundering scenarios. | |
Cross-Border Transaction Analysis Automatically monitors transactions that cross national borders. |
Cross-border transaction monitoring is discussed as a compliance and fraud control feature. | |
Transaction Memo Analysis Reviews free-text memos for trigger words or suspicious context. |
No information available |
Alert Management Dashboard Centralizes and prioritizes alerts for compliance teams. |
Alert management and dashboarding for compliance teams added in user and admin modules. | |
Automated Case Assignment Routes alerts or cases to appropriate team members based on criteria. |
. | No information available |
Investigation Workflow Automation Guides investigators through standardized investigation steps. |
. | No information available |
Case Linking Links related cases or alerts for consolidated investigation. |
. | No information available |
Case Notes & Document Attachment Allows adding text notes and uploading supporting files for cases. |
. | No information available |
Investigation Time Metrics Tracks and reports time spent investigating each case. |
. | No information available |
Automatic Case Closure Closes cases automatically based on resolution rules. |
. | No information available |
Collaboration Tools Supports teamwork via comments, tagging, and shared access within cases. |
. | No information available |
Audit Log for Case Actions Tracks all actions taken on a case for compliance purposes. |
. | No information available |
Number of Concurrent Cases Supported Capacity for simultaneous active cases. |
. | No information available |
Automated SAR/STR Filing Automatically generates and submits Suspicious Activity/Transaction Reports to authorities. |
No information available | |
Custom Report Builder Enables tailored reports to meet specific jurisdictional standards. |
Report builder and exporting functionality are outlined, including jurisdictional adaptation. | |
Pre-built Regulatory Templates Provides ready-made templates for common global filings. |
. | No information available |
Audit Trail of Reports Maintains a complete log of who created, edited, and submitted reports. |
. | No information available |
Submission Acknowledgement and Validation Confirms receipt and compliance from regulatory bodies. |
. | No information available |
Bulk Report Submission Supports batch sending of multiple regulatory reports at once. |
. | No information available |
Automated Deadline Reminders Reminds users before regulatory submission deadlines. |
. | No information available |
E-filing Integration Direct integration with regulators’ electronic portals. |
. | No information available |
Submission Speed Average time taken to submit a report electronically. |
. | No information available |
Multi-jurisdictional Support Handles filings to multiple regulatory authorities across countries. |
. | No information available |
Real-time Sanctions List Updates Automatically updates internal lists with global latest sanctions. |
. | No information available |
List Management Tools Customize, append, or prioritize lists as per institutional requirements. |
. | No information available |
Fuzzy Matching Algorithms Detects potential matches despite name spelling variations. |
Fuzzy matching for names on watchlists is stated as a critical feature for sanctions and compliance. | |
Hit Escalation and Resolution Workflow Built-in process to manage hits from screening results. |
. | No information available |
False Positive Reduction Minimizes unnecessary investigation workload. |
. | No information available |
Batch Screening Capabilities Processes large volumes of entities in one job. |
. | No information available |
List Source Auditability Keeps records of list versions and update dates. |
. | No information available |
Watchlist Screening API API for real-time screening in external systems. |
. | No information available |
Screening Throughput Maximum entities screened per minute. |
. | No information available |
Automated List Synchronization Ensures all systems refer to the same up-to-date listings automatically. |
. | No information available |
Risk Dashboard Visualized risk metrics, heatmaps, and summaries for management. |
. | No information available |
Customer and Transaction Risk Scoring Calculates risk scores based on multifactor models. |
. | No information available |
Institutional Exposure Reports Breaks down risk by business lines, products, geographies. |
. | No information available |
Automated Model Validation Continuously tests and validates risk scoring models. |
. | No information available |
Scenario/Sensitivity Analysis Assesses how risk metrics change with hypothetical rule changes. |
. | No information available |
Regulatory Reporting Metrics Key performance indicators aligned to regulatory requirements. |
. | No information available |
Historical Data Retention Maintains historical records for trend and pattern analysis. |
. | No information available |
Predictive Analytics Uses ML/AI to predict future financial crime risks. |
. | No information available |
Custom Analytics Module User-defined analytics and dashboards. |
. | No information available |
Number of Analytics Reports Supported Maximum parallel analytics reports generated. |
. | No information available |
Core Banking Platform Integration Connects with main system of record to extract customer and transaction data. |
Integrates with core banking platforms to obtain customer and transaction data. | |
Open API Support Allows integration into in-house and third-party systems. |
Open API support for connecting to in-house and third-party systems is described in technical integration documents. | |
Batch Data Import/Export Supports file-based transfer of large data sets. |
. | No information available |
Real-Time Data Sync Synchronizes AML-relevant data across systems without manual intervention. |
Batch data import/export available for onboarding and investigation workflow. | |
Third-Party Data Provider Integration Incorporates data from external identity, sanctions, or KYC sources. |
Integration with external KYC, sanctions, and data sources is documented. | |
Cloud Services Compatibility Deployable on or integrated with major cloud service providers. |
No information available | |
Custom Integration Toolkits SDKs or low-code configurations for bespoke integrations. |
. | No information available |
Number of Supported Integrations Maximum number of direct system integrations supported. |
. | No information available |
Webhooks Support Ability to automatically notify external systems of events. |
. | No information available |
ETL (Extract, Transform, Load) Capabilities Handles data normalization and enrichment when importing/exporting data. |
. | No information available |
Comprehensive Audit Logs Captures all system and user actions for audit purposes. |
Comprehensive audit logs and compliance-ready event tracking supported as part of system controls. | |
Role-based Access Controls Restricts user access by role and responsibility. |
Role-based access controls mentioned as a standard security feature. | |
Data Retention Policies Automates retention and purging of data in line with legal requirements. |
. | No information available |
Compliance Policy Documentation Stores and tracks changes to internal compliance policies. |
. | No information available |
Automated Quality Assurance Checks Periodically reviews and reports on compliance adherence and anomalies. |
. | No information available |
Process Audit Trail Completeness Degree to which all AML processes are logged and reviewable. |
. | No information available |
Regulatory Change Management Support Monitors and implements required changes following regulation updates. |
Product supports monitoring regulatory changes and implementing updates. | |
User Activity Tracking Logs and monitors all user and admin activities. |
. | No information available |
No. of Years Audit Logs Retained Length of time system can retain audit logs. |
. | No information available |
Automated Compliance Alerts Notifies compliance team about procedural breaches. |
. | No information available |
End-to-End Encryption All data in transit and at rest is encrypted. |
. | No information available |
GDPR & Data Privacy Compliance Supports compliance with global privacy regulations. |
GDPR and other data privacy compliance is listed in regulatory documentation. | |
Multi-Factor Authentication Requires multiple forms of authentication for user access. |
Multi-factor authentication is highlighted as a recommended practice for users. | |
Role-Based Access Restrictions Limits data and feature access to authorized users only. |
. | No information available |
Sensitive Data Masking Redacts or masks sensitive fields in the user interface. |
. | No information available |
Regular Penetration Testing System is tested periodically for vulnerabilities. |
. | No information available |
Audit-Ready Security Certifications Holds certifications such as ISO 27001, SOC 2. |
. | No information available |
Incident Response Workflow Defines and automates incident notification and escalation procedures. |
. | No information available |
Maximum Concurrent Users Supported Securely Number of users the system can support concurrently with no performance/security degradation. |
. | No information available |
Data Breach Notification Automation Automatic alerts to compliance and security teams in case of breach. |
. | No information available |
Intuitive User Interface Well-organized, user-friendly dashboards and navigation. |
Claims an intuitive user interface designed for operator productivity. | |
Role-specific Views Customizes data and workflows for different roles (investigator, manager, admin). |
. | No information available |
Configurable Workflow Automation Allows operators to automate repetitive processes. |
Provides configurable workflow automation based on business and compliance requirements. | |
Multilingual Support System available in multiple user languages. |
. | No information available |
Custom Alerts and Notifications Users can set personalized notification rules. |
. | No information available |
Mobile Device Accessibility Accessible from tablets and smartphones. |
. | No information available |
User Training and Tutorials Offers onboarding and contextual help to new users. |
. | No information available |
Number of Customizable Fields Number of fields users can customize per workflow. |
. | No information available |
Bulk Operations Support Ability to perform actions (e.g. closing alerts) on many cases/records at once. |
. | No information available |
System Uptime Guarantee Guaranteed service availability percentage. |
. | No information available |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.