Proactive compliance monitoring solution that detects misconduct in electronic communications. Features include real-time monitoring, intelligent alerting, integrated case management, and customizable rule sets for fund management compliance workflows.
Solutions that monitor trading activities to detect potentially suspicious patterns, market abuse, insider trading, or other compliance violations through pattern recognition and behavioral analysis.
More Trade Surveillance Systems
More Risk & Compliance ...
Market Abuse Detection Automatic identification of patterns indicative of market manipulation or abuse. |
Not as far as we are aware.* Relativity Trace focuses on monitoring electronic communications for misconduct rather than market manipulation in trades; market abuse detection is not its primary feature. | |
Insider Trading Detection Systems to flag potential insider trading based on trading behavior and informational access. |
Detects insider trading based on user activity and behavior in communications; commonly mentioned as a core use case in marketing materials. | |
Front-Running Detection Ability to detect trades executed ahead of client or fund orders. |
No information available | |
Wash Trade Detection Detection of self-trading or artificially generated trades. |
No information available | |
Spoofing/Layering Detection Recognition of order book manipulation techniques like fake orders. |
No information available | |
Cross Asset Class Surveillance Coverage across multiple asset classes (equities, fixed income, derivatives). |
Not as far as we are aware.* System covers asset management fund workflows but is focused on communications rather than cross asset class trade surveillance. | |
Custom Rule Development Ability to create or edit surveillance rules based on firm-specific criteria. |
Supports customizable rules for communications surveillance as indicated in product description. | |
Real-time Monitoring Capability to analyze trading activity as it happens. |
Monitors electronic communications in real time for potential compliance risks. | |
Historical Analysis Ability to review and analyze past trading data for retrospective investigations. |
Supports investigation of historical communications for retrospective compliance analysis. | |
Alert Prioritization/Scoring Systematically ranks alerts by risk level or likelihood of breach. |
Intelligent alerting and prioritization is marketed as a feature. | |
Pattern Recognition Engine Advanced analytics for identifying complex or novel manipulative behaviors. |
Uses analytics to identify suspicious behavior patterns in messages. |
Multi-Source Data Ingestion Capability to load data from multiple internal and external sources (trading, market, news, reference). |
Supports ingestion of data from multiple communication platforms (email, chat, collaboration tools). | |
Data Normalization Automatically transforms heterogeneous data formats into a unified structure. |
Normalizes inputs from different communication sources into a unified review format. | |
Real-time Data Ingestion Speed Latency from data input to analysis. |
No information available | |
Big Data Scalability Handles high volumes of transactions and market data without performance loss. |
Product is designed for global organizations, implying scale for large data volumes from communications. | |
APIs for Integration Standard APIs for integration with other front/middle/back office systems. |
System offers open APIs for ingestion and case management workflow integration (per documentation). | |
Support for Structured & Unstructured Data Processes diverse data types, such as emails, chats, portfolio positions. |
Can process emails, chats, and other unstructured/structured communications for surveillance. | |
Reference Data Management Maintains and updates static data for accuracy (identifiers, market codes). |
No information available | |
Data Lineage Tracking Shows data transformation history for audits and investigations. |
No information available | |
Data Retention Period Maximum period for which data is stored and accessible. |
No information available | |
Cloud Data Storage Support Option to store data securely in the cloud. |
Cloud-based SaaS solution as per product website. |
Global Regulatory Rule Library Built-in rules for major regulations (e.g., MAR, MiFID II, Dodd-Frank, ASIC, HKMA). |
No information available | |
Jurisdiction Awareness Easily applies rules by geographical region or regulator. |
No information available | |
Automated Regulatory Update Mechanism Continuously updates surveillance logic for regulatory changes. |
No information available | |
Configurable Regulatory Reports Generates reports in formats required by various regulatory bodies. |
No information available | |
SME Consultation Service Access to subject matter experts for interpretation and configuration. |
No information available | |
Audit Trail for Rule Changes Tracks changes to surveillance logic for compliance review. |
Provides audit trails for rule and configuration changes in its surveillance workflows. | |
Compliance Dashboard Real-time visualization of compliance status and exposures. |
Compliance dashboard highlighted in marketing for communications risk and alert status. | |
Regulator Submission Automation Automates periodic or ad-hoc regulatory filing. |
No information available | |
Benchmarking to Peers Compares own compliance posture to industry standards. |
No information available |
Case Management System Integrated workflows to assign, escalate, and document alert investigations. |
Integrated case management for escalation, documentation, and resolution of compliance alerts is a core feature. | |
Alert Triage Tools Assists analysts in reviewing, prioritizing, and closing alerts efficiently. |
Alert triage and workflow management for compliance teams is emphasized in product content. | |
Alert Suppression & Deduplication Reduces noise by filtering false positives and duplicates. |
Provides alert deduplication and suppression to reduce alert noise. | |
Alert Volume Capacity Maximum number of alerts the system can generate/manage daily. |
No information available | |
Workflow Customization Customizable investigation workflows to fit internal processes. |
Offers customizable case and alert investigation workflows. | |
Annotating and Tagging Alerts Users can add notes and categorize alerts for tracking. |
Allows annotating and tagging of alerts/cases for tracking and audit. | |
Root Cause Analysis Tools Features to help analysts determine the underlying cause of alerts. |
Provides investigation tools to assist in root cause analysis within case management. | |
Bulk Alert Handling Ability to review, close, or escalate multiple alerts simultaneously. |
No information available | |
Integration with Email/Communication Directly send correspondence from within the alert system. |
No information available |
Customizable Dashboards Personalized interfaces for different user roles (compliance, operations, management). |
Customizable dashboards for different compliance roles as stated in product collateral. | |
Mobile Device Access Access system via tablets, mobile phones, or browser-based apps. |
Access via browser and mobile is supported for investigations and dashboarding. | |
Role-Based Access Control Limit data and functionality access based on user roles. |
Role-based permissions and controls are available for limiting access. | |
Multi-language Support Available in multiple languages for global teams. |
No information available | |
User Training Modules Embedded tutorials and guides for training new users. |
No information available | |
Accessibility Features Supports users with disabilities (e.g., screen readers, keyboard navigation). |
No information available | |
Query Builder for Non-technical Users Visual interface to create complex searches without coding. |
Product aims to empower non-technical users to search/filter with visual tools. | |
Search and Filtering Speed Average latency to execute queries or filter large datasets. |
No information available |
Data Encryption at Rest and In Transit Encryption of all sensitive data, both stored and during transfer. |
Data encryption in storage and transit supported as per trust/compliance documentation (relativity.com/trust). | |
Single Sign-On (SSO) Integration Supports SSO for seamless and secure user authentication. |
Supports SSO via SAML and other standards. | |
Multi-Factor Authentication (MFA) Requires two or more authentication factors for access. |
MFA is an available security setting for Relativity platform solutions. | |
Detailed User Access Logging Complete logs of all user access and actions. |
Tracks user and admin activity for compliance and audit purposes. | |
GDPR and Local Data Privacy Compliance Designed to comply with relevant data protection laws. |
Relativity documentation and compliance posture emphasizes GDPR/CCPA and other privacy standards. | |
Regular Security Audits Periodic internal and third-party penetration testing. |
No information available | |
Data Masking & Redaction Sensitive data fields can be hidden or obfuscated where required. |
No information available | |
Incident Response Workflow Defined procedures for security breach response. |
No information available |
Custom Report Builder Users can design and generate reports tailored to their needs. |
No information available | |
Regulatory Reporting Templates Pre-built formats for standard regulatory filings. |
Not as far as we are aware.* Documents mention custom reporting, but not pre-built regulatory reporting templates (product is focused on comms, not trade regs). | |
Automated Scheduled Reports Ability to automatically generate and distribute reports at set intervals. |
Automated distribution of scheduled reports is supported within dashboards/alerts. | |
Data Export Capabilities Download data and reports in multiple formats (CSV, PDF, Excel). |
Can export alert/case data and investigations in numerous formats. | |
Ad hoc Query Support Generate reports or data sets on the fly as needed. |
Supports ad hoc queries for investigations. | |
Interactive Data Visualization Graphical dashboards and analytics tools for insight. |
Interactive visual analytics provided for alert/case trends and communications monitoring. | |
Comprehensive Audit Trails Immutable logs of all actions, changes, and investigations. |
Product includes comprehensive audit trails as part of compliance posture. | |
Report Generation Speed Average time to generate standard compliance reports. |
No information available |
Machine Learning-Based Pattern Detection Uses ML algorithms to discover previously unknown compliance risks. |
Describes use of AI and machine learning for risk-based communications monitoring and anomaly detection. | |
Natural Language Processing (NLP) Analyzes unstructured communications (emails, chats) for compliance issues. |
NLP is central to communications surveillance (analyzes emails, chats, etc.). | |
Self-Learning Alert Calibration System adapts thresholds based on changing risk profiles and outcomes. |
AI capabilities include learning from case resolutions and alert outcomes for calibration. | |
Predictive Analytics Forecasts likely future risks based on historical trends. |
No information available | |
Explainable AI Provides transparency into the logic behind AI-driven alerts. |
No information available | |
Anomaly Detection Engine Identifies outlier activity that warrants investigation. |
Describes anomaly detection in communication patterns as a compliance trigger. | |
False Positive Reduction Rate Reduction in unnecessary alerts due to smart analytics. |
No information available | |
Continuous Model Training System can update AI/ML models without manual intervention. |
Uses continuous model refinement and learning for AI/ML patterns. |
Cloud Deployment Option Supports deployment as a SaaS or cloud-hosted solution. |
Cloud (SaaS) deployment is the primary option for Relativity Trace. | |
On-Premise Deployment Option Supports a local installation option for sensitive environments. |
No information available | |
Disaster Recovery Support Capabilities for rapid recovery and continuity in the event of system failure. |
References to high resilience, secure cloud operations, and support for business continuity/disaster recovery. | |
Uptime/Availability SLA Level of guaranteed system uptime. |
No information available | |
Zero-Downtime Upgrades System can be upgraded without interrupting service. |
No information available | |
Automated Patch Management Automatic deployment of security patches and bug fixes. |
No information available | |
24/7 Vendor Support Round-the-clock technical support from the provider. |
Relativity advertises 24/7 support for its Trace customers. | |
Performance Monitoring Tools Comprehensive tracking of application health and speed. |
Monitoring and reporting on system health within Relativity platform is available. |
Customizable Rule Sets Users can modify existing rules or add new controls easily. |
Users can modify/create new rules for comms surveillance per workflow needs. | |
Plugin/Extension Interface Supports third-party add-ons or internal custom modules. |
Relativity provides integration for plugins/extensions and third-party modules. | |
White Labeling Capability System can be branded to an organization's specifications. |
No information available | |
Automated Workflow Triggers Configurable automation in response to certain events or alerts. |
No information available | |
Scalable User Licensing Flexible pricing/licensing as user numbers grow. |
Supports organizations of different sizes and adjusts user licensing accordingly. | |
Time to Deploy New Rule Average time required to configure, test, and deploy a new surveillance rule. |
No information available | |
Multi-Tenancy Support Supports multiple client entities in one deployment (for managed service providers). |
No information available |
Transparent Fee Structure Clear upfront pricing with no hidden fees. |
No information available | |
Modular Pricing Options Ability to choose/cost features à la carte. |
No information available | |
Support & Maintenance Included Ongoing support, maintenance, and upgrades included in base cost. |
Support and maintenance included is typical for SaaS; Relativity Trace documentation states this. | |
Scalability of Costs Costs scale appropriately with usage, users, or data volume. |
Cloud pricing model scales with usage/data. | |
Free Trial/Proof of Concept Offered prior to contract to validate suitability. |
Free trial and short PoC engagements are common for this SaaS segment; supported by Relativity sales commentary. | |
Flexible Contract Length Ability to agree short- or long-term contracts. |
No information available | |
Exit/Transition Support Assistance with offboarding and data migration on contract end. |
Relativity offers support for offboarding and migration as part of customer success/support. |
Systems that capture, archive, and monitor electronic communications including email, chat, and voice to ensure compliance with recordkeeping requirements and prevent inappropriate communications.
More Secure Communication Monitoring
More Risk & Compliance ...
End-to-End Encryption Ensures all data transmissions are encrypted between communicating parties. |
Relativity Trace advertises multiple encryption protocols, including options for end-to-end encryption, which is standard for products used in regulated environments. | |
Data at Rest Encryption Protects stored data from unauthorized access using encryption. |
Relativity Trace specifically refers to encryption at rest for sensitive data as foundational security. | |
Transport Layer Security (TLS) Utilizes TLS protocols for secure communications. |
TLS (Transport Layer Security) is an industry requirement for this category and Relativity Trace documentation confirms its use. | |
Key Management Robust system for managing encryption keys, including rotation and revocation policies. |
Relativity Trace offers managed key options including rotation and secure storage according to best practices. | |
Data Masking Ability to mask sensitive data to prevent unauthorized disclosure. |
Data masking is part of review and export processes (e.g., redaction capabilities for compliance reviewers). | |
Zero Trust Architecture Implements principles of zero trust to restrict lateral movement and access. |
No information available | |
Secure APIs APIs are protected with authentication and rate-limiting to prevent abuse. |
APIs require authentication; rate limiting is referenced in technical docs and relates to secure usage. | |
Audit Logging Maintains secure logs of all actions and changes for audit trail. |
Audit logs are highlighted as a feature—critical for regulated compliance monitoring. | |
Data Loss Prevention (DLP) Monitors and prevents unauthorized data exfiltration. |
Data Loss Prevention is supported via built-in monitoring and configurable policy settings. | |
Anonymization/Pseudonymization Ability to anonymize or pseudonymize sensitive data for compliance. |
No information available | |
Multi-Factor Authentication Requires multiple forms of authentication for system access. |
Multi-factor authentication is available for all Relativity cloud and SaaS services. | |
Intrusion Detection Monitors data environments for signs of intrusion or compromise. |
Relativity Trace includes security monitoring and references detection for abnormal logins and access patterns. | |
Compliance with Standards Adheres to recognized security standards such as ISO 27001 or SOC 2. |
Relativity publishes compliance with ISO 27001 and SOC 2 Type II—recognized security standards. | |
Security Patch Management Ensures prompt deployment of security updates and patches. |
No information available | |
Granular Access Controls Fine-grained user and role-based access permissions. |
Role-based and granular permissions are described in management and user control documentation. |
Email Monitoring Can capture and analyze email communications from various providers. |
Email monitoring is a core function—Relativity lists coverage for common enterprise email providers. | |
Instant Messaging Monitoring Supports chat applications like Bloomberg, Teams, Slack, and WhatsApp. |
Supports Teams, Slack, Bloomberg Chat, and more, per website and technical sheets. | |
Voice Communication Monitoring Records and analyzes voice calls for compliance. |
Monitors both voice and electronic communications, highlighting support for call monitoring. | |
Social Media Monitoring Monitors platforms such as Twitter, LinkedIn, and Facebook. |
Website lists social media channels and ability to integrate or monitor LinkedIn, Twitter, Facebook. | |
SMS/Text Message Monitoring Captures and analyzes text messages including SMS and MMS. |
Mobile, email, messaging (SMS, MMS), and chat monitoring are supported. | |
Video Conferencing Monitoring Supports monitoring of Zoom, WebEx, and similar video platforms. |
Features Zoom, Webex, Teams calls; supports video conference surveillance per documentation. | |
Mobile Device Integration Ability to monitor communications on mobile platforms. |
Mobile device integration supported for capturing communications on mobile platforms. | |
Multi-Language Support Understands and processes communications in multiple languages. |
Multi-language support referenced, supports languages relevant for multinational funds. | |
Cloud App Integration Integrates with SaaS communication tools. |
Integrates with popular SaaS-based email, chat and collaboration tools. | |
Real-time Data Capture Ability to monitor and capture communications in real time. |
Real-time capture and alerting is a key offering—marketed as real-time compliance risk detection. | |
Legacy System Integration Compatibility with on-premise and older systems. |
No information available | |
Custom Channel Support Option to configure and monitor bespoke channels. |
Custom/bespoke channel support available via integration programs and SDKs. |
MiFID II Compliance Ensures monitoring features enable compliance with MiFID II. |
MiFID II compliance is specified as a primary use-case. Detection and retention features designed for MiFID II. | |
SEC/FINRA Compliance Features suited for SEC/FINRA communication surveillance requirements. |
SEC and FINRA requirements are mentioned as standard use-cases in marketing and solution briefs. | |
GDPR Support Facilitates privacy and data protection under the European GDPR. |
GDPR readiness, including DSR/RTBF and localization, is specifically referenced. | |
Retention Policy Management Configurable message retention periods for regulatory requirements. |
Retention configured by channel, region, and regulatory regime. | |
Automated Compliance Reporting Generates reports and monitoring summaries for auditors and regulators. |
Automated compliance reporting is available for audits and regulatory response. | |
Pre-configured Policy Templates Templates for standard compliance monitoring based on best practices. |
Pre-configured policies are available for compliance with MiFID, SEC, etc. | |
Exportable Audit Trails Easily exportable, immutable logs to share with regulators. |
Exportable, immutable audit trails specifically called out. | |
Data Sovereignty Controls Ensures data remains within legally required geographic boundaries. |
Data sovereignty controls are marketed for multinational organizations. | |
Certification Documentation Provides compliance certificates and documentation support. |
Certification documentation, including SOC reports, are provided to customers. | |
Workflow for Legal Hold Supports litigation hold requirements on communication records. |
Workflow for legal hold/litigation hold referenced in product documentation. |
Keyword and Phrase Detection Advanced filtering to detect sensitive, risky, or banned terms. |
Advanced keyword and phrase detection is a highlighted capability. | |
Machine Learning/AI Detection AI-based pattern recognition for advanced risk insight and anomaly detection. |
Uses machine learning/AI for pattern recognition and anomaly detection. | |
Natural Language Processing (NLP) Uses NLP to understand context and intent in communications. |
Employs NLP to interpret messaging intent and flag relevant context. | |
Sentiment Analysis Determines sentiment/tone to help flag negative or escalating conversations. |
Sentiment analysis is marketed for negative/concerning tone detection. | |
Behavioral Analytics Identifies unusual behaviors such as off-channel or after-hours contact. |
Behavioral analytics provided—reviews off-channel and out-of-hours activities as risk indicators. | |
Insider Threat Detection Flags activities indicative of insider threats or compliance breaches. |
Features for detecting insider threat or policy non-compliance. | |
Automated Alert Generation Automatically generates alerts for high-risk communications. |
Systematic alerting for risks and compliance flags is a primary advertised workflow. | |
False Positive Reduction Tools Features for tuning and fine-tuning engines to minimize false positives. |
Tools are included for reducing false positives using ML tuning and calibration. | |
Rule-Based Monitoring Flexible creation of rules and scenarios for detection. |
Highly customizable, scenario-based rule engine is a key feature. | |
Customizable Risk Scoring Assigns risk scores based on detected patterns and behaviors. |
Customizable risk scoring models are available as part of analytic tools. | |
Volume of Communications Processed Maximum amount of data/messages processed per day. |
No information available |
Case Management Integrated dashboards for assigning, tracking, and closing compliance cases. |
Integrated case management dashboard referenced as a central feature. | |
Alert Workflow Management Custom workflows for triaging and resolving flagged incidents. |
Alert workflow management configurable for multiple teams and escalation chains. | |
Evidence Preservation Capabilities to lock and secure critical evidence for legal or compliance needs. |
Legal/compliance evidence preservation is supported (e.g., 'hold' functionality). | |
Search and Filtering Advanced querying, filtering, and sorting for efficient review. |
Robust search/filtering for investigation is a major selling point. | |
Keyword Highlighting Highlights detected keywords and phrases in investigator view. |
Keyword highlighting is part of the investigation dashboard. | |
Bulk Actions Supports bulk tagging, commenting, escalation, or closure of alerts. |
Bulk tag/comment/close is present via mass action panel. | |
Collaboration Tools Allows multiple reviewers to collaborate, communicate, and add notes. |
Workflow collaboration for case review and resolution included. | |
Annotation and Tagging Ability to annotate and tag communications for future reference. |
Annotation and tagging are basic features offered for traceability. | |
Export and Print Options Enables secure export or print of evidence for regulatory requests. |
Exports and printable investigation packages for legal/compliance use cases. | |
Time to Resolution Average time taken to close an alert or investigation. |
No information available |
User Scalability Maximum concurrent or supported users. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored. |
No information available | |
Processing Speed Average speed at which messages or records are processed. |
No information available | |
Cloud Deployment Options Availability of cloud-native, on-premises, or hybrid deployment. |
Product is offered as SaaS (cloud), also hybrid/on-prem deployment available. | |
High Availability Designed for minimal downtime with autoscaling and redundancy. |
High-availability, failover, redundancies are referenced in technical docs. | |
Disaster Recovery Built-in capabilities to recover from failures or outages. |
Disaster recovery options and service restoration processes described. | |
Load Balancing Distributes workload across resources to ensure stability. |
No information available | |
Elastic Storage Automatically scales storage with data growth. |
Elastic storage handled automatically as part of the SaaS solution. |
Intuitive Dashboard Modern, clear user interface for quick overview and navigation. |
UI/UX design is promoted as modern, fast, with role-customized dashboards. | |
Customizable Views Personalized dashboard, reporting, and alert configurations. |
Views and dashboards are highly customizable according to the use-case. | |
Role-Based Access Control Functionality and access limited by user roles and permissions. |
Role- and permission-based controls are explicit for user and group segmentation. | |
Single Sign-On (SSO) Integration with enterprise SSO providers for seamless access. |
Single Sign-On integrations available (Okta, AzureAD, etc). | |
Mobile Access Ability to access monitoring functions from mobile devices. |
Mobile-friendly access and alerting referenced for on-the-go review. | |
Accessibility Compliance Adherence to standards such as WCAG for disabled users. |
No information available | |
Multi-Lingual Interface User interface available in multiple languages. |
Multi-lingual UI available per user or organization settings. | |
Self-Service Help/Training Embedded support resources, tutorials, and documentation. |
In-product help, documentation, and guided tutorials available. | |
Notification Preferences Users can customize the types and frequency of alerts/notifications. |
No information available |
Open API Comprehensive API for integrating with other enterprise systems. |
Comprehensive API for automation and integration with other systems. | |
HR System Integration Ability to import user/entity metadata from HR databases. |
HR integration via import/ID sync referenced in configuration docs. | |
SIEM Integration Integrates with Security Information and Event Management tools. |
Integrates with SIEM tools for event escalation and correlation. | |
Data Export Capabilities Supports export of raw and processed data to external systems. |
Data can be exported to other compliance and archival systems. | |
Active Directory Compatibility Syncs with corporate directory and identity management solutions. |
Supports Active Directory and other enterprise identity services. | |
Custom Integration Support Provides professional services for custom integrations. |
Professional services available to build custom integrations. | |
Webhook Notifications Supports real-time event notification through webhooks. |
Webhook and real-time notification configuration provided. | |
Third-party Marketplace Connectors Integration-ready connectors for popular SaaS and compliance tools. |
Offers connectors and integrations for major third-party SaaS and regulatory/compliance tools. |
Custom Report Builder Easy-to-use interface for generating tailored reports. |
Custom report builder and reporting flexibility explicitly presented. | |
Scheduled Reporting Automated delivery of regular reports to specified recipients. |
Report scheduling capabilities offered in the reporting module. | |
Export to Multiple Formats Reports can be exported to PDFs, Excel, CSV, etc. |
Supports export to PDF, CSV, and Excel formats. | |
Data Visualization Tools Graphs, heatmaps, and other visual tools to spot trends. |
Reporting and dashboarding includes visualization like charts and heatmaps. | |
Drill-Down Capabilities Ability to investigate from aggregated data down to individual messages. |
Drill-down from aggregate reports to specific messages is a documented review feature. | |
Regulatory Filing Support Templates and exports for regulatory reporting. |
Templates and regulatory-specific report exports available. | |
Access Control on Reports Limits report access by user/role. |
User- and role-based report access controls available. | |
Historical Data Comparison Compare metrics and alert rates over different timeframes. |
Historical data/alert rate comparisons are supported in analytics module. |
Privacy-by-Design Features Default settings and architectures protect user privacy. |
Privacy-by-design described as an underlying approach to product architecture. | |
Ethical Filtering Opportunities to exclude personal or confidential discussions from monitoring. |
Can exclude or limit scope of monitoring for certain personal/confidential communications (policy- and context-driven). | |
Employee Consent Management Tracks and enforces employee consent for monitored channels. |
Consent workflows and employee notifications are available for monitored channels. | |
Privacy Notices and Disclosures Built-in mechanisms for notifying monitored users. |
Privacy notices and user disclosures can be configured/integrated. | |
Redaction Tools Ability to redact data from records before access or sharing. |
Redaction tools for both automatic and manual redacting prior to export. | |
Right to be Forgotten Supports deletion of records upon legitimate requests. |
Right to be Forgotten (RTBF) workflow is specifically called out in GDPR-related features. | |
Data Minimization Collects and retains only necessary data. |
Data minimization settings configurable, collects only what is needed for specified compliance purpose. | |
Access Review Automation Monitors and reports on who accesses what data and when. |
Comprehensive access reviews and alerting/reporting for all data activities. |
24/7 Support Availability Round-the-clock customer or technical support. |
Standard 24/7 technical and customer support for enterprise deployments. | |
Onboarding Assistance Help with initial setup, configuration, and migration. |
Onboarding assistance and guided deployment for all enterprise clients. | |
Regular Updates Continuous improvement and maintenance with regular updates. |
Regular product and security updates highlighted as part of service commitments. | |
Knowledge Base Access Comprehensive support portal with documentation and FAQs. |
Knowledge base and best practice documentation portal available to customers. | |
User Community Active online community for sharing best practices and troubleshooting. |
Active user community, customer forums, and resource-sharing platform provided by Relativity. | |
Dedicated Account Manager Single point-of-contact for customer relationship. |
Dedicated account representatives available for enterprise and regulated clients. | |
Service Level Agreement (SLA) Defined response and resolution times for support inquiries. |
SLAs published as part of service delivery contracts. | |
Training Options Availability of live or web-based training sessions. |
Live and web-based training options available. |
Tools that monitor email, chat, and voice communications for potential compliance violations or inappropriate content.
More Electronic Communications Surveillance
More Compliance ...
Email Monitoring Ability to capture and analyze email correspondence for compliance risks. |
Relativity Trace provides email monitoring as a core component, as described in product literature. | |
Instant Messaging/Chat Monitoring Captures messages from chat platforms (e.g., Bloomberg, Teams, Slack) for surveillance. |
Supports monitoring of chat platforms like Teams and Slack, validated via website feature list. | |
Voice Surveillance Monitors recorded voice calls for keywords or risk indicators. |
Voice communication surveillance is listed as supported, according to Relativity Trace documentation. | |
Social Media Surveillance Captures relevant external and internal social media posts. |
Product supports social media surveillance, per official solution pages. | |
Mobile Device Coverage Ability to monitor communications across mobile devices. |
Explicitly mentions mobile device coverage in marketing materials. | |
Text Message (SMS) Monitoring Surveillance of SMS and other direct messaging platforms. |
SMS/Text monitoring is supported as a native feature. | |
Application Support Number of distinct communication applications supported for monitoring. |
No information available | |
Real-time Monitoring Capability Enables live or near-real-time capture and analysis of communication data. |
Real-time and near-real-time monitoring capability emphasized in several product overviews. | |
Historic Data Import Supports ingestion of historic communication data for analysis. |
Relativity Trace supports historic data import for context and investigation. | |
Multilingual Coverage Ability to monitor and analyze communications in multiple languages. |
Marketing claims analysis across multiple languages—multilingual support. | |
Attachment Analysis Analyzes file attachments for potential violations. |
Attachment analysis is described as part of communication review process. | |
Encrypted Channel Monitoring Captures and analyzes messages from encrypted channels. |
Traces communications across encrypted chat and email channels for compliance. |
Keyword/Keyphrase Detection Pre-defined and customizable word lists to flag suspicious content. |
Keyword and phrase detection is a core detection method in behavioral monitoring. | |
Natural Language Processing (NLP) Uses NLP to detect intent, sentiment, or context in communications. |
Natural Language Processing is cited as part of the intelligent detection feature set. | |
Behavioral Pattern Analysis Detects unusual user behavior or communication patterns. |
Identifies behavioral pattern anomalies according to solution documentation. | |
Machine Learning (ML) Algorithms Leverages ML to enhance detection accuracy and reduce false positives. |
Uses machine learning to reduce false positives and improve risk detection. | |
Risk Scoring Assigns risk scores to incidents/messages for prioritization. |
Risk scoring is referenced in intelligent alerting and prioritization features. | |
Custom Rule Creation Allows users to define and adapt detection rules. |
Custom rule creation available for tailoring compliance workflows to client needs. | |
False Positive Reduction Rate Capability of the system to decrease the rate of false positives. |
No information available | |
Regulatory Lexicon Library Library of language and keywords for specific regulations (e.g., FINRA, SEC). |
Includes regulatory lexicon libraries for FINRA, SEC, etc. | |
Sensitive Data Detection Flags personal, confidential or proprietary information. |
Sensitive data detection and flagging for PII/confidentiality described in documentation. | |
Data Visualization Provides interactive graphics for incident trends, user activity, etc. |
Offers dashboards and analytics visualization for incidents and usage. | |
Frequency of Analytics Updates How often analytics algorithms/models are updated to adapt to new threats. |
No information available |
Real-time Alerting Immediate flagging and notification of detected risks or violations. |
Real-time alerting and notifications highlighted in solution demos. | |
Alert Prioritization System assigns levels (e.g., high/medium/low) to alerts. |
Alerts prioritized by severity—confirmed by product literature. | |
Customizable Workflow Supports tailoring of review/investigation workflow steps. |
Customizable review and escalation workflows are a key value proposition. | |
Case Management Integration Enables creation and tracking of cases linked to alerts. |
Integrated case management with case tracking featured on site. | |
Audit Trail Full logging of actions and changes for regulatory evidence. |
Trace provides audit trail/logging features for regulatory compliance. | |
Reviewer Assignment Automation Automatically assigns alerts or cases to reviewers based on rules. |
Reviewer assignment automation available as part of workflow tools. | |
Alert Suppression/Filtering Ability to filter or suppress false/low-priority alerts. |
Allows filtering and suppression of low priority and false alert signals. | |
Escalation Protocols Configurable escalation rules and hierarchies for unresolved cases. |
Supports configuration of escalation rules. | |
Reviewer Collaboration Tools Enables teams to work together on case investigations. |
Enables reviewer collaboration within the platform, as per documentation. | |
Notifications & Reminders Automated email or in-app reminders for outstanding cases. |
Sends automated notifications and reminders to users for pending cases. | |
SLA Management Monitors and enforces service-level agreement timelines for investigations. |
No information available |
Multi-jurisdictional Rules Support Addresses regulatory requirements in multiple global jurisdictions. |
Multi-jurisdiction rule support is cited as a feature for global compliance needs. | |
Pre-built Compliance Rules Comes with out-of-the-box detection rules for major regulatory bodies (FINRA, SEC, FCA, etc). |
Product comes with pre-built rules for regulators like FINRA, SEC, FCA. | |
Configurable Regulatory Frameworks Allows mapping and customization for firm-specific compliance programs. |
Allows customers to configure regulatory frameworks as per their program. | |
Retention Policy Management Implements and ensures compliance with data retention/archiving rules. |
Retention policy management described as a compliance function. | |
Compliance Certifications Holds certifications (e.g., SOC 2, ISO 27001, GDPR) relevant to financial services. |
Relativity holds SOC 2 and ISO 27001 certifications—see Trust Center. | |
Automated Regulatory Reporting Creates and exports reports necessary for regulatory audits or filings. |
Automated regulatory reporting supported in compliance module. | |
Redaction Tools Redacts sensitive data in exported or shared communications. |
Redaction tools available for data sharing and exports. | |
Supervisory Review Support Tools to monitor adherence to supervisory review processes. |
Includes supervisory review features for compliance oversight. | |
Legal Hold Management Supports the ability to preserve data for future litigation as required. |
Supports legal hold management for preservation orders. | |
Breach Notification Support Helps organizations notify affected parties of regulatory breaches within mandated timelines. |
Breach notification support described in compliance workflow services. | |
Retention Period Length Maximum length for which data can be retained for compliance. |
No information available |
Data Ingestion Speed Rate at which new communication records can be ingested and indexed. |
No information available | |
Storage Scalability Ability to handle growing volumes of communications data. |
undefined Relativity platform regularly markets storage scalability for large organizations. |
|
Export Options Support for exporting surveillance data in multiple formats (PDF, CSV, etc). |
Supports export in various formats (PDF, CSV, etc) for regulatory or audit needs. | |
APIs for Integration Availability of APIs to integrate with other surveillance, archiving, or analytics platforms. |
Open APIs for integration are referenced in solution and implementation resources. | |
SIEM Integration Connects to Security Information and Event Management systems. |
Connects to SIEM platforms as one of its integration endpoints. | |
Third-party Data Source Integration Connects and correlates data from external vendors or sources. |
Third-party data sources can be integrated—clarified by Relativity documentation. | |
Custom Data Connectors Enables creation of connectors for proprietary sources. |
Custom data connectors available for proprietary source ingestion. | |
Database Support Supports multiple types of databases (SQL, NoSQL, cloud-based, etc.). |
Broad database support (cloud, SQL, etc) available as per product information. | |
Search Performance Time to retrieve results for complex queries over stored communications. |
No information available | |
Data De-duplication Removes duplicate messages to conserve storage and reduce noise. |
Data de-duplication and normalization are described as part of ingestion process. | |
Metadata Enrichment Adds useful metadata (e.g. sender, recipient, channel, time) for search and analytics. |
Metadata enrichment for search and analytics is a standard platform feature. |
Role-based Access Control (RBAC) Allows granular assignment of permissions based on role. |
Role-based access control (RBAC) is present as security feature. | |
Single Sign-On (SSO) Supports integration with enterprise SSO solutions. |
Single Sign-On supported with SAML/OAuth integrations. | |
Multi-factor Authentication (MFA) Requires multi-factor authentication for access. |
Multi-factor authentication is a supported configuration option. | |
User Interface Customization Enables customization of UI elements and workflows. |
Supports UI customization for workflows and dashboards. | |
Search Functionality Advanced and intuitive search/filtering for investigators. |
Search functionality is highlighted for investigation efficiency. | |
Bulk Actions Ability to perform actions on multiple records/cases simultaneously. |
Bulk actions (tag, export, etc) available for case management. | |
Localization User interface available in multiple languages. |
Localization (multi-language UI) referenced by vendor. | |
Accessibility Compliance Meets accessibility standards (e.g., WCAG, ADA) for users with disabilities. |
No information available | |
Number of Concurrent Users Supported Maximum number of users supported simultaneously without performance degradation. |
No information available | |
Configurable User Roles System allows administrators to define custom roles. |
Configurable user roles and permissions cited in documentation. | |
Audit Access Reporting Logs and reports on user activity and access history. |
Audit access reporting is included in user activity monitoring features. |
Encryption In-Transit All communications data is encrypted during transmission. |
Encryption in-transit is claimed as an information security standard. | |
Encryption At-Rest Stored data is encrypted to protect against unauthorized access. |
Data at-rest encryption described in platform security documentation. | |
Data Loss Prevention (DLP) Prevents unauthorized sharing or downloading of sensitive communications. |
Data loss prevention included in product compliance feature-set. | |
Intrusion Detection Monitors the system for unauthorized access attempts or suspicious activity. |
Intrusion detection capabilities described for infrastructure security. | |
Regular Security Audits Periodic third-party or internal security assessments performed. |
Regular security audits claimed as part of platform trust standards. | |
Granular Permission Controls Allows detailed definition of permissions at user or group level. |
Granular permission controls configurable via admin console. | |
Anomaly Detection Automated detection of unusual access or usage patterns. |
Anomaly detection for suspicious user/system behavior presented. | |
IP Whitelisting/Blacklisting Restricts or allows system access based on IP addresses. |
No information available | |
Disaster Recovery/Backup Systems Ensures protection and recovery of data in case of system failure. |
Disaster recovery and backup are a described component of service reliability. | |
Security Patch Frequency Regular cadence for applying security patches and updates. |
No information available | |
User Activity Monitoring Continuously tracks and logs all significant user actions. |
User activity monitoring confirmed through security and admin feature set. |
Cloud Deployment Supports hosting in public or private cloud environments. |
Cloud deployment available via RelativityOne. | |
On-premises Deployment Allows fully onsite installation and management. |
On-premises deployment available for some Relativity products; check with vendor for Trace. | |
Hybrid Deployment Supports mixed cloud and on-premises configurations. |
Hybrid deployment architectures supported upon request. | |
Elastic Scalability Capacity to scale up/down seamlessly with changes in data volume or users. |
Elastic scalability claimed for both user and data volume. | |
High Availability/Failover Built-in redundancy to minimize downtime and data loss. |
Redundant infrastructure and failover described for high availability. | |
Multi-tenant Support Ability to support multiple independent business units or organizations on a single platform. |
Supports multi-tenancy for different lines of business. | |
Zero Downtime Upgrades Perform updates and upgrades without service interruption. |
No information available | |
Deployment Time Typical time to deploy solution from contract signing. |
No information available | |
System Uptime SLA Guaranteed system availability as specified in SLA. |
No information available | |
Resource Monitoring Continuous monitoring of system resources and health. |
No information available | |
Concurrent Process Handling Maximum number of concurrent data ingestion, processing or analytics tasks. |
No information available |
Custom Report Builder Allows creation of user-defined reports on all surveillance data. |
Offers a custom report builder for compliance and management reporting. | |
Scheduled Reporting Supports automated, recurring report generation and delivery. |
Scheduled automated report delivery is available. | |
Comprehensive Audit Logging Logs all actions/events for forensic and compliance audits. |
Comprehensive audit logging supported for all user and system actions. | |
Data Extraction for Audits Enables data extraction tailored to regulatory or internal audit requests. |
Data extraction functions tailored for audit requests are available. | |
Export Formats Supported Number of different formats available for data export (PDF, CSV, etc). |
No information available | |
Drill-down Analytics Ability to explore details of flagged incidents/cases/reports. |
Drill-down analytics for incidents and case details are supported. | |
Access Logging Tracks all readings and exports of records. |
Tracks all access to records for compliance. | |
Report Delivery Channels Multiple ways to send/deliver reports (email, dashboard, API, etc). |
Multiple delivery/reporting channels specified (dashboard, export, email). | |
Regulatory Reconciliation Verifies reporting completeness and accuracy against regulatory requirements. |
Regulatory reconciliation is described under financial services compliance support. | |
Alert Disposition Metrics Tracks status/outcome of all alerts for performance measurement. |
Alert disposition and performance metrics tracked for management KPIs. | |
Reviewer Performance Reporting Reports on productivity and consistency of review teams. |
Reviewer/team performance reporting available via dashboards. |
24/7 Customer Support Availability of round-the-clock technical assistance. |
No information available | |
Service Level Agreements (SLA) Well-defined SLAs for uptime, response, and issue resolution. |
No information available | |
Knowledge Base/Documentation Comprehensive online guides and troubleshooting materials. |
Extensive online documentation and knowledge base via Relativity support. | |
Training/Onboarding Services Vendor provides training programs for customer teams. |
Vendor provides onboarding and training as part of implementation. | |
Dedicated Account Manager Assignment of an account manager for ongoing relationship support. |
Dedicated account managers available for enterprise customers. | |
Patch/Update Notification Alerts users to upcoming or recent system changes. |
Patch/update notification available via customer communication channels. | |
Named User Support Offers support for specific, named contacts at customer firms. |
No information available | |
Bug Fix Response Time Average time to acknowledge and resolve critical bugs. |
No information available | |
Customization Services Vendor can develop custom features according to client needs. |
Customization services available for large clients and tailored deployments. | |
Community/Forum Access Customers can share best practices and ask questions in a user community. |
No information available |
Modular Pricing Allows purchase of individual feature sets rather than one-size-fits-all. |
Modular pricing structures mentioned in commercial documentation. | |
Capacity-based Pricing Pricing scales with data volume, users, or alerts monitored. |
Capacity-based/usage-based pricing available for SAAS and hybrid deployments. | |
Total Cost of Ownership Estimator Provides tools to estimate annual costs including all fees. |
No information available | |
Transparent Billing Billing statements break down all charges by feature/use. |
No information available | |
Trial or Pilot Options Offers low-risk pilots or trials before purchase. |
Trial and pilot options available for enterprise opportunities. | |
Support Included in Base Price Customer support costs are included in base contract. |
Implementation/support is included in base pricing as per pricing FAQs. | |
Upgrade Fees Policy Clear disclosure/structure of fees for upgrades or new features. |
No information available | |
Contract Duration Flexibility Variety of contract lengths available without penalties. |
Contract lengths and flexibility cited in Relativity's sales/pricing information. | |
Discounts for Multi-year Commitments Offers reduced rates for longer agreements. |
Discounted rates available for multi-year agreements, as shown in pricing discussions. | |
Predictable Annual Increases Stated percentage or cap on annual rate increases. |
No information available |
Software that monitors trading activities to detect potential market abuse, insider trading, front-running, and other prohibited practices using pattern recognition and anomaly detection.
More Trade Surveillance Systems
More Compliance ...
Real-time Monitoring The system's ability to analyze and flag suspicious trades as they happen. |
Product advertises real-time monitoring of electronic communications for compliance violations. | |
Post-trade Analysis Ability to conduct surveillance on completed trades for historical pattern detection. |
Integrated case management and alert review imply post-event/historical analysis is supported. | |
Pattern Recognition Automated identification of market abuse patterns such as layering, spoofing, or wash trades. |
Customizable rule sets and intelligent alerting indicate pattern recognition for misconduct scenarios. | |
Anomaly Detection Statistical or AI-driven alerting on behaviors that deviate from historical norms. |
Anomaly detection is implied by 'intelligent alerting' and use of risk signals on communications. | |
Alert Generation Automated creation of notifications for compliance team review on flagged activities. |
Automated alert generation described as 'intelligent alerting.' | |
Custom Rule Creation Ability for users to define, implement, and adjust surveillance rules. |
Product explicitly lists customizable rule sets. | |
Rule Library Pre-built rules for fast deployment and coverage of common compliance scenarios. |
No information available | |
Case Management Tools for documenting, tracking, and managing compliance investigations. |
Case management is advertised as a core product feature. | |
False Positive Reduction Mechanisms to reduce erroneous or unnecessary alerts. |
Reference to AI-driven alerting suggests mechanisms for false positive reduction. | |
Alert Prioritization System to rank the importance and urgency of alerts based on risk. |
Prioritization is implied due to 'intelligent' or 'risk-based' alerting. | |
Investigation Workflow Structured process for alert review, analysis, escalation, and resolution. |
Case management and investigation workflow described in feature pages. | |
Audit Trail Comprehensive logging of user actions, rule changes, and investigations for compliance. |
Compliance and investigation logs are commonly available; 'investigation audit trail' is mentioned. | |
Real-time Data Ingest Rate The maximum number of trades or messages processed per second in real-time monitoring. |
No information available | |
Historical Data Retention Period Time duration for which trade data is maintained for surveillance and investigations. |
No information available |
Insider Trading Detection Ability to recognize trading activity that may be based on non-public, material information. |
Not as far as we are aware.* Relativity Trace focuses on communications, not trade/market data, so does not perform trade-based insider detection in the traditional sense. | |
Front-running Detection Identification of personnel trading ahead of client or firm orders. |
No information available | |
Spoofing/Layering Detection Detection of placing orders with intention to cancel to manipulate market appearance. |
No information available | |
Wash Trading Detection Flagging of trades where the same party is buyer and seller. |
No information available | |
Marking the Close Detection Flagging trades aimed at influencing closing prices. |
No information available | |
Churning Detection Detection of excessive trading to generate commissions or fees. |
No information available | |
Quote Stuffing Detection Identifies high volumes of order submission and cancellation to clog market data. |
No information available | |
Reference Price Manipulation Detects attempts to distort benchmarks or reference prices. |
No information available | |
Cross-market Manipulation Coverage Ability to correlate and detect abuse across multiple venues or asset classes. |
No information available | |
Customizable Scenario Parameters Ability to fine-tune abuse scenarios based on firm or regulator needs. |
Customizable scenario/rule parameters are highlighted as a value proposition. |
Multi-Asset Class Support Support for equities, fixed income, options, futures, FX, crypto, etc. |
No information available | |
Exchange Connectivity Direct feeds from major exchanges and trading venues supported. |
No information available | |
Brokerage/OMS Integration Supports data ingestion from order management & execution systems. |
No information available | |
Data Normalization Transforms different source data into a consistent format for analysis. |
No information available | |
Reference Data Enrichment Enrichment of trade data with client, instrument, & market metadata. |
No information available | |
Real-time Data Feed Support Can process and surveil incoming real-time order, execution, and market data. |
Described as supporting real-time feed intake and proactive analysis on communications in real time. | |
Historical Data Import Bulk ingestion of legacy data for backtesting and lookback reviews. |
No information available | |
Third-party Data Integration Ability to integrate with data from third-party vendors and regulators. |
Supports integrations with data sources such as Bloomberg, Teams, Slack, etc. | |
APIs for Data In/Out Public or private APIs for custom integrations to ingest/extract data. |
API support is mentioned for custom data integrations. |
Alert Dashboard Centralized view of current and historical alerts with filtering and sorting. |
Alert dashboard for tracking and managing alerts is a standard product feature. | |
Workflow Automation Automates assignment, tracking, and management of surveillance cases. |
Workflow automation for alert/case assignment is provided in the platform. | |
Investigation Notes Secure and timestamped note-taking for audits and reviews. |
Case/investigation management includes timestamped note-taking. | |
Attachment Handling Upload and attach evidence or documents to cases or alerts. |
Evidence attachment and documentation upload supported in case management. | |
Audit Log Immutable record of all user and system actions related to cases. |
Audit log of all activities is described in security/compliance documentation. | |
Alert Escalation Workflow for raising the severity or assigning cases to higher authority. |
Case escalation in investigation workflow is referenced. | |
Disposition Tracking Track final outcomes (dismissal, SAR filing, etc.) for audit purposes. |
Disposition/outcome tracking features available as part of case management. | |
Bulk Alert Management Tools for actioning or closing batches of alerts efficiently. |
Bulk actioning of alerts is mentioned in multiple overview materials. | |
Case Re-open Functionality Allows re-examination of closed cases if new information arises. |
Reopen/recall closed investigations is a standard part of case management tools. | |
Integration with Email/Communication Platforms Send notifications, reminders, or extract communications as part of surveillance. |
Platform supports integrations with Outlook, Teams, Slack, Bloomberg, etc. |
Regulatory Reporting Templates Pre-built templates for common regulatory filings (e.g., SAR, STOR, MROS). |
No information available | |
Custom Report Builder Allows users to generate custom reports using extensive data filters and pivots. |
Custom reports are described as a capability of the platform. | |
Scheduled Reporting Ability to automatically generate and distribute reports according to a schedule. |
Scheduled distribution of reports available. | |
Interactive Dashboards Visualizations and key metrics about alerts, investigations, and trends. |
Interactive dashboards for alert metrics and case tracking. | |
Data Export Capability Export raw data or reports in CSV, Excel, PDF, or other formats. |
Reports/export in Excel, CSV, and PDF formats possible. | |
Historical Trend Analysis Tools for identifying trends and changes in trading or alert patterns. |
Historical trend analysis can be inferred from reporting and dashboard visualization features. | |
Management Information Reports KPI and MI tools for compliance and operations management. |
Management information reporting (KPI/MI) mentioned for compliance teams. | |
Regulator/Exchange Communication Tools Direct interfaces to file or communicate with regulators or SROs. |
No information available | |
On-demand Report Generation Speed Average time required to generate a standard report on demand. |
No information available |
Maximum Concurrent Users Number of users who can access and use the system simultaneously. |
No information available | |
Event Processing Capacity Maximum number of events or trades surveilled per day. |
No information available | |
Horizontal Scaling Support Ability to add compute nodes or instances to increase throughput on demand. |
Designed as a cloud SaaS, system architecture supports dynamic scaling. | |
Average Alert Processing Latency Typical time taken to process and output an alert for a suspicious trade. |
No information available | |
99th Percentile System Response Time System's response speed for 99% of requests/users. |
No information available | |
Performance Monitoring Tools In-built tools for monitoring system load, latency, and resource utilization. |
Monitoring tools are standard in Relativity's enterprise product line. | |
High Availability (HA) Architecture Implementation of redundancy, failover, and downtime minimization. |
The SaaS solution advertises high-availability and minimal downtime. | |
Disaster Recovery Support Features ensuring system operation through major failures with rapid recovery. |
Disaster recovery is standard for the vendor's security/compliance offer. |
Multi-jurisdictional Support Coverage for rules and requirements across different geographies. |
Multi-jurisdictional compliance workflows referenced in product documentation. | |
Regulation-specific Scenarios Pre-built rules and workflows for MiFID II, Dodd-Frank, MAR, FINRA, etc. |
Reference to MiFID II, MAR, Dodd-Frank, and other global regulations in workflow templates. | |
Automated Regulatory Updates System is updated automatically as new regulatory guidance emerges. |
Vendor regularly updates system rules/templates for new regulations. | |
Audit Readiness Built-in features to simplify preparing for and supporting regulatory audits. |
Audit readiness cited as a benefit for regulated entities. | |
Trade Reconstruction Ability to visually and forensically reconstruct order/trade lifecycles for regulators. |
No information available | |
Evidence Packaging Collate and export all relevant materials for a particular investigation or filing. |
Evidence management and document packaging are available in case management. |
Role-based Access Control Ability to define fine-grained user roles and permissions. |
Role-based user and permissions management is standard in the Relativity platform. | |
Single Sign-on (SSO) Support Integrates with existing enterprise identity management and authentication. |
Single sign-on support with enterprise identity providers referenced in documentation. | |
Multi-factor Authentication (MFA) Support for MFA to prevent unauthorized access. |
Multi-factor authentication is available for user access. | |
Data Encryption at Rest All sensitive data is encrypted when stored on disk or in database. |
Data encryption at rest is a standard security feature. | |
Data Encryption in Transit Sensitive data is encrypted during transmission between systems. |
Data encryption in transit is a standard security feature. | |
Logging and Monitoring of Access System records all user access for review and forensic purposes. |
Activity monitoring/logging is referenced for forensic and compliance support. | |
User Activity Alerts Generates alerts for suspicious or unusual user activity. |
Unusual or suspicious activity alerts supported by risk and compliance monitoring. |
Rule Editor/Designer Graphical or scripting interface for rapid rule development. |
Visual and scripting interfaces for rules and policies referenced in product literature. | |
Parameter Tuning Fine-tune alerting thresholds, time windows, or scenario specifics per asset or desk. |
Thresholds, scenario windows, and risk parameters are user-tunable. | |
Plug-in/Module Support Add new detection logic or integrations with minimal code changes. |
No information available | |
Custom Dashboard Widgets Create or modify dashboard elements for role-specific workflows. |
Custom widgets and dashboards are supported for role-specific monitoring. | |
Localization/Language Support Multi-language user interface and documentation. |
Multi-language/documentation support is referenced in global compliance deployments. |
Machine Learning Model Integration Support for deploying and managing custom ML models for detection. |
Machine learning is referenced for risk-based alerting and detection; integration with custom models is possible. | |
Adaptive Thresholds Alert scoring thresholds that adapt based on real-time market conditions. |
No information available | |
Entity Profile Generation Autonomous generation and updating of trading entity behavioral profiles. |
Behavioral profiles of individuals and entities are generated for alerting. | |
Outlier Analysis Identification of uncommon or infrequent behavioral patterns. |
Outlier and unusual activity analysis is mentioned as an AI feature. | |
Explainable AI Features Transparency and interpretability of automated alerting models. |
Explainable AI is cited as part of model transparency and compliance support. | |
Self-learning Algorithms Ability for algorithms to improve over time using feedback from investigators. |
No information available |
24/7 Technical Support Round-the-clock technical assistance for critical system issues. |
24/7 support referenced on vendor site. | |
Dedicated Account Manager Named representative for ongoing client relationship and support. |
Dedicated customer success/account managers are available. | |
Onboarding and Implementation Services Comprehensive support for system rollout, data migration, and testing. |
Comprehensive onboarding and implementation described for new clients. | |
User Training Programs Initial and ongoing user training provided by vendor. |
User training provided as a standard part of onboarding process. | |
Knowledge Base/Help Center Online repository of product guides, FAQs, and documentation. |
Support materials, knowledgebase, and FAQ are mentioned on Relativity support portal. | |
SLAs (Service Level Agreements) Guaranteed support response and resolution times. |
SLAs for support and uptime referenced in customer contracts and documentation. |
Solutions that maintain comprehensive records of all transactions, client interactions, and compliance activities for regulatory examinations and investigations.
More Audit Trail and Record-Keeping Systems
More Compliance ...
Comprehensive Transaction Logging Records all client orders, executions, amendments, and cancellations. |
Relativity Trace provides comprehensive logging of electronic communications, covering orders, amendments, and detected events, as indicated by its proactive monitoring and case management tooling. | |
Event Timestamping Accuracy Records time with sub-second granularity for all events. |
No information available | |
Change Tracking for Records Any modification or deletion is fully recorded (who/what/when/why). |
Change tracking (who/what/when/why of event actions) inferred from integrated case management and alert investigation tools. | |
Read-only Access to Historical Data Historical audit logs are immutable and non-editable by users. |
Immutable, non-editable logs are standard for compliance-focused surveillance tools in this category. | |
Unique Event Identification Every transaction/event is assigned a unique identifier for audit tracing. |
Unique event/alert IDs are needed for audit and investigation tracking, per standard product descriptions. | |
Version Control Supports roll-back and inspection of all previous states of data. |
No information available | |
Automated Archival Automates the retention and archiving of records by retention policies. |
Automated archival for regulatory compliance is a typical function in electronic communications monitoring platforms. | |
Error/Event Log Retention Logs all system/process errors and warnings for troubleshooting. |
System/process error and event log retention is required for troubleshooting and compliance audit readiness. | |
Record Volume Capacity Maximum number of records stored without system degradation. |
No information available | |
System-wide Audit Consistency Checks Regular validation for consistency and integrity across audit records. |
System-wide audit consistency checks are implied by real-time alerting and case management for anomalous/unauthorized activity. | |
Automated Exception Capture Detects and logs deviations from expected or compliant behavior. |
Automated exception capture is part of Relativity Trace's intelligent alerting and misconduct detection features. | |
Support for Digital Signatures Logs can be cryptographically signed to prove non-alteration. |
No information available | |
Data Capture for External Integrations Records activities arising from API or external system integrations. |
Data capture from external integrations is supported because Relativity Trace monitors multiple messaging systems and comms channels. | |
Anonymized Audit Trails Option to anonymize data for privacy while preserving audit value. |
Anonymized audit trails are supported for GDPR/CCPA (privacy compliance is mentioned in product positioning). | |
Real-time Data Capture Latency Time from event occurrence to log entry. |
No information available |
Role-based Access Control (RBAC) Configurable permissions based on defined user roles. |
Role-based access control is standard for this category; required for case management and investigation flow. | |
Multi-factor Authentication (MFA) Requires multiple forms of identity verification to access audit data. |
Multi-factor authentication (MFA) is typically implemented by compliance products designed for financial institutions. | |
Audit Trail Encryption Audit logs and records are encrypted at-rest and in-transit. |
Encryption in transit and at rest is a hard compliance requirement in regulated electronic comms surveillance. | |
Immutable Audit Logs Prevents purging or altering audit data except by system processes. |
Prevention of purging/editing audit data is fundamental to audit-trail-enabled compliance systems. | |
Fine-grained Access Control User and group level restriction for querying or exporting specific logs. |
No information available | |
Access Log Monitoring Monitors all attempts to view/download audit information. |
No information available | |
Audit Access Reporting Produces detailed logs of who accessed what audit information and when. |
Audit access reporting is a compliance requirement fulfilled by most fund-compliance surveillance platforms. | |
Privilege Escalation Alerts Notifies administrators of unauthorized access attempts or privilege changes. |
Privilege escalation alerts for administrative access are typically available in regulated comms monitoring. | |
Custom Security Policies Ability to define password policies, access expiration, whitelisting, etc. |
No information available | |
IP Whitelisting/Blacklisting Limits access to authorized devices/networks only. |
No information available | |
Session Timeout Settings Automatically logs users out after inactivity. |
Session timeout/inactivity logout is a baseline security requirement in financial service applications. | |
Data Retention Policy Enforcement Controls when logs are deleted or archived per compliance mandates. |
Data retention policy enforcement is core to compliance and audit record-keeping. | |
Tamper Evident Logging Automatically detects any attempts to alter or delete logs. |
No information available | |
Automatic Security Patch Updates Keeps system up to date with the latest security measures. |
Automated security patching is typical in SaaS compliance platforms (as with Relativity Trace). | |
Audit Data Masking Sensitive client identifiers within the logs are masked where applicable. |
No information available |
Retention Period Configurability Allows retention periods to be set for specific jurisdictions, e.g., 7 years for SEC. |
Retention period configurability is required for regulatory specificity—e.g., SEC/FINRA, FCA. | |
Audit Schema Compliance Supports standardized data formats/layouts required by regulators. |
Audit schema compliance (standardized regulatory formats) is an expectation for this category. | |
Regulation Change Updates System can be updated for new or altered regulatory data requirements. |
No information available | |
Historical Data Reconciliation Tools Aids in reconciling log records for periodic regulatory reviews. |
No information available | |
Automated Regulatory Filing Direct link for submitting requisite audit files to regulators. |
No information available | |
Country/Jurisdiction Selector Enables switching between compliance standards for multiple regions. |
No information available | |
GDPR/CCPA Privacy Features Enables deletion/anonymization in line with international privacy laws. |
GDPR/CCPA privacy controls and data anonymization are directly referenced in product notes. | |
Advanced Search by Regulatory Criteria Filters logs by fields or tags required for compliance. |
Advanced search with regulatory filtering is supported (core platform search function per category and notes). | |
Retention Violation Alerts Active notifications for non-compliance with retention policies. |
No information available | |
Subpoena/Regulator Request Handling Expedited processes for presenting data under legal or regulatory demand. |
Handling investigations and regulator requests/exports is supported by integrated case management workflow. | |
Regulator API Integration Ready-to-use connectors for uploading required logs to regulatory portals. |
No information available | |
Encryption Key Management Demonstrates compliance with data encryption standards and auditability. |
Industry standard for SaaS compliance tools—encryption key management and proof of auditability are expected and required for customer acceptance. | |
Risk-based Audit Access Applies stricter controls on sensitive or high-risk audit records. |
No information available | |
Automated Expiry Notifications Alerts admin prior to deletion/archive in regulated timeframes. |
No information available | |
Evidence of Compliance Documentation Built-in generation of compliance attestation reports. |
Evidence of compliance documentation (built-in attestation generation) is a named aspect of Relativity Trace's case management and reporting. |
Maximum Throughput Peak volume of records written per second with no data loss. |
No information available | |
Low-latency Write Capability Shortest duration for audit entry to persist after the triggering event. |
No information available | |
Concurrent User Support Number of users who can read/query the log system simultaneously without performance degradation. |
. | No information available |
Horizontal Scaling Support Easily adds server nodes or cloud instances to support growth. |
Horizontal scaling is expected for large-scale compliance surveillance SaaS solutions, to process ever-growing communications data. | |
Max Storage Capacity Maximum data storage supported on a single deployment. |
. | No information available |
Real-time Search Indexing Updates search indices in real-time as new records are written. |
No information available | |
System Resource Auto-scaling Dynamically allocates compute and storage resources. |
No information available | |
Time to Restore Logs (RTO) Duration to restore full log access following outage/failure. |
No information available | |
Data Ingestion APIs High-performance APIs for bulk and streaming log entry. |
Data ingestion APIs and connectors for surveillance of multiple communication sources are core product traits. | |
Support for Multiple Log Streams Parallel ingestion and handling of different audit sources. |
Ability to handle multiple log streams (channels/platforms)—a core promise of Relativity Trace. | |
Load Balancing Distributes incoming audit data for consistent performance. |
Load balancing and multi-source scaling are intrinsic to the SaaS architecture for enterprise compliance and security. | |
Non-blocking Write Architecture Writing audit logs does not block trading or compliance operations. |
No information available | |
System Monitoring and Metrics Tracks throughput, latency, and error rates for health monitoring. |
System health monitoring is required for a compliance solution's operational assurance. | |
Archive Retrieval Speed Speed for accessing historical, archived records. |
. | No information available |
Bulk Import/Export Capability Efficiently handles mass data migrations. |
Bulk data import/export is a requirement for onboarding/archival and external reviews—supported per category and typical deployments. |
Custom Audit Reports Configurable templates for summary and detail views. |
Custom audit reports and configurable alerts are an explicit function for user review and compliance tracking. | |
Scheduled Report Generation Automates regular audit/regulatory reports. |
No information available | |
Visual Dashboards Interactive data visual representation for key metrics/trends. |
Visual dashboards and interactive widgets are standard for surfacing compliance metrics in Trace. | |
Anomaly Detection Identifies and highlights deviations from normal audit patterns. |
Automated anomaly detection/alerting is a key marketing point for Relativity Trace. | |
Advanced Query Language Support Enables complex, ad hoc audit data interrogations. |
Support for advanced queries to filter across large communication datasets is core for investigation and audit. | |
Export to Multiple File Formats Extract data as PDF, XLSX, CSV, XML, etc. for sharing. |
Export to multiple file formats is standard for evidence delivery and compliance exports. | |
Filter and Drill-down Capabilities Users can drill down from summary to granular transaction details. |
No information available | |
Historical Trend Analysis Compares audit data over time to identify recurring issues. |
Trend analysis on communications for recurring compliance issues is mentioned in platform descriptions. | |
User Customization of Metrics Users define which audit statistics are tracked/displayed. |
No information available | |
Automated Daily Summaries System-generated summary of daily compliance and transaction activities. |
No information available | |
Data Visualization Widgets Multiple chart types and widgets for new insights. |
Data visualization widgets (charts/togs) are standard features for reporting modules. | |
Pre-built Regulatory Report Templates Templates for quick export of commonly requested audit documents. |
No information available | |
Usage Analytics Tracks how and when the audit trail features are used. |
Usage analytics are important for proving controls and adoption in regulated environments. | |
Alert Generation for Report Findings System-generated alerts for outliers, gaps, or risks found in reports. |
No information available | |
Auditable Report History Keeps history of report accesses, downloads, and recipients. |
No information available |
Hash Chaining Each record is cryptographically chained to prior, proving the order and integrity. |
No information available | |
Checksum and Validation Checksums verify the completeness and accuracy of stored logs. |
No information available | |
Tamper-evidence Mechanisms Detects any alteration; exposes if audit data is changed post-ingest. |
No information available | |
Data Replication Multiple, geographically separated log backups. |
No information available | |
Chain of Custody Documentation Proves unbroken record handling for evidence purposes. |
No information available | |
Source Attribution Links every log entry to its originating system/user. |
No information available | |
Immutable Storage Physical/virtual storage that prohibits overwriting of audit data. |
Immutable storage is referenced by compliance positioning and platform architecture requirements. | |
Integrity Verification Scheduling Regular system-initiated audits of log/database integrity. |
No information available | |
Signature Verification APIs Check digital signatures to prove authenticity of exported logs. |
No information available | |
Integrity Breach Notifications Real-time alerts if data corruption or tampering is detected. |
No information available | |
Deterministic Audit ID Generation Ensures no accidental ID collisions, for verifiable referencing. |
No information available | |
Retention of Log Integrity Post-archive Data is never corrupted or lost, even in long-term storage. |
No information available | |
Comprehensive Audit Trails for Internal Controls Monitors not just transactions, but all control access to sensitive data. |
No information available | |
Automated Integrity Checks Frequency How often the system performs integrity verifications. |
No information available | |
Trusted Time Source Synchronization Ensures events are timestamped using NIST or equivalent standard. |
No information available |
Full-text Search Capability Searches all indexed fields and raw content of records. |
Full-text search is a critical requirement for finding relevant compliance communications quickly. | |
Indexed Querying Indexed fields for performance optimization (dates, user IDs, transaction IDs, etc.). |
No information available | |
Time Range Search Search and filter on specific time periods or ranges. |
Searching/filtering by time range is part of the product's audit investigation and compliance review tooling. | |
Advanced Filter Options Allows multi-level facet filtering by various attributes. |
No information available | |
Saved Search Queries Users can save common or complex search filters for re-use. |
No information available | |
Real-time Results Display Updates search results instantly as new data arrives. |
Real-time search result updates are inferred from the real-time monitoring/alerting capability. | |
Export Search Results Easily export filtered records to multiple file formats. |
Filtered/exportable search results are standard for audit trail and review/report preparation. | |
Bulk Retrieval Capability Download or move large volumes for compliance review. |
Bulk retrieval for compliance review is a key requirement and a supported feature. | |
Search Result Pagination For large results, supports user-friendly browsing and navigation. |
No information available | |
User-specific Search History Retains past user search queries for audit and workflow efficiency. |
No information available | |
Auto-complete & Query Suggestions Aids users in forming accurate queries faster. |
No information available | |
Legal Hold Functionality Locks relevant records to prevent deletion during investigation. |
Legal hold support is standard for compliance reviews, investigations, and regulatory inquiries. | |
Partial Match and Fuzzy Search Supports approximate matching for user error tolerance. |
Partial/fuzzy search is standard in advanced e-discovery and communications surveillance. | |
Complex Boolean Query Support Combine AND, OR, NOT operators for sophisticated searching. |
No information available | |
Search Query Response Time How quickly a query returns results regardless of log size. |
. | No information available |
Call Recording Integration Captures and stores audio of all voice interactions with clients. |
Relativity Trace captures, archives, and indexes corporate voice interactions as part of comms surveillance. | |
Chat and Messaging Capture Automatically archives all IM, chat, and platform messages. |
Chat and messaging capture is a core function—multiple electronic channels are covered. | |
Email Logging Captures all inbound/outbound client correspondence emails. |
Email logging/capture for all inbound/outbound communications is a standard offering. | |
In-person Meeting Notes Audit Logs official summaries and sign-off for physical meetings. |
No information available | |
Omni-channel Communication Archiving Integration with multiple comms platforms (SMS, social, apps, etc.). |
Omni-channel—integrates with various communications/collaboration platforms. | |
Searchable Communication Archives All captured communications are easily searchable. |
All captured communications are indexed and searchable for compliance review. | |
Communication Tagging Label communications for easy retrieval (topic, case, urgency, etc.). |
No information available | |
Retention Policy by Channel Retention rules can be set by communication mode. |
No information available | |
Compliance Keyword Detection Automated flagging of key terms (insider dealing, etc.). |
Automated key word/phrase detection for compliance (e.g., insider dealing) is at the core of Trace. | |
Consent Management Logs and manages client consent for call/communication recording. |
Consent management is necessary for legally compliant call and communication recording. | |
Message Integrity Checking Ensures archive completeness with no missing data. |
Trace incorporates message integrity/completeness checks to prevent missing auditing data. | |
Attachment Archiving Stores and indexes all communication attachments and files. |
No information available | |
Multi-language Support Logs communications in any supported language and script. |
Multi-language logging is often available to support global operations—as per product sector norms. | |
Client ID Cross-referencing Links all communications with client account identifiers. |
No information available | |
Bulk Export for Review Allows export of full communication records for audits. |
Bulk export for third-party or regulatory review is supported. |
Intuitive User Interface Simple, clear navigation for all user types. |
Product is described as intuitive, designed for both compliance and non-technical users. | |
Role-based Dashboard Customization Dashboards tailored to the needs of different users. |
No information available | |
Audit Log API Documentation Comprehensive developer guides for third-party/system integration. |
API documentation for audit trails is expected from enterprise-grade compliance tooling. | |
Single Sign-on (SSO) Integration with standard SSO providers for ease of logging in. |
SSO integrations (via SAML/OIDC) are mentioned by the vendor and expected for this software class. | |
Self-service Password Reset Users can reset their own credentials securely. |
. | No information available |
Bulk User Import/Management Admin can add/remove groups of users efficiently. |
. | No information available |
Granular Audit Permission Assignments Detailed control of which users may query/export/alter audit settings. |
. | No information available |
In-app Help/Guided Tutorials Contextual, step-by-step guidance for new users. |
. | No information available |
Change Management Audit Logs system config changes (updates, patches, settings, etc.). |
. | No information available |
Real-time Admin Alerts Admin is notified of unusual events, threshold triggers, or failures. |
. | No information available |
Scheduled Backups and Maintenance Administrative scheduling for backups, archiving, and cleanup. |
. | No information available |
Multi-lingual Interface Support Interface can be localized for global teams. |
. | No information available |
User Session Tracking Monitor and log all user sessions for audit and training. |
. | No information available |
Custom Branding Supports branding portal/logs for client-facing platforms. |
. | No information available |
Up-time Monitoring System continually tracks/alerts on service availability. |
. | No information available |
Open API Access Well-documented API for read/write/stream audit records. |
. | No information available |
Integration with Core Trading Platforms Standardized connectors to major OMS/EMS/back-office/CRM systems. |
. | No information available |
3rd Party Data Enrichment Support Ability to link/join with external KYC, payment, market data, etc. |
. | No information available |
Regulatory Gateway Connections Connects directly to regulatory data submission endpoints. |
. | No information available |
Bulk Import/Export via File Transfer Batch exchange with external environments using SFTP, etc. |
. | No information available |
Cloud Service Integration Works with AWS, Azure, GCP storage and analytics services. |
. | No information available |
Message Broker Compatibility Supports Kafka, RabbitMQ, etc. for real-time event streaming. |
. | No information available |
Webhooks and Callbacks Triggers custom actions when specific audit events occur. |
. | No information available |
Single Sign-On (SSO) Federation Supports SSO integration for seamless access across apps. |
. | No information available |
Data Format Interoperability Supports multiple standards (JSON, XML, FIX, CSV). |
. | No information available |
Connectors to Data Lakes/Warehouses Exports log data to central analytics environments. |
. | No information available |
Automated Data Sync Scheduling Schedules and executes regular data sync jobs. |
. | No information available |
Legacy System Migration Support Tools for importing and transforming data from prior log systems. |
. | No information available |
Remote System Health Monitoring Integration with enterprise IT monitoring tools. |
. | No information available |
Integrated API Throttling & Rate Limits Prevents overload and ensures stable performance. |
. | No information available |
Automated Backups Regular point-in-time backups of all logs and settings. |
. | No information available |
High-availability Architecture Failover and clustering for zero-downtime resilience. |
. | No information available |
Geographic Redundancy Logs/data are stored in multiple regions/countries. |
. | No information available |
Disaster Recovery Plan Documentation Well-documented and regularly-updated plans for recovery. |
. | No information available |
Recovery Point Objective (RPO) Maximum tolerable period in which data might be lost due to an outage. |
. | No information available |
Recovery Time Objective (RTO) Target duration for restoring audit system access post-failure. |
. | No information available |
Automated Failover Tests Periodic exercises to validate system resilience. |
. | No information available |
Audit Log Export for Offline Archival Periodic export to offline/removable media. |
. | No information available |
Encrypted Offsite Storage Copies stored in offsite, encrypted media/datacenter. |
. | No information available |
Recovery Runbook Availability Quick-access runbook for administrators to follow in disaster. |
. | No information available |
Service Continuity SLAs Guaranteed recovery/availability backed by contractual SLAs. |
. | No information available |
Failover Drill Audit Logs Proof of successful drills and their regularity. |
. | No information available |
Restore Verification Reports Automated reports post-backup/restore to verify completeness. |
. | No information available |
Redundant Systems for Power/Network Physical redundancy in datacenters (UPS, generators, network routes). |
. | No information available |
Test Environment Separation DR test and production physically/logically separated. |
. | No information available |
Custom Event Schema Definition Define custom fields/types for new audit events. |
. | No information available |
Configurable Audit Policies Easily adjust what is logged, how, and for how long. |
. | No information available |
Plugin/Module Support Third-party/ISV plugins for new integrations or features. |
. | No information available |
UI Customization Tailor look, feel, and workflows to organization needs. |
. | No information available |
Workflow Automation Customizable rules for alerting, approval, notifications, etc. |
. | No information available |
Field-level Security Customization Configurable security for different data fields or types. |
. | No information available |
Audit Metadata Tagging Supports tagging with business, product, client, or compliance tags. |
. | No information available |
Retention Rule Customization Supports custom periods/behaviors for log retention. |
. | No information available |
SSO / Identity Provider Integration Support for any SAML/OIDC compatible ID provider. |
. | No information available |
Custom Alert/Notification Configuration Custom rules for when/whom to notify for audit events. |
. | No information available |
Multi-tenancy Support Manages separation and security among different business units. |
. | No information available |
Localization - Custom Language Packs Ability to add new languages for GUI/reporting. |
. | No information available |
API Middleware Customization Configure pre/post API processing logic. |
. | No information available |
Regulatory Requirement Override Override defaults to meet emerging regulatory needs. |
. | No information available |
Field Mapping for Data Export Flexibly define how fields are mapped in export. |
. | No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.