AML transaction monitoring, KYC due diligence, sanctions list screening, and client onboarding specifically designed for treasury departments and corporate finance teams.
Tools that facilitate Know Your Customer and Anti-Money Laundering compliance processes for treasury's financial counterparties.
More KYC/AML Compliance Systems
More Treasury Compliance ...
Document Verification Ability to scan, capture, and validate government-issued identification documents. |
Product explicitly advertises document screening and validation for KYC processes. | |
Liveness Detection Checks if the document presenter is a real, live person and not a static image or video. |
No information available | |
Biometric Matching Facial or fingerprint recognition for matching user with their presented documents. |
No information available | |
Automated Data Extraction Extracts key data from uploaded or scanned documents using OCR and AI. |
Suite includes automated data extraction using OCR/AI, as described in KYC and onboarding documentation. | |
Multi-language Support Supports identity documents issued in multiple languages. |
EastNets supports global clients and KYC/AML for multiple jurisdictions, implying multi-language document support. | |
Email Verification Validates counterparty email addresses as part of onboarding. |
Product includes email address validation in client onboarding steps per KYC requirements. | |
Phone Number Verification Performs one-time password (OTP) or SMS verification of phone numbers. |
Onboarding features typically include SMS/OTP and phone verification for AML/KYC, as per suite overview. | |
Sanctions List Screening Cross-checks individuals and entities against global and regional sanctions lists. |
Sanctions screening module cross-checks against global and regional lists. | |
Watchlist Monitoring Continuously screens identities against third-party watchlists and blacklists. |
Continuous watchlist and blacklist monitoring mentioned within enhanced due diligence module. | |
Address Verification Checks and validates address data with postal services or third-party data sources. |
Address verification part of standard onboarding and KYC checks. | |
SSN/Tax ID Validation Verifies the social security number or tax identification numbers for authenticity. |
SSN/Tax ID validation is a required element in KYC/AML verticals. Supported for relevant geographies. | |
Custom Document Templates Supports custom templates for non-standard or region specific documents. |
No information available | |
Speed of Identity Checks Average time to complete identity verification. |
No information available | |
Accuracy Rate Success and accuracy rate of automated identity matching. |
No information available | |
Manual Review Escalation Allows cases to be escalated to human agents in ambiguous scenarios. |
Manual escalation is included for ambiguous onboarding and screening outcomes. |
PEP Screening Screens counterparty against politically exposed person (PEP) databases. |
PEP list screening is explicitly described in enhanced due diligence. | |
Adverse Media Checks Scans news and media sources for negative mentions of counterparties. |
Adverse media monitoring is available as part of due diligence (negative media news scans). | |
Continuous Monitoring Real-time or periodic monitoring for updated risk indicators. |
Continuous monitoring is a central component of the transaction monitoring and due diligence tools. | |
Ultimate Beneficial Owner Identification Traces and verifies the ultimate beneficial owners (UBOs) behind corporate structures. |
Ultimate beneficial ownership and entity tracing are outlined capabilities in KYC onboarding. | |
Source of Funds Verification Checks the legitimacy and origin of funds supplied by counterparties. |
Source of funds and legitimacy verification advertised as part of EDD (enhanced due diligence). | |
Geographic Risk Assessment Evaluates-counterparty risk based on country of registration or residence. |
Geographic-based counterparty risk is supported by the product per compliance suite overview. | |
Custom Risk Scoring Assigns and manages custom risk scores based on flexible criteria. |
Risk scoring is listed as customizable based on risk criteria and profiles. | |
Transaction Pattern Analysis Identifies patterns of transactions that may indicate elevated AML risk. |
Transaction pattern analysis is foundational in the AML transaction monitoring module. | |
High-Risk Activity Alerts Generates alerts when high-risk activities are detected. |
High-risk transaction alerts are core to the monitoring workflow. | |
Number of Data Sources Total external and internal sources linked for enhanced due diligence. |
No information available | |
Custom Questionnaires Ability to generate and manage enhanced due diligence forms for high-risk clients. |
Option to implement custom EDD questionnaires is described in supporting documentation. | |
Audit Trail for EDD Actions Keeps a log of all actions and checks performed during enhanced due diligence. |
Audit trail for enhanced due diligence and onboarding activities is described. | |
EDD Case Management Workflow tools for handling enhanced due diligence investigations. |
EDD workflow/case management described for investigations and reviews. | |
Risk Level Visualization Graphical displays of risk levels across the counterparty portfolio. |
Risk visualization tools described in suite (dashboards, graphical risk scoring). | |
Frequency of EDD Reviews How often enhanced due diligence is scheduled and performed. |
. | No information available |
Real-Time Monitoring System monitors transactions for suspicious activity in real time. |
Real-time transaction monitoring for AML is one of the key features. | |
Rule-Based Alerts Configurable rules trigger alerts for transactions that meet risk criteria. |
Rule-based alerts configurable per product documentation. | |
Behavioral Analytics Analyzes transaction patterns against expected counterparty behaviour to detect anomalies. |
Behavioral analytics included for anomaly detection. | |
Machine Learning Integration Utilizes machine learning to improve detection of suspicious activities. |
Some modules offer machine learning-based anomaly detection for suspicious transactions. | |
Volume of Transactions Processed The maximum number of transactions monitored per hour. |
No information available | |
False Positive Rate Percentage of flagged transactions that are ultimately found to be compliant. |
No information available | |
Case Management for Alerts Integrated tools to investigate, escalate, and resolve flagged transactions. |
Alerts generated within platform link with case management tools for escalation and closure. | |
SAR/STR Filing Automation Automates Suspicious Activity/Transaction Report generation and submission. |
SAR/STR filing is specifically called out for regulatory submissions. | |
Threshold Customization Allows users to define thresholds for automatic alerting. |
Threshold customization for rules and alerts is a described capability. | |
Batch Monitoring Supports scheduled or on-demand review of multiple transactions simultaneously. |
Batch monitoring and review of transactions is mentioned in product capabilities. | |
Alert Prioritization Ranks alerts by severity to help compliance teams triage activity. |
Alert prioritization offered for efficient compliance team triage. | |
Geo-Fencing Detects transactions to or from regions with increased money laundering risk. |
No information available | |
Customizable Rule Library Administrators can author or edit monitoring rules for specific scenarios. |
Rule authoring and configuration library is a stated feature. | |
Time to Assess Alerts Average time needed for compliance to review and clear alerts. |
. | No information available |
Integration with External Databases Links with external fraud and AML databases for enhanced pattern recognition. |
External sanctions and AML database integration included. |
Automated Onboarding Workflows Orchestrates and automates the data collection and approval process. |
Product orchestrates automated onboarding and approval workflows. | |
Pre-Built Forms & Templates Provides standardized forms and document request templates. |
. | No information available |
Self-Service Portal Allows counterparties to upload documents and track onboarding status. |
Self-service onboarding portal available for counterparties. | |
Digital Signatures Securely incorporates e-signatures into onboarding workflows. |
Digital and electronic signature capture is incorporated in onboarding. | |
Bulk Onboarding Enables onboarding of multiple counterparties simultaneously. |
No information available | |
Automated Data Validation Detects incomplete fields and validates information in real time. |
Automated data validation for onboarding is part of product materials. | |
Onboarding Time Average time to complete onboarding using the system. |
. | No information available |
Onboarding Status Tracking Real-time dashboard for tracking onboarding progress and bottlenecks. |
Onboarding status tracking dashboards available. | |
Reminder and Escalation Engine Automated reminders and escalations for incomplete onboarding steps. |
Automated reminders and escalation for incomplete onboarding steps provided. | |
Role-Based Access Controls Granular access to onboarding modules based on user roles. |
Role-based access controls referenced in administration literature. | |
Customizable Approval Flows Supports customized review and approval routing for different counterparty types. |
Custom review/approval routing supported for multiple counterparty types. | |
Audit Trail Maintains a log of all onboarding activities and changes. |
Onboarding and due diligence modules maintain audit trails. | |
API for Onboarding Integration Enables integration of onboarding into wider treasury and ERP systems. |
API integration for onboarding is available and documented. | |
Multi-Entity Support Allows onboarding processes across multiple legal entities within the corporation. |
Multi-entity onboarding and compliance support is explicitly available for treasury groups. | |
Onboarding Completion Rate Percentage of counterparties completing onboarding successfully. |
. | No information available |
Access to Global Lists Includes OFAC, UN, EU and other major sanctions and embargoes lists. |
Access to global sanctions and embargoes lists (OFAC, UN, EU) is a primary capability. | |
Custom Watchlist Uploads Lets users maintain their own additional lists. |
No information available | |
Automated List Updates Ensures screening is performed against the most current list data. |
Automated updates for global watchlists and sanctions lists are part of the system. | |
Batch Screening Screening of large files of counterparties or transactions at once. |
Batch screening is described as a feature for bulk compliance checks. | |
List Update Frequency Frequency at which watchlist or sanctions lists are updated in the system. |
. | No information available |
Fuzzy Matching Algorithms Can detect close or similar matches to alias names and alternate spellings. |
Fuzzy name/alias matching is explicitly referenced for sanctions screening. | |
Hit Resolution Management Workflow to resolve potential matches or ‘hits’ efficiently. |
No information available | |
Whitelisting Capabilities Ability to whitelist certain counterparties after review. |
No information available | |
List Coverage Scope Number of different lists integrated and monitored. |
No information available | |
Sanctions Screening SLAs Guaranteed maximum time for screening and returning results. |
No information available | |
Multi-jurisdictional List Support Coverage of lists from multiple global jurisdictions. |
Multi-jurisdictional list support is described as part of multinational treasury compliance suite. | |
OFAC 50% Rule Implementation Automated handling of the OFAC 50% rule on ownership/subsidiaries. |
Product lists compliance with OFAC 50% rule as part of ownership/subsidiary screening. | |
Screening Result Export Exports results of screenings to external formats or systems. |
No information available | |
Watchlist Alert Reporting Generates and sends reports on watchlist-related alerts. |
Watchlist alert reporting and notifications included in compliance dashboards. | |
Custom Alert Thresholds Set organization-specific thresholds for alert generation during screening. |
No information available |
Automated Compliance Reports Generates regulatory reports as needed for KYC/AML compliance. |
Product generates automated KYC/AML compliance and regulatory reports. | |
Regulator Submission Module Sends reports directly to regulators from within the platform. |
Regulator report submission functionality included in product suite. | |
Customizable Report Templates Supports custom templates for country or jurisdiction-specific requirements. |
Customizable report templates mentioned in reporting and audit documentation. | |
Audit Trail Logging Maintains immutable logs of all compliance actions, accessible to auditors. |
Audit trail logs for all compliance actions; essential KYC/AML practice. | |
Report Scheduling Allows scheduling of periodic compliance reports. |
Report scheduling for periodic regulatory compliance is a supported workflow. | |
Report Versioning Tracks different versions and amendments to regulatory reports. |
No information available | |
Exception Reporting Generates special reports for exceptions or unresolved alerts. |
Exception reporting for unresolved alerts is an available feature. | |
Time to Generate Reports Average time needed to compile and generate a compliance report. |
No information available | |
Automated Data Aggregation Aggregates data automatically from multiple modules for reporting. |
Automated data aggregation for reporting is integrated in suite. | |
Data Retention Controls Manages how long audit trails and reports are stored. |
Data retention controls configurable to align with regulatory rules. | |
Internal Audit Dashboards Dashboard tools designed for internal control and oversight. |
No information available | |
Compliance Certification Tracking Tracks and manages regulatory certifications and attestations. |
No information available | |
User Activity Logs Detailed logs on user activities within the compliance platform. |
User and activity logs for compliance/audit. | |
Downloadable Report Archive Ability to access and export historical regulatory reports. |
Downloadable report archives mentioned for regulatory history. | |
Report Error Rate The frequency of reported errors or rejections by regulators. |
No information available |
Case Creation Automation Automatically generates cases when alerts are triggered. |
Case automation as part of transaction monitoring and EDD flows. | |
Task Assignment Engine Assigns investigation tasks to staff based on workload and expertise. |
No information available | |
Escalation Rules Rules-based escalation paths for unresolved or critical cases. |
Escalation rules for case handling are referenced in product documentation. | |
Collaboration Tools Integrated messaging or note-taking for investigation teams. |
No information available | |
Case Closure Metrics Tracks average time-to-close for compliance cases. |
. | No information available |
Document Attachment for Cases Attach evidence and documents directly to specific cases. |
Evidence/document attachments for investigative cases are supported. | |
Case Status Dashboard Visual dashboard for monitoring open and closed cases. |
Case dashboards for open/closed monitoring referenced as core functionality. | |
Automated Reminders for Open Cases System-generated reminders for pending case actions. |
Automated reminders for pending case actions included in workflow modules. | |
Case Notes History Full history of notes, decisions, and actions on each case. |
Full case notes history is a feature of investigative and case management workflows. | |
Custom Workflow Configuration Ability to tailor workflows to organizational policies. |
Custom workflow/policy configuration is listed as a key feature for treasury teams. | |
Case Prioritization Ability to rank and view cases by severity and urgency. |
Case prioritization by risk/severity is included. | |
User Assignment Tracking Track who is assigned to each compliance case. |
No information available | |
Automated Escalation Triggers Automatically escalates cases based on defined risk and time parameters. |
Triggers for automated escalation are documented. | |
Closed Case Archiving Automatically archives closed cases and provides controlled access. |
No information available | |
Exportable Case Logs Enables exporting complete case histories for audit or review. |
No information available |
Open API Availability Offers open APIs for embedding compliance modules into treasury workflows. |
Open API described for integration with treasury/ERP for compliance workflows. | |
Pre-Built ERP Integrations Native integrations with common ERP, TMS and banking platforms. |
Pre-built ERP integrations with SAP and major TMS platforms described as vendor selling point. | |
Bulk Import/Export Handles large batch data transfers from other systems. |
Product supports large batch data transfer/import/export. | |
Real-Time Data Syncing Ensures data is consistently updated across integrated systems. |
Real-time data syncing is included for integration with external systems. | |
Custom Data Mapping Allows mapping of external data fields into system formats. |
Custom data mapping for external fields referenced for onboarding. | |
Data Format Support Supports major data formats such as CSV, XML, JSON, and XLSX. |
Supports CSV, XML, XLSX, and JSON data formats; vendor and documentation confirm. | |
Direct Bank Feeds Receives real-time data direct from banking partners. |
No information available | |
Number of Supported Integrations Count of external services natively supported. |
. | No information available |
Webhooks Support Triggers or receives webhook-based events for data updates. |
No information available | |
Data Encryption During Transfer Secures all inter-system data with strong encryption protocols. |
Data encryption during inter-system transmission referenced (compliance with financial data security norms). | |
Automated Data Cleansing Cleanse and de-duplicate data on import. |
Automated data cleansing and deduplication referenced in onboarding and integration guides. | |
Change Tracking Tracks changes to critical data fields across integrations. |
Change/event tracking logs for integrated data; cited in audit trail features. | |
Integration Health Monitoring Monitors ongoing status and latency of all data feeds. |
No information available | |
Partner API Connectivity Direct API integrations with regulatory or vendor APIs. |
Direct partner API connections for regulatory updates described for global coverage. | |
Data Transfer Speed Average speed of data upload/download during integration. |
. | No information available |
End-to-End Encryption Data is fully encrypted at rest and in transit. |
End-to-end encryption and data security outlined to comply with regulations and security requirements. | |
Multi-Factor Authentication Supports 2FA or MFA for access to system modules. |
Multi-factor authentication referenced for system user logins and admin policy. | |
Data Masking Masks sensitive fields in interfaces and exports. |
Data masking for sensitive fields in interfaces/exports covered in documentation. | |
Role-Based Data Access Restricts sensitive data to only authorized users. |
Role-based access for sensitive data and admin functions confirmed. | |
Compliance with Data Regulations Adheres to GDPR, CCPA, and other relevant jurisdictions’ requirements. |
GDPR/CCPA and global data regulation compliance stated for EU and multinational clients. | |
Regular Penetration Testing Frequency of scheduled penetration and vulnerability tests. |
No information available | |
Security Incident Response Built-in procedures and alerting for possible breaches. |
Security incident and breach response included in security and audit modules. | |
Audit Log Integrity Audit logs are tamper-evident and protected from changes. |
Immutable/tamper-evident audit logs are referenced. | |
Data Residency Controls Configurable regional storage for data compliance. |
Data residency and regional controls configurable for different jurisdictions. | |
Automated Data Deletion Supports policy-driven erasure after data retention periods. |
No information available | |
User Password Policy Enforcement Administrators can define minimum password complexity and rotation cycles. |
No information available | |
Secure API Authentication Strong authentication protocols for system APIs. |
API endpoints secured with strong authentication as described in developer portal. | |
Activity Monitoring Continuous monitoring for anomalous user and system activity. |
Anomalous activity detection and alerting described as part of platform security. | |
Data Backup Frequency Automated backup schedule for all data assets. |
No information available | |
Encryption Key Management Management and auditing of encryption keys. |
No information available |
Modern User Interface Intuitive and user-friendly dashboards and navigation. |
Modern and intuitive user interface featured in product overviews and demos. | |
Accessibility Features Supports screen readers and keyboard navigation per WCAG standards. |
WCAG accessibility standards and keyboard navigation options referenced in user documentation. | |
Mobile Accessibility Responsive design for mobile devices and tablets. |
Mobile and tablet-optimized user experience is mentioned. | |
Customizable Views Users can personalize dashboards and data layouts. |
Users can save layouts/views; described in platform customization features. | |
Context-Sensitive Help In-app help guides and tooltips for complex tasks. |
No information available | |
Localization/Language Packs Multi-language support for international teams. |
Localization and multi-language user interface available for global teams. | |
Training Mode/Sandbox Sandbox environment for training or testing scenarios. |
Sandbox/training mode available for onboarding and testing. | |
Fast Load Time Average system dashboard and page load speed. |
No information available | |
Notification Center Aggregated display of system alerts, messages, and updates. |
Notification center for alerts and messages included. | |
Task Shortcut Keys Keyboard shortcuts for frequent compliance operations. |
No information available | |
User Custom Reports End-users can design and save custom report layouts. |
User custom reports are supported in analytics suite. | |
Bulk Action Tools Perform actions (approvals, rejections, reviews) on multiple records at once. |
Bulk action tools (multi-record approval/review) available. | |
Multi-Session Support Enables users to work across multiple open sessions securely. |
No information available | |
Notification Frequency Settings Users can customize frequency of system updates and notifications. |
No information available | |
Single Sign-On (SSO) Supports authentication via SSO providers for corporate access. |
SSO authentication supported (SAML, OAuth) for corporate clients. |
Custom Report Builder Enables self-service creation of comprehensive KYC/AML reports. |
Custom and self-service report builder is listed in analytics suite capabilities. | |
Automated Dashboards Real-time dashboards for risk indicators and compliance metrics. |
Automated, real-time dashboards part of risk/compliance analytics. | |
Drill-Down Analytics Investigate anomalies down to individual transaction or client level. |
Drill-down analytics available on entity/transaction levels. | |
Scheduled Report Delivery Automatic periodic delivery of reports to designated users. |
Scheduled report delivery is a supported report distribution model. | |
Ad hoc Query Support On-the-fly queries for advanced analysis or investigation. |
Ad hoc queries and search supported for compliance investigators. | |
Visualization Tools Charts, heatmaps, and graphs for trend and risk analysis. |
Visualization tools (charts, maps, etc.) highlighted in reporting tools. | |
Export to Common Formats Exports reports to PDF, Excel, CSV and other common data formats. |
Export to PDF, Excel, CSV, etc., confirmed. | |
Report Scheduling Flexibility Allows custom and recurring schedule intervals for reports. |
Customizable and recurring scheduling for reports supported. | |
Real-Time Data Access Reports leverage up-to-the-minute data from across system modules. |
Reports and dashboards access real-time data from all modules. | |
Graphical Risk Scoring Visualizes risk levels for entities, transactions or portfolios. |
Graphical risk scoring visuals available on dashboards. | |
Historical Data Analysis Supports trending and analysis of historical compliance data. |
Historical data trending and reporting is an analytics toolkit feature. | |
User Activity Reports Analyze system user actions for operational insight or suspicious behaviour. |
System user activity reports are available. | |
Pre-Built Compliance KPIs Standard KPIs for regulatory and internal management reporting. |
Standard compliance KPIs available out-of-the-box. | |
Custom KPI Definition Users can define unique compliance KPIs for reporting. |
Custom KPI setup supported in compliance/analytics. | |
Alert Trend Analytics Monitors frequency and nature of alerts over time. |
Alert trend monitoring in reporting suite. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.