Offers multi-asset, multi-market surveillance for detection of market abuse, manipulation, and insider trading. Provides real-time analysis, reporting, and visual investigation tools.
Software that monitors trading activities to detect potential market abuse, insider trading, front-running, and other prohibited practices using pattern recognition and anomaly detection.
More Trade Surveillance Systems
More Compliance ...
Real-time Monitoring The system's ability to analyze and flag suspicious trades as they happen. |
Product claims real-time surveillance and analysis, indicating real-time monitoring capability. | |
Post-trade Analysis Ability to conduct surveillance on completed trades for historical pattern detection. |
Post-trade analysis named as a core use case on product website; enables detection of historical patterns. | |
Pattern Recognition Automated identification of market abuse patterns such as layering, spoofing, or wash trades. |
Detects market abuse patterns including spoofing, wash trading, layering, as referenced on website. | |
Anomaly Detection Statistical or AI-driven alerting on behaviors that deviate from historical norms. |
References AI-driven and statistical techniques to identify anomalies. | |
Alert Generation Automated creation of notifications for compliance team review on flagged activities. |
Automated alert generation highlighted as a central feature. | |
Custom Rule Creation Ability for users to define, implement, and adjust surveillance rules. |
System supports custom scenario and rule creation for surveillance as indicated on website. | |
Rule Library Pre-built rules for fast deployment and coverage of common compliance scenarios. |
Pre-built library of common rules mentioned as part of 'out of the box' deployment. | |
Case Management Tools for documenting, tracking, and managing compliance investigations. |
Case/investigation management supported via dedicated investigation tools in UI. | |
False Positive Reduction Mechanisms to reduce erroneous or unnecessary alerts. |
Describes AI and advanced statistics to reduce 'false positives.' | |
Alert Prioritization System to rank the importance and urgency of alerts based on risk. |
Alert prioritization for compliance highlighted in solution brief. | |
Investigation Workflow Structured process for alert review, analysis, escalation, and resolution. |
Describes workflow with escalation, resolution, and analysis steps for investigations. | |
Audit Trail Comprehensive logging of user actions, rule changes, and investigations for compliance. |
Comprehensive audit trail described as key compliance feature. | |
Real-time Data Ingest Rate The maximum number of trades or messages processed per second in real-time monitoring. |
No information available | |
Historical Data Retention Period Time duration for which trade data is maintained for surveillance and investigations. |
No information available |
Insider Trading Detection Ability to recognize trading activity that may be based on non-public, material information. |
Specific mention of detection of insider trading and manipulation. | |
Front-running Detection Identification of personnel trading ahead of client or firm orders. |
Front-running detection is included in standard market abuse scenarios. | |
Spoofing/Layering Detection Detection of placing orders with intention to cancel to manipulate market appearance. |
Detects layering/spoofing; both listed explicitly in supported scenarios. | |
Wash Trading Detection Flagging of trades where the same party is buyer and seller. |
Wash trading detection advertised as a feature. | |
Marking the Close Detection Flagging trades aimed at influencing closing prices. |
Marking the close scenario mentioned as covered. | |
Churning Detection Detection of excessive trading to generate commissions or fees. |
Churning is indicated as a detected pattern in surveillance scenarios. | |
Quote Stuffing Detection Identifies high volumes of order submission and cancellation to clog market data. |
Quote stuffing patterns can be monitored, as noted in detection capabilities. | |
Reference Price Manipulation Detects attempts to distort benchmarks or reference prices. |
Reference price manipulation (benchmarks, etc.) included in coverage. | |
Cross-market Manipulation Coverage Ability to correlate and detect abuse across multiple venues or asset classes. |
System supports cross-market/cross-venue correlation to detect market abuse. | |
Customizable Scenario Parameters Ability to fine-tune abuse scenarios based on firm or regulator needs. |
Scenario parameters are customizable per client and regulator. |
Multi-Asset Class Support Support for equities, fixed income, options, futures, FX, crypto, etc. |
Supports equities, fixed income, derivatives, energy, FX, and more (multi-asset). | |
Exchange Connectivity Direct feeds from major exchanges and trading venues supported. |
Connects to a broad range of exchanges globally, as per documentation. | |
Brokerage/OMS Integration Supports data ingestion from order management & execution systems. |
Supports integration with OMS and brokerage data feeds. | |
Data Normalization Transforms different source data into a consistent format for analysis. |
Data normalization described as a core platform function for multi-source ingestion. | |
Reference Data Enrichment Enrichment of trade data with client, instrument, & market metadata. |
Reference data (client, instrument) enrichment available for surveillance. | |
Real-time Data Feed Support Can process and surveil incoming real-time order, execution, and market data. |
Real-time data feeds and monitoring highlighted as key differentiator. | |
Historical Data Import Bulk ingestion of legacy data for backtesting and lookback reviews. |
Supports import of historical/legacy trading data for backtesting and replay. | |
Third-party Data Integration Ability to integrate with data from third-party vendors and regulators. |
Integration with third-party data sources (external vendors/regulators) available. | |
APIs for Data In/Out Public or private APIs for custom integrations to ingest/extract data. |
APIs available for data integration, as referenced in technical documentation. |
Alert Dashboard Centralized view of current and historical alerts with filtering and sorting. |
Centralized alert dashboard with filtering, sorting, and investigation view shown in UI demos. | |
Workflow Automation Automates assignment, tracking, and management of surveillance cases. |
Automated workflows for alert/case assignment and escalation documented. | |
Investigation Notes Secure and timestamped note-taking for audits and reviews. |
Case notes and auditor-friendly logs are featured within the interface. | |
Attachment Handling Upload and attach evidence or documents to cases or alerts. |
No information available | |
Audit Log Immutable record of all user and system actions related to cases. |
Immutable audit log mentioned for regulatory and forensic purposes. | |
Alert Escalation Workflow for raising the severity or assigning cases to higher authority. |
Alert escalation options described in workflow management. | |
Disposition Tracking Track final outcomes (dismissal, SAR filing, etc.) for audit purposes. |
Tracks outcome and disposition of each case and alert. | |
Bulk Alert Management Tools for actioning or closing batches of alerts efficiently. |
No information available | |
Case Re-open Functionality Allows re-examination of closed cases if new information arises. |
No information available | |
Integration with Email/Communication Platforms Send notifications, reminders, or extract communications as part of surveillance. |
No information available |
Regulatory Reporting Templates Pre-built templates for common regulatory filings (e.g., SAR, STOR, MROS). |
Out-of-the-box regulatory report templates outlined (e.g., STOR, MAR, MiFID II compliance). | |
Custom Report Builder Allows users to generate custom reports using extensive data filters and pivots. |
Custom report builder and flexible reporting mentioned in marketing collateral. | |
Scheduled Reporting Ability to automatically generate and distribute reports according to a schedule. |
Scheduled/automated reporting functionality specifically described. | |
Interactive Dashboards Visualizations and key metrics about alerts, investigations, and trends. |
Interactive dashboards and visualization available in system overview. | |
Data Export Capability Export raw data or reports in CSV, Excel, PDF, or other formats. |
Bulk export in multiple formats supported (CSV, Excel, PDF). | |
Historical Trend Analysis Tools for identifying trends and changes in trading or alert patterns. |
Trend and historical analysis capability is promoted. | |
Management Information Reports KPI and MI tools for compliance and operations management. |
Management information reporting (KPIs, MI) is a feature for compliance teams. | |
Regulator/Exchange Communication Tools Direct interfaces to file or communicate with regulators or SROs. |
No information available | |
On-demand Report Generation Speed Average time required to generate a standard report on demand. |
No information available |
Maximum Concurrent Users Number of users who can access and use the system simultaneously. |
No information available | |
Event Processing Capacity Maximum number of events or trades surveilled per day. |
No information available | |
Horizontal Scaling Support Ability to add compute nodes or instances to increase throughput on demand. |
System designed for elastic/high-throughput environments, supports horizontal scaling. | |
Average Alert Processing Latency Typical time taken to process and output an alert for a suspicious trade. |
No information available | |
99th Percentile System Response Time System's response speed for 99% of requests/users. |
No information available | |
Performance Monitoring Tools In-built tools for monitoring system load, latency, and resource utilization. |
In-built performance monitoring mentioned for system health. | |
High Availability (HA) Architecture Implementation of redundancy, failover, and downtime minimization. |
Designed for high-availability deployment. Includes failover support. | |
Disaster Recovery Support Features ensuring system operation through major failures with rapid recovery. |
Disaster recovery is a supported deployment feature, as stated for regulatory clients. |
Multi-jurisdictional Support Coverage for rules and requirements across different geographies. |
Multi-jurisdictional, multi-market surveillance is a core value proposition. | |
Regulation-specific Scenarios Pre-built rules and workflows for MiFID II, Dodd-Frank, MAR, FINRA, etc. |
Pre-built scenarios for specific regulations (MAR, MiFID II, Dodd-Frank) are referenced. | |
Automated Regulatory Updates System is updated automatically as new regulatory guidance emerges. |
No information available | |
Audit Readiness Built-in features to simplify preparing for and supporting regulatory audits. |
Audit support tools and features for regulatory readiness promoted. | |
Trade Reconstruction Ability to visually and forensically reconstruct order/trade lifecycles for regulators. |
Trade reconstruction available for detailed forensic investigations. | |
Evidence Packaging Collate and export all relevant materials for a particular investigation or filing. |
Evidence packaging (collating of relevant info) described for investigations. |
Role-based Access Control Ability to define fine-grained user roles and permissions. |
Role-based permissions and access controls included. | |
Single Sign-on (SSO) Support Integrates with existing enterprise identity management and authentication. |
SSO (Single Sign-On) supported via enterprise integrations. | |
Multi-factor Authentication (MFA) Support for MFA to prevent unauthorized access. |
Multi-factor authentication is available for secure access. | |
Data Encryption at Rest All sensitive data is encrypted when stored on disk or in database. |
Encryption at rest standard for both on-prem and SaaS deployments. | |
Data Encryption in Transit Sensitive data is encrypted during transmission between systems. |
Encryption in transit asserted as part of security posture. | |
Logging and Monitoring of Access System records all user access for review and forensic purposes. |
Comprehensive monitoring and logging of user access and activity documented. | |
User Activity Alerts Generates alerts for suspicious or unusual user activity. |
Alerts for unusual or risky user activity are mentioned in feature descriptions. |
Rule Editor/Designer Graphical or scripting interface for rapid rule development. |
Rule designer/editor described, allowing custom scripting and GUI configuration. | |
Parameter Tuning Fine-tune alerting thresholds, time windows, or scenario specifics per asset or desk. |
Alert parameters and thresholds are fully configurable. | |
Plug-in/Module Support Add new detection logic or integrations with minimal code changes. |
Modular system with support for new plugins/integrations. | |
Custom Dashboard Widgets Create or modify dashboard elements for role-specific workflows. |
Custom dashboard widgets supported for specific user roles and workflows. | |
Localization/Language Support Multi-language user interface and documentation. |
No information available |
Machine Learning Model Integration Support for deploying and managing custom ML models for detection. |
Machine learning model integration for customizable detection is available as advanced feature. | |
Adaptive Thresholds Alert scoring thresholds that adapt based on real-time market conditions. |
Adaptive thresholds using real-time market data are described in system specifications. | |
Entity Profile Generation Autonomous generation and updating of trading entity behavioral profiles. |
Entity profiling for traders/entities features in analytics toolset. | |
Outlier Analysis Identification of uncommon or infrequent behavioral patterns. |
Outlier (anomaly) analysis included in detection suite. | |
Explainable AI Features Transparency and interpretability of automated alerting models. |
Explainability features for AI models documented for compliance teams. | |
Self-learning Algorithms Ability for algorithms to improve over time using feedback from investigators. |
System includes self-learning algorithmic detection as a next-gen feature. |
24/7 Technical Support Round-the-clock technical assistance for critical system issues. |
24/7 technical support offered by Scila as part of enterprise agreement. | |
Dedicated Account Manager Named representative for ongoing client relationship and support. |
Dedicated account management provided to institutional clients. | |
Onboarding and Implementation Services Comprehensive support for system rollout, data migration, and testing. |
Comprehensive onboarding and implementation support highlighted as service offering. | |
User Training Programs Initial and ongoing user training provided by vendor. |
User and admin training programs are available from the vendor. | |
Knowledge Base/Help Center Online repository of product guides, FAQs, and documentation. |
Knowledgebase and helpcenter access available via online portal. | |
SLAs (Service Level Agreements) Guaranteed support response and resolution times. |
SLAs for support and resolution are offered in customer contracts. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.