Customer onboarding, perpetual KYC screening, transaction monitoring, document management, dynamic risk assessment, and regulatory reporting.
Systems for screening clients against watchlists, monitoring transactions for suspicious activity, and maintaining regulatory compliance documentation.
More AML/KYC Compliance Software
More Compliance ...
Identity Document Verification Ability to verify government-issued identity documents (passports, national IDs, etc.) electronically. |
RiskScreen advertises identity document verification as part of its onboarding process, supporting eKYC across global ID types. | |
Facial Recognition/Matching Matches client-provided photos with ID documents using facial recognition technology. |
Facial recognition is included in onboarding and biometric verification modules on the RiskScreen website. | |
Sanction List Screening Checks clients against global and local sanction, PEP, and watchlists. |
Sanction, PEP, and watchlist screening are core advertised features of RiskScreen. | |
Adverse Media Screening Searches for negative news related to clients using media and public data sources. |
Adverse media screening is highlighted with web scouring and ongoing negative news screening. | |
Ongoing Customer Monitoring Continuously screens existing clients for changes in status or newly published risks. |
System offers ongoing customer monitoring as 'perpetual KYC screening.' | |
Risk Scoring Engine Assigns dynamic risk scores to clients based on risk factors and behaviors. |
Dynamic risk assessment and risk scoring explicitly referenced on the product homepage. | |
Regulatory Jurisdiction Coverage Number of countries or jurisdictions supported for compliance checks. |
No information available | |
Language Support Number of languages supported for global client onboarding and screening. |
No information available | |
Enhanced Due Diligence Handling Supports additional data collection and review for high risk clients. |
Enhanced Due Diligence (EDD) is named as part of client workflow for high-risk onboarding. | |
Batch Processing Capability Ability to process multiple client screenings at once. |
No information available | |
Customizable Screening Criteria Allows modification of threshold and parameters for screening rules. |
Customizable screening rules and parameters cited on the product page and in user guides. |
Real-Time Transaction Monitoring Automatically scans transactions for suspicious patterns as they occur. |
Real-time monitoring capability is featured, particularly for transaction screening. | |
Behavioral Pattern Detection Uses profiling and analytics to detect unusual or unexpected patterns. |
Behavioral pattern detection is listed under AI-driven transaction monitoring analytics. | |
Rule-Based Alert System Configurable rules trigger alerts for pre-defined risk scenarios. |
Customizable and rule-based alerting system described in AML module details. | |
Machine Learning/AI Analytics Employs AI models to detect previously unknown or emerging risks. |
AI/ML analytics are a point of differentiation in RiskScreen’s transaction monitoring. | |
Alert Prioritization Ranks alerts based on severity and risk relevance for efficient case handling. |
Alert prioritization is described in product material as part of workflow efficiency. | |
False Positive Management System features to reduce unnecessary alerts and streamline review. |
False positive management is featured, with machine-learning driven reduction tools. | |
Volume Handling Capacity Maximum number of transactions monitored per second. |
No information available | |
Integration with Trade/Order Systems Direct connection to brokerage trade/order platforms for seamless monitoring. |
APIs and support for integration with trade/order systems mentioned on integration support pages. | |
Peer Group Analysis Compares client behavior against similar client group averages. |
Peer group analysis available via behavior-based anomaly detection for trading clients. | |
Historical Data Analysis Supports backtesting and review of historical transactions for compliance audits. |
Backtesting and historical data analysis for compliance audit functionality described. | |
Automated Case Escalation Automatically escalates suspicious cases for compliance officer review. |
Automated case escalation included in case management workflow features. |
Integrated Global Lists Supports all major regulatory and financial watchlists (OFAC, EU, UN, etc.). |
Integrated coverage of major global watchlists (OFAC, UN, EU, etc.) prominently advertised. | |
Custom List Support Allows firms to upload and manage their own internal or regional watchlists. |
Custom list management of internal and regional watchlists supported. | |
Automated List Updates Regularly and automatically fetches the latest list changes. |
Automatic watchlist updates with version tracking detailed in back-end automation descriptions. | |
Version Control Tracks list changes and maintains history for audit purposes. |
Version control for watchlists and audit logs described in compliance audit toolkit. | |
List Capacity Maximum number of entries supported per watchlist. |
No information available | |
Fuzzy Matching Algorithms Detects similar names or entities with variable spellings. |
Fuzzy matching algorithms for name screening and misspellings explained in the AML product suite. | |
Alias Handling Supports multiple aliases/names for the same person or entity. |
Alias and entity variant handling are supported per documentation. | |
Bulk List Import/Export Allows batch file management for lists. |
Bulk watchlist import/export options included as batch file functions. | |
Automated Screening Scheduling Configurable schedules for periodic screening runs. |
Automated and scheduled screening jobs configurable per client need. | |
Geo-Restriction Handling Manages restricted or high-risk regions and jurisdictions. |
Geo-restriction handling described as part of jurisdiction risk configuration. |
Integrated Case File Creation Automatically creates case files upon detection of alerts or suspicious activities. |
Case files auto-generated upon alert creation in the system. | |
Investigation Workflow Engine Guided process for analysts through investigation, review, and resolution steps. |
Investigation workflow engine and audit trail support included in case management workflow. | |
Audit Trail Logging Maintains detailed logs of all actions taken on a case for compliance. |
Comprehensive audit trail logging provided per compliance documentation. | |
Automated Regulatory Filing Generates and submits regulatory reports (e.g., SAR/STR) in the required formats. |
Automated regulatory filing (such as SARs/STRs) is included for multiple geographies. | |
Role-Based Access Control Restricts and manages access to cases based on user roles or responsibilities. |
Role-based access controls discussed under enterprise and multi-jurisdiction deployment. | |
Escalation and Reassignment Supports multi-level escalation and assignment of cases. |
Multi-level case escalation and reassignment featured in workflow capabilities. | |
Case Review SLAs Tracks and enforces service-level agreements for case review duration. |
No information available | |
Document Storage Capacity Maximum storage allocated per case for supporting documents. |
No information available | |
Automated Case Notification Notifies relevant users upon updates, assignment, or need for action. |
Automatic notifications and reminders part of case workflow management. | |
Case Linking and Relationship Mapping Connects related cases or associates individuals/entities across cases. |
Case linking and relationship analysis described as an advanced investigation feature. |
Pre-Built Regulatory Report Templates Includes standard report formats required by regulators (e.g., SAR, CTR, STR, KYC logs). |
Pre-built regulatory report templates (SAR, CTR, KYC logs) available as standard. | |
Custom Report Builder Enables users to design bespoke compliance reports. |
Custom compliance report builder available for bespoke report creation. | |
Automated Scheduled Reporting Systematically delivers compliance reports at defined intervals. |
Automated scheduled reporting available for recurring compliance needs. | |
Regulatory Data Retention Period Number of years for which compliance data is retained. |
No information available | |
E-Filing Integration Supports direct submissions via regulatory authority electronic channels. |
E-filing integration with many regulators and reporting agencies cited in documentation. | |
Multi-Jurisdictional Compliance Built-in features for different global regulatory regimes. |
Multi-jurisdictional compliance modules highlighted as a differentiator. | |
Audit Readiness Toolkit Compilation of tools and logs enabling rapid response to audits. |
Audit readiness toolkit is discussed as part of regulatory inspection response. | |
Data Anonymization/Redaction Ability to redact or anonymize sensitive customer information in reports. |
Data redaction/anonymization for reports supported for PII and GDPR compliance. | |
Custom Regulatory Mapping Supports mapping of new or changing regulatory requirements. |
Supports custom mapping of local and new regulatory requirements per jurisdiction. | |
Compliance Attestation Support Module for documentation and certification of compliance by officers. |
Supports compliance attestation by compliance officers with electronic sign-off. |
API Access and Documentation Provides detailed APIs for integration with proprietary or third-party systems. |
API documentation and full developer portal available for integration. | |
Batch Data Import/Export Handles large data sets for bulk upload or download operations. |
Batch import/export included as main admin feature in UI. | |
Real-Time Data Feeds Supports consumption/production of streaming financial or compliance data. |
Supports real-time data streaming from trading platforms and reference data feeds. | |
Third-Party Data Provider Integration Easy integration with external KYC/AML data sources, credit bureaus, etc. |
Integration with leading KYC/AML data bureaus and external providers referenced. | |
Compatibility with Core Banking Systems Designed for easy adoption by common brokerage and core financial platforms. |
System designed for integration with core financial platforms and brokerages. | |
Customizable Webhooks Triggers actions in other systems upon specific compliance events. |
Custom webhook support available for triggering external system workflows. | |
SSO and Identity Provider Support Integrates with identity management and SSO for organizational identity control. |
SSO and integration with corporate identity providers mentioned. | |
Plugin/Extension Support Can be extended with add-ons for specific compliance needs. |
Plugin and extension architecture referenced for customization. | |
Connector Library Size Number of pre-built connectors to standard systems/platforms. |
No information available | |
Legacy System Support Compatible with non-modern or legacy brokerage infrastructures. |
Legacy system support for bank/broker infrastructure highlighted in onboarding FAQ. |
Customizable Dashboards Personalized views for compliance officers, executives, or investigators. |
Custom dashboard capabilities for compliance and risk user groups discussed. | |
Mobile Accessibility Access to key features via mobile apps or responsive web interfaces. |
Mobile accessibility via mobile responsive web interfaces described. | |
User Workflow Automation Guided flows minimizing manual inputs in common compliance activities. |
User workflow automation in compliance tasks detailed in product demonstrations. | |
Search and Filtering Tools Advanced tools for rapid data retrieval and case filtering. |
Advanced search and filtering tools form part of case and transaction workflow. | |
Bulk Action Tools Support for batch processing and bulk updates. |
Bulk actions (batch updates and reviews) available to admin and compliance users. | |
Multi-Language UI User interface offered in multiple languages. |
Multi-language UI support referenced for global deployments. | |
Accessibility Compliance Meets accessibility standards such as WCAG for user inclusivity. |
No information available | |
User Training and Help Center Built-in education modules and real-time assistance features. |
In-app training, onboarding tutorials, and searchable help center included. | |
Custom User Roles Tailorable user permissions for granular security and workflow management. |
Custom user and admin roles permitted, enabling granular security. | |
Performance/Load Times Average time taken for the UI to load main dashboards. |
No information available |
Data Encryption In Transit/At Rest Encrypts all sensitive data both in motion and when stored. |
Data encryption in transit and at rest (AES-256/TLS1.2+) highlighted in security documentation. | |
Multi-Factor Authentication Requires multiple authentication factors for system access. |
Multi-factor authentication supported for high-privilege user access. | |
Access Logging and Monitoring Extensive logs of all user access and administrative actions. |
Comprehensive user access and audit log monitoring provided. | |
Penetration Testing Frequency How often the system undergoes external security assessment. |
No information available | |
Data Residency Options Supports choice of specific regions/countries for data storage. |
Client data storage region/jurisdiction selectable for GDPR compliance. | |
Compliance with Industry Standards Adheres to standards such as ISO 27001, PCI DSS, GDPR. |
Adherence to ISO 27001, GDPR, and PCI DSS listed under certifications. | |
User Session Time-Outs Automatic log-off after a period of inactivity. |
User session inactivity timeouts configurable in the platform. | |
Field-Level Data Masking Sensitive fields can be masked or hidden from unauthorized users. |
Field-level data masking and permission management for sensitive PII. | |
Secure Audit Log Storage Ensures immutability and backup of critical audit logs. |
Immutable and redundant storage of audit logs is described in cloud setup material. | |
Incident Response Procedures Documented processes for breach detection and notification. |
Incident response, breach notification and SOC workflow clearly documented. |
Concurrent User Limit Maximum number of users supported simultaneously. |
No information available | |
Transaction Processing Latency Average time to process and analyze a single transaction. |
No information available | |
Uptime/Availability SLA Guaranteed system availability often expressed as a percentage. |
No information available | |
Data Ingestion Rate Speed at which system can ingest new compliance data. |
No information available | |
Horizontal Scaling Support System supports scaling across servers/nodes to accommodate growth. |
Supports scaling across nodes/cloud providers for enterprise clients. | |
Performance Monitoring Tools Built-in dashboards and alerts on system performance metrics. |
Monitoring dashboards and performance telemetry included in admin UI. | |
Cloud Deployment Option System can be deployed as a cloud (SaaS) or hybrid solution. |
Available as SaaS cloud solution, with hybrid deployment as an option. | |
On-Premise Deployment Option Supports local/internal hosting for sensitive or regulated data. |
On-premises deployment available for regulated, sensitive environments. | |
Disaster Recovery RTO Recovery Time Objective in case of system outage. |
No information available | |
Database Size Limit Maximum database size supported without performance loss. |
No information available |
24/7 Support Availability Round-the-clock access to technical and compliance support. |
24/7/365 technical and compliance support referenced on main support page. | |
Dedicated Account Manager Single point of contact for service and issue escalation. |
Dedicated account managers provided as standard for enterprise accounts. | |
Self-Service Knowledge Base Extensive library of documentation, FAQs, and training material. |
Extensive online documentation and searchable self-service knowledge base available. | |
Regular System Updates Frequency of non-disruptive security, functionality and rule updates. |
No information available | |
Custom SLA Options Ability to define support levels and response times contractually. |
Custom SLA and response-time options negotiable for large enterprise clients. | |
Uptime Guarantee Contractual uptime guarantee for system operation. |
No information available | |
Automated Backup Scheduling Scheduled, automated backups of all system and client data. |
Automated and scheduled backup processes listed in system reliability documentation. | |
Patch Management Tools Automation of system security patching and compliance rule changes. |
Patch management and rule-set updating processes described in devops documentation. | |
User Feedback Loop Mechanisms for users to submit feedback and feature requests. |
User feedback and feature request module is included via support dashboard. | |
Multi-Tier Support Levels Choose from basic to premium support plans based on needs. |
Multi-tier support plan options (essential, premium, enterprise) outlined on pricing/support pages. |
Transparent Pricing Model Clearly published and predictable licensing or usage costs. |
Transparent pricing information and calculators available online. | |
Pay-As-You-Go Option Usage-based billing for modular feature access. |
Pay-as-you-go billing plans (especially for API usage) referenced in developer and pricing documentation. | |
Volume Discounts Available Lower per-unit pricing as transaction or client count increases. |
Volume discounts for larger firms described on the pricing and partner channel. | |
Free Trial/POC Period for free evaluation or proof of concept. |
Free trial and demo/proof-of-concept periods offered to prospects per website. | |
Feature-Based Licensing Modular pricing per individual function/module. |
Feature/modules sold on a modular licensing basis for flexibility. | |
Perpetual License Option Option to purchase software outright rather than as a subscription. |
Enterprise licensing includes perpetual licensing on request. | |
Annual Billing Option Discounted pricing for annual upfront payment. |
Annual billing options and discounts noted on pricing and procurement pages. | |
Multi-Entity Licensing Special terms for multi-subsidiary or group licensing. |
No information available | |
Seat/User License Cap Maximum number of named users included without additional charges. |
No information available | |
Additional Data Storage Pricing Published price per additional unit of data storage. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.