Cryptocurrency compliance solution with transaction monitoring, wallet screening, and risk scoring. Features include real-time alerts, investigation tools, and automated SAR filing capabilities specifically designed for crypto brokerages and trading platforms.
Systems for screening clients against watchlists, monitoring transactions for suspicious activity, and maintaining regulatory compliance documentation.
More AML/KYC Compliance Software
More Compliance ...
Identity Document Verification Ability to verify government-issued identity documents (passports, national IDs, etc.) electronically. |
Elliptic Navigator verifies blockchain addresses and crypto wallets, but does not explicitly verify government-issued identity documents; thus, may not natively support document verification, but can be integrated with KYC providers. | |
Facial Recognition/Matching Matches client-provided photos with ID documents using facial recognition technology. |
No information available | |
Sanction List Screening Checks clients against global and local sanction, PEP, and watchlists. |
Elliptic's documentation states Navigator checks against global and local watchlists and sanction lists for wallet/activity screening. | |
Adverse Media Screening Searches for negative news related to clients using media and public data sources. |
Adverse media and negative news are included in Elliptic’s risk indicators for wallets and transactions. | |
Ongoing Customer Monitoring Continuously screens existing clients for changes in status or newly published risks. |
Ongoing monitoring of wallets and customers is a core capability, with dynamic updates and real-time notifications. | |
Risk Scoring Engine Assigns dynamic risk scores to clients based on risk factors and behaviors. |
Elliptic Navigator provides dynamic risk scoring for both transactions and counterparties. | |
Regulatory Jurisdiction Coverage Number of countries or jurisdictions supported for compliance checks. |
No information available | |
Language Support Number of languages supported for global client onboarding and screening. |
No information available | |
Enhanced Due Diligence Handling Supports additional data collection and review for high risk clients. |
Elliptic supports enhanced due diligence via investigative tools and detailed reporting for high-risk cases. | |
Batch Processing Capability Ability to process multiple client screenings at once. |
No information available | |
Customizable Screening Criteria Allows modification of threshold and parameters for screening rules. |
Screening rules and alert thresholds are customizable by the compliance team in the platform. |
Real-Time Transaction Monitoring Automatically scans transactions for suspicious patterns as they occur. |
Transaction monitoring is performed in real-time, with instant alerts for suspicious activities. | |
Behavioral Pattern Detection Uses profiling and analytics to detect unusual or unexpected patterns. |
Elliptic employs behavioral analytics to flag unexpected or anomalous transaction patterns. | |
Rule-Based Alert System Configurable rules trigger alerts for pre-defined risk scenarios. |
Configurable rule-based alerting is core to Navigator configuration. | |
Machine Learning/AI Analytics Employs AI models to detect previously unknown or emerging risks. |
Marketing and technical documentation highlight use of AI and machine learning for typology detection. | |
Alert Prioritization Ranks alerts based on severity and risk relevance for efficient case handling. |
Navigator supports risk-based prioritized alert queues for efficient compliance case management. | |
False Positive Management System features to reduce unnecessary alerts and streamline review. |
Features specifically mention reducing false positives by using advanced analytics. | |
Volume Handling Capacity Maximum number of transactions monitored per second. |
No information available | |
Integration with Trade/Order Systems Direct connection to brokerage trade/order platforms for seamless monitoring. |
No information available | |
Peer Group Analysis Compares client behavior against similar client group averages. |
Offers peer group benchmarking against the crypto ecosystem. | |
Historical Data Analysis Supports backtesting and review of historical transactions for compliance audits. |
Supports historical analysis as part of investigations and compliance audits. | |
Automated Case Escalation Automatically escalates suspicious cases for compliance officer review. |
Navigator escalates suspicious cases to compliance teams automatically based on risk logic. |
Integrated Global Lists Supports all major regulatory and financial watchlists (OFAC, EU, UN, etc.). |
System includes integrated screening with global sanctions/watchlists. | |
Custom List Support Allows firms to upload and manage their own internal or regional watchlists. |
Allows firms to upload and manage custom lists in addition to global lists. | |
Automated List Updates Regularly and automatically fetches the latest list changes. |
Automated updates for public and regulatory watchlists are provided. | |
Version Control Tracks list changes and maintains history for audit purposes. |
No information available | |
List Capacity Maximum number of entries supported per watchlist. |
No information available | |
Fuzzy Matching Algorithms Detects similar names or entities with variable spellings. |
Supports advanced fuzzy matching methods for crypto user/entity name variations. | |
Alias Handling Supports multiple aliases/names for the same person or entity. |
Manages aliases for wallet addresses and associated entities. | |
Bulk List Import/Export Allows batch file management for lists. |
Bulk import/export for wallet, transaction, and list screening is documented. | |
Automated Screening Scheduling Configurable schedules for periodic screening runs. |
Allows scheduled periodic screening per client-compliance requirement. | |
Geo-Restriction Handling Manages restricted or high-risk regions and jurisdictions. |
Geo-restriction management is natively supported (OFAC regimes, high-risk jurisdictions etc.). |
Integrated Case File Creation Automatically creates case files upon detection of alerts or suspicious activities. |
Case files are generated automatically on alert creation and investigations. | |
Investigation Workflow Engine Guided process for analysts through investigation, review, and resolution steps. |
Investigation workflows are embedded for alert/case management. | |
Audit Trail Logging Maintains detailed logs of all actions taken on a case for compliance. |
Comprehensive audit trails are maintained for all actions. | |
Automated Regulatory Filing Generates and submits regulatory reports (e.g., SAR/STR) in the required formats. |
Automated SAR/STR reporting is featured for U.S. and some global requirements. | |
Role-Based Access Control Restricts and manages access to cases based on user roles or responsibilities. |
Role-based permissions and team access controls are supported. | |
Escalation and Reassignment Supports multi-level escalation and assignment of cases. |
Multi-tier escalation and hand-off is described in case management documentation. | |
Case Review SLAs Tracks and enforces service-level agreements for case review duration. |
No information available | |
Document Storage Capacity Maximum storage allocated per case for supporting documents. |
No information available | |
Automated Case Notification Notifies relevant users upon updates, assignment, or need for action. |
Automatic notifications to users on status, assignment, and required actions. | |
Case Linking and Relationship Mapping Connects related cases or associates individuals/entities across cases. |
Connects and links related suspicious cases and cluster analysis. |
Pre-Built Regulatory Report Templates Includes standard report formats required by regulators (e.g., SAR, CTR, STR, KYC logs). |
Provides many standard SAR, STR, and KYC reports. | |
Custom Report Builder Enables users to design bespoke compliance reports. |
No information available | |
Automated Scheduled Reporting Systematically delivers compliance reports at defined intervals. |
Automated and scheduled compliance reporting is included. | |
Regulatory Data Retention Period Number of years for which compliance data is retained. |
No information available | |
E-Filing Integration Supports direct submissions via regulatory authority electronic channels. |
No information available | |
Multi-Jurisdictional Compliance Built-in features for different global regulatory regimes. |
Multi-jurisdictional regulatory compliance features highlighted. | |
Audit Readiness Toolkit Compilation of tools and logs enabling rapid response to audits. |
Audit readiness and export tools are included. | |
Data Anonymization/Redaction Ability to redact or anonymize sensitive customer information in reports. |
No information available | |
Custom Regulatory Mapping Supports mapping of new or changing regulatory requirements. |
No information available | |
Compliance Attestation Support Module for documentation and certification of compliance by officers. |
No information available |
API Access and Documentation Provides detailed APIs for integration with proprietary or third-party systems. |
Full API and developer documentation provided for integration. | |
Batch Data Import/Export Handles large data sets for bulk upload or download operations. |
Batch data upload/download for large compliance lists available. | |
Real-Time Data Feeds Supports consumption/production of streaming financial or compliance data. |
Navigator supports real-time and streaming data for crypto transactions. | |
Third-Party Data Provider Integration Easy integration with external KYC/AML data sources, credit bureaus, etc. |
Integrates with external data sources and KYC/AML vendors. | |
Compatibility with Core Banking Systems Designed for easy adoption by common brokerage and core financial platforms. |
Partner integrations for leading crypto and core banking systems supported. | |
Customizable Webhooks Triggers actions in other systems upon specific compliance events. |
Webhooks and event triggers are documented. | |
SSO and Identity Provider Support Integrates with identity management and SSO for organizational identity control. |
SSO/Identity provider integration available for enterprise users. | |
Plugin/Extension Support Can be extended with add-ons for specific compliance needs. |
No information available | |
Connector Library Size Number of pre-built connectors to standard systems/platforms. |
No information available | |
Legacy System Support Compatible with non-modern or legacy brokerage infrastructures. |
No information available |
Customizable Dashboards Personalized views for compliance officers, executives, or investigators. |
No information available | |
Mobile Accessibility Access to key features via mobile apps or responsive web interfaces. |
Web application has responsive interface for mobile use. | |
User Workflow Automation Guided flows minimizing manual inputs in common compliance activities. |
Investigation workflows and guided case review reduce manual work. | |
Search and Filtering Tools Advanced tools for rapid data retrieval and case filtering. |
Advanced search and multi-parameter filtering for case management. | |
Bulk Action Tools Support for batch processing and bulk updates. |
Bulk actions (approvals, dismissals, etc.) supported for alert and case handling. | |
Multi-Language UI User interface offered in multiple languages. |
No information available | |
Accessibility Compliance Meets accessibility standards such as WCAG for user inclusivity. |
No information available | |
User Training and Help Center Built-in education modules and real-time assistance features. |
Online documentation and user help centers are public. | |
Custom User Roles Tailorable user permissions for granular security and workflow management. |
Admin can create custom user roles for compliance and investigations. | |
Performance/Load Times Average time taken for the UI to load main dashboards. |
No information available |
Data Encryption In Transit/At Rest Encrypts all sensitive data both in motion and when stored. |
All customer and transaction data encrypted at rest and in transit (per trust documentation). | |
Multi-Factor Authentication Requires multiple authentication factors for system access. |
Multi-factor authentication is a documented security feature. | |
Access Logging and Monitoring Extensive logs of all user access and administrative actions. |
Platform keeps access/event logs for compliance and monitoring. | |
Penetration Testing Frequency How often the system undergoes external security assessment. |
No information available | |
Data Residency Options Supports choice of specific regions/countries for data storage. |
No information available | |
Compliance with Industry Standards Adheres to standards such as ISO 27001, PCI DSS, GDPR. |
Compliance certifications and GDPR, ISO27001 adherence are listed on site. | |
User Session Time-Outs Automatic log-off after a period of inactivity. |
User session time-outs are configurable per security policies. | |
Field-Level Data Masking Sensitive fields can be masked or hidden from unauthorized users. |
Granular field masking/configuration allowed on user roles. | |
Secure Audit Log Storage Ensures immutability and backup of critical audit logs. |
Audit log storage with immutability and external backup options. | |
Incident Response Procedures Documented processes for breach detection and notification. |
Documented incident response and compliance breach process. |
Concurrent User Limit Maximum number of users supported simultaneously. |
No information available | |
Transaction Processing Latency Average time to process and analyze a single transaction. |
No information available | |
Uptime/Availability SLA Guaranteed system availability often expressed as a percentage. |
No information available | |
Data Ingestion Rate Speed at which system can ingest new compliance data. |
No information available | |
Horizontal Scaling Support System supports scaling across servers/nodes to accommodate growth. |
Cloud scaling for high transaction/client growth supported. | |
Performance Monitoring Tools Built-in dashboards and alerts on system performance metrics. |
Performance dashboards and monitoring tools are available in admin suite. | |
Cloud Deployment Option System can be deployed as a cloud (SaaS) or hybrid solution. |
Primary offering is SaaS cloud deployment; hybrid available. | |
On-Premise Deployment Option Supports local/internal hosting for sensitive or regulated data. |
No information available | |
Disaster Recovery RTO Recovery Time Objective in case of system outage. |
No information available | |
Database Size Limit Maximum database size supported without performance loss. |
No information available |
24/7 Support Availability Round-the-clock access to technical and compliance support. |
24/7 technical support described as standard for all major customers. | |
Dedicated Account Manager Single point of contact for service and issue escalation. |
Each client has a designated account manager according to vendor documentation. | |
Self-Service Knowledge Base Extensive library of documentation, FAQs, and training material. |
Online documentation and knowledge base announced on the vendor's website. | |
Regular System Updates Frequency of non-disruptive security, functionality and rule updates. |
No information available | |
Custom SLA Options Ability to define support levels and response times contractually. |
SLAs are configurable for enterprise clients. | |
Uptime Guarantee Contractual uptime guarantee for system operation. |
No information available | |
Automated Backup Scheduling Scheduled, automated backups of all system and client data. |
Automated backup processes for both compliance data and platform configuration. | |
Patch Management Tools Automation of system security patching and compliance rule changes. |
No information available | |
User Feedback Loop Mechanisms for users to submit feedback and feature requests. |
User feedback/feature request capability is present. | |
Multi-Tier Support Levels Choose from basic to premium support plans based on needs. |
Support offerings range from standard to premium levels per client need. |
Transparent Pricing Model Clearly published and predictable licensing or usage costs. |
Pricing is transparent and available on request or from the sales team. | |
Pay-As-You-Go Option Usage-based billing for modular feature access. |
Pay-as-you-go and volume-based billing options are available. | |
Volume Discounts Available Lower per-unit pricing as transaction or client count increases. |
Volume or enterprise discounts available, especially for high-transaction clients. | |
Free Trial/POC Period for free evaluation or proof of concept. |
Free trial for commercial proof-of-concept is available. | |
Feature-Based Licensing Modular pricing per individual function/module. |
Feature-based and modular licensing are available per product module. | |
Perpetual License Option Option to purchase software outright rather than as a subscription. |
No information available | |
Annual Billing Option Discounted pricing for annual upfront payment. |
Annual billing with discounted pricing for upfront payment confirmed. | |
Multi-Entity Licensing Special terms for multi-subsidiary or group licensing. |
Multi-entity/group licensing available for corporate and exchange customers. | |
Seat/User License Cap Maximum number of named users included without additional charges. |
No information available | |
Additional Data Storage Pricing Published price per additional unit of data storage. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.