Provides a suite of AML compliance tools including transaction monitoring, customer risk scoring, and reporting for brokerages, tailored to meet global regulatory standards.
Systems for screening clients against watchlists, monitoring transactions for suspicious activity, and maintaining regulatory compliance documentation.
More AML/KYC Compliance Software
More Compliance ...
Identity Document Verification Ability to verify government-issued identity documents (passports, national IDs, etc.) electronically. |
FIS AML Compliance Solutions supports electronic verification of government-issued documents as a core onboarding feature per product documentation. | |
Facial Recognition/Matching Matches client-provided photos with ID documents using facial recognition technology. |
Facial recognition is explicitly offered as part of the identity verification component for customer onboarding. | |
Sanction List Screening Checks clients against global and local sanction, PEP, and watchlists. |
Sanction, PEP, and watchlist screening are highlighted in the solution overview and documentation. | |
Adverse Media Screening Searches for negative news related to clients using media and public data sources. |
Adverse media screening is described as integrated to reduce reputational risk for institutions. | |
Ongoing Customer Monitoring Continuously screens existing clients for changes in status or newly published risks. |
Continuous (ongoing) monitoring of customers for new risks/changing status included as a differentiator. | |
Risk Scoring Engine Assigns dynamic risk scores to clients based on risk factors and behaviors. |
Solution actively assigns risk scores to clients and can trigger enhanced due diligence. | |
Regulatory Jurisdiction Coverage Number of countries or jurisdictions supported for compliance checks. |
No information available | |
Language Support Number of languages supported for global client onboarding and screening. |
No information available | |
Enhanced Due Diligence Handling Supports additional data collection and review for high risk clients. |
Enhanced due diligence processes are supported for high-risk clients, as described in platform datasheet. | |
Batch Processing Capability Ability to process multiple client screenings at once. |
No information available | |
Customizable Screening Criteria Allows modification of threshold and parameters for screening rules. |
Allows tuning of rules and thresholds for screening criteria (rules engine configurable). |
Real-Time Transaction Monitoring Automatically scans transactions for suspicious patterns as they occur. |
Monitors transactions for suspicious activity in real time as described on product feature page. | |
Behavioral Pattern Detection Uses profiling and analytics to detect unusual or unexpected patterns. |
Behavioral analytics described as a core feature to detect anomalous activity. | |
Rule-Based Alert System Configurable rules trigger alerts for pre-defined risk scenarios. |
Configurable rules for alerts present (e.g., thresholds, pattern-based triggers). | |
Machine Learning/AI Analytics Employs AI models to detect previously unknown or emerging risks. |
AI and machine learning utilized for adaptive and evolving risk-detection, as per FIS datasheets. | |
Alert Prioritization Ranks alerts based on severity and risk relevance for efficient case handling. |
Alert scoring and prioritization presented in workflow/case overview. | |
False Positive Management System features to reduce unnecessary alerts and streamline review. |
Solution touts reduced false positives and efficient investigation workflows as key benefits. | |
Volume Handling Capacity Maximum number of transactions monitored per second. |
No information available | |
Integration with Trade/Order Systems Direct connection to brokerage trade/order platforms for seamless monitoring. |
Integration and monitoring of brokerage trade/order systems referenced in solution's brokerage material. | |
Peer Group Analysis Compares client behavior against similar client group averages. |
No information available | |
Historical Data Analysis Supports backtesting and review of historical transactions for compliance audits. |
Supports historical data analysis for audits, reviews, and model calibration. | |
Automated Case Escalation Automatically escalates suspicious cases for compliance officer review. |
Workflow engine supports automated escalation based on case parameters and severity. |
Integrated Global Lists Supports all major regulatory and financial watchlists (OFAC, EU, UN, etc.). |
Major global lists cited (OFAC, EU, etc.), plus automatic updates of integrated global lists. | |
Custom List Support Allows firms to upload and manage their own internal or regional watchlists. |
Clients can upload and manage custom/regional or internal lists per documentation. | |
Automated List Updates Regularly and automatically fetches the latest list changes. |
System schedules regular, automated watchlist updates. | |
Version Control Tracks list changes and maintains history for audit purposes. |
Tracks list version history and changes for auditability. | |
List Capacity Maximum number of entries supported per watchlist. |
No information available | |
Fuzzy Matching Algorithms Detects similar names or entities with variable spellings. |
Fuzzy matching and name/alias detection explicitly listed as a disambiguation feature for watchlists. | |
Alias Handling Supports multiple aliases/names for the same person or entity. |
Alias and multiple name support highlighted in watchlist and screening documentation. | |
Bulk List Import/Export Allows batch file management for lists. |
Bulk import/export functionality for lists documented for large client bases. | |
Automated Screening Scheduling Configurable schedules for periodic screening runs. |
Scheduled, automated screenings configurable via system interface. | |
Geo-Restriction Handling Manages restricted or high-risk regions and jurisdictions. |
Geo-restriction and jurisdictional risk screening described in product feature sets. |
Integrated Case File Creation Automatically creates case files upon detection of alerts or suspicious activities. |
Case file creation and management automated upon rule-triggered alerts or manual escalation. | |
Investigation Workflow Engine Guided process for analysts through investigation, review, and resolution steps. |
Describes guided investigation and analytics workflows for compliance analysts. | |
Audit Trail Logging Maintains detailed logs of all actions taken on a case for compliance. |
System maintains action logs and audit trail as a compliance feature. | |
Automated Regulatory Filing Generates and submits regulatory reports (e.g., SAR/STR) in the required formats. |
FIS products auto-generate regulatory filings, including SAR/STR, as specified in product literature. | |
Role-Based Access Control Restricts and manages access to cases based on user roles or responsibilities. |
RBAC (Role-Based Access Controls) confirmed in security/administration materials. | |
Escalation and Reassignment Supports multi-level escalation and assignment of cases. |
Cases can be escalated multi-level and reassigned; function is part of workflow manager. | |
Case Review SLAs Tracks and enforces service-level agreements for case review duration. |
No information available | |
Document Storage Capacity Maximum storage allocated per case for supporting documents. |
No information available | |
Automated Case Notification Notifies relevant users upon updates, assignment, or need for action. |
Automated notifications of case changes/actions documented under workflow automation. | |
Case Linking and Relationship Mapping Connects related cases or associates individuals/entities across cases. |
No information available |
Pre-Built Regulatory Report Templates Includes standard report formats required by regulators (e.g., SAR, CTR, STR, KYC logs). |
Pre-built templates for SAR, STR, and other regulatory reports supplied and customizable. | |
Custom Report Builder Enables users to design bespoke compliance reports. |
System includes a custom report builder for compliance data. | |
Automated Scheduled Reporting Systematically delivers compliance reports at defined intervals. |
Automated scheduled reporting of compliance information is a core function. | |
Regulatory Data Retention Period Number of years for which compliance data is retained. |
No information available | |
E-Filing Integration Supports direct submissions via regulatory authority electronic channels. |
E-Filing systems and direct regulatory integrations are available for several jurisdictions. | |
Multi-Jurisdictional Compliance Built-in features for different global regulatory regimes. |
Multi-jurisdiction compliance cited as a differentiator in product material. | |
Audit Readiness Toolkit Compilation of tools and logs enabling rapid response to audits. |
Tools for audit readiness and rapid response to audit requests included. | |
Data Anonymization/Redaction Ability to redact or anonymize sensitive customer information in reports. |
Data anonymization and redaction functions available to comply with privacy mandates. | |
Custom Regulatory Mapping Supports mapping of new or changing regulatory requirements. |
No information available | |
Compliance Attestation Support Module for documentation and certification of compliance by officers. |
No information available |
API Access and Documentation Provides detailed APIs for integration with proprietary or third-party systems. |
Comprehensive APIs and documentation for system integration described on technical resources. | |
Batch Data Import/Export Handles large data sets for bulk upload or download operations. |
The product supports batch data import/export for onboarding and periodic refresh operations. | |
Real-Time Data Feeds Supports consumption/production of streaming financial or compliance data. |
Describes real-time data feed integrations for account and transaction data. | |
Third-Party Data Provider Integration Easy integration with external KYC/AML data sources, credit bureaus, etc. |
Integration with external data providers (KYC/AML, credit) is an advertised product feature. | |
Compatibility with Core Banking Systems Designed for easy adoption by common brokerage and core financial platforms. |
Designed for compatibility with brokerage and banking core systems (including legacy). | |
Customizable Webhooks Triggers actions in other systems upon specific compliance events. |
No information available | |
SSO and Identity Provider Support Integrates with identity management and SSO for organizational identity control. |
Supports SSO and identity providers for organizational management and security. | |
Plugin/Extension Support Can be extended with add-ons for specific compliance needs. |
No information available | |
Connector Library Size Number of pre-built connectors to standard systems/platforms. |
No information available | |
Legacy System Support Compatible with non-modern or legacy brokerage infrastructures. |
Legacy system support confirmed as a selling point for FIS in the brokerage segment. |
Customizable Dashboards Personalized views for compliance officers, executives, or investigators. |
Dashboards are user-personalizable for compliance, executive, and supervisory roles. | |
Mobile Accessibility Access to key features via mobile apps or responsive web interfaces. |
Mobile responsive dashboards and monitoring apps available (per FIS client case studies). | |
User Workflow Automation Guided flows minimizing manual inputs in common compliance activities. |
User workflow automation included for repetitive compliance operations. | |
Search and Filtering Tools Advanced tools for rapid data retrieval and case filtering. |
Advanced search and rapid filtering documentated for compliance investigations. | |
Bulk Action Tools Support for batch processing and bulk updates. |
Bulk review and processing tools form part of management interface. | |
Multi-Language UI User interface offered in multiple languages. |
No information available | |
Accessibility Compliance Meets accessibility standards such as WCAG for user inclusivity. |
FIS states accessibility/WCAG compliance aimed for enterprise deployments. | |
User Training and Help Center Built-in education modules and real-time assistance features. |
Help center and user guides embedded; user training modules available for clients. | |
Custom User Roles Tailorable user permissions for granular security and workflow management. |
Custom user roles supported for granular workflow and data access. | |
Performance/Load Times Average time taken for the UI to load main dashboards. |
No information available |
Data Encryption In Transit/At Rest Encrypts all sensitive data both in motion and when stored. |
Encrypts data in transit and at rest, conforming to regulatory and client security standards. | |
Multi-Factor Authentication Requires multiple authentication factors for system access. |
Multi-factor authentication enforced for sensitive operations/restricted areas. | |
Access Logging and Monitoring Extensive logs of all user access and administrative actions. |
Comprehensive audit/access logging systems implemented as per security requirements. | |
Penetration Testing Frequency How often the system undergoes external security assessment. |
No information available | |
Data Residency Options Supports choice of specific regions/countries for data storage. |
Supports choice of data residency (region/country) for compliance. | |
Compliance with Industry Standards Adheres to standards such as ISO 27001, PCI DSS, GDPR. |
Stated compliance with ISO 27001, PCI DSS, and other applicable industry standards. | |
User Session Time-Outs Automatic log-off after a period of inactivity. |
Automatic user session time-outs implemented for security policy. | |
Field-Level Data Masking Sensitive fields can be masked or hidden from unauthorized users. |
Field/data-level masking for sensitive information to protect PII. | |
Secure Audit Log Storage Ensures immutability and backup of critical audit logs. |
Immutable storage and backup procedures for audit logs outlined in docs. | |
Incident Response Procedures Documented processes for breach detection and notification. |
Formal incident response and breach notification policies are part of offering. |
Concurrent User Limit Maximum number of users supported simultaneously. |
No information available | |
Transaction Processing Latency Average time to process and analyze a single transaction. |
No information available | |
Uptime/Availability SLA Guaranteed system availability often expressed as a percentage. |
No information available | |
Data Ingestion Rate Speed at which system can ingest new compliance data. |
No information available | |
Horizontal Scaling Support System supports scaling across servers/nodes to accommodate growth. |
Horizontal scaling supported to fit growing/large broker and bank clients. | |
Performance Monitoring Tools Built-in dashboards and alerts on system performance metrics. |
Performance monitor dashboards for system health and resource utilization included. | |
Cloud Deployment Option System can be deployed as a cloud (SaaS) or hybrid solution. |
Cloud/SaaS deployment and managed hybrid environments both supported. | |
On-Premise Deployment Option Supports local/internal hosting for sensitive or regulated data. |
On-premise installations also documented for sensitive client types. | |
Disaster Recovery RTO Recovery Time Objective in case of system outage. |
No information available | |
Database Size Limit Maximum database size supported without performance loss. |
No information available |
24/7 Support Availability Round-the-clock access to technical and compliance support. |
FIS provides 24/7 dedicated technical and regulatory support globally. | |
Dedicated Account Manager Single point of contact for service and issue escalation. |
No information available | |
Self-Service Knowledge Base Extensive library of documentation, FAQs, and training material. |
Extensive knowledge base, FAQs, and online documentation available to clients. | |
Regular System Updates Frequency of non-disruptive security, functionality and rule updates. |
No information available | |
Custom SLA Options Ability to define support levels and response times contractually. |
Custom SLAs can be arranged depending on institution/contract. | |
Uptime Guarantee Contractual uptime guarantee for system operation. |
No information available | |
Automated Backup Scheduling Scheduled, automated backups of all system and client data. |
Automatic scheduled backups described as standard practice for client data protection. | |
Patch Management Tools Automation of system security patching and compliance rule changes. |
No information available | |
User Feedback Loop Mechanisms for users to submit feedback and feature requests. |
Clients are able to submit feedback and feature requests via the support portal. | |
Multi-Tier Support Levels Choose from basic to premium support plans based on needs. |
Support levels (including premium) available as options for institutional clients. |
Transparent Pricing Model Clearly published and predictable licensing or usage costs. |
Solution pricing and licensing structure is clear and predictable. | |
Pay-As-You-Go Option Usage-based billing for modular feature access. |
No information available | |
Volume Discounts Available Lower per-unit pricing as transaction or client count increases. |
No information available | |
Free Trial/POC Period for free evaluation or proof of concept. |
Free trials/POC arrangements available for qualifying prospects. | |
Feature-Based Licensing Modular pricing per individual function/module. |
Modular, feature-based licensing supported for AML/KYC modules. | |
Perpetual License Option Option to purchase software outright rather than as a subscription. |
No information available | |
Annual Billing Option Discounted pricing for annual upfront payment. |
No information available | |
Multi-Entity Licensing Special terms for multi-subsidiary or group licensing. |
No information available | |
Seat/User License Cap Maximum number of named users included without additional charges. |
No information available | |
Additional Data Storage Pricing Published price per additional unit of data storage. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.