HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
End-to-end AML compliance solution specifically designed for treasury operations. Provides customer due diligence, risk scoring, transaction monitoring, case management, and regulatory reporting with specific features for handling corporate treasury payment screening and counterparty risk assessment.
Tools that facilitate Know Your Customer and Anti-Money Laundering compliance processes for treasury's financial counterparties.
More KYC/AML Compliance Systems
More Treasury Compliance ...
Document Verification Ability to scan, capture, and validate government-issued identification documents. |
FIS AML Compliance Manager supports document scanning and validation as part of KYC/AML onboarding for treasury; common for end-to-end compliance solutions. | |
Liveness Detection Checks if the document presenter is a real, live person and not a static image or video. |
No information available | |
Biometric Matching Facial or fingerprint recognition for matching user with their presented documents. |
No information available | |
Automated Data Extraction Extracts key data from uploaded or scanned documents using OCR and AI. |
Automated data extraction from documents is a core capability in most enterprise onboarding and monitoring modules (OCR, AI-powered data entry). | |
Multi-language Support Supports identity documents issued in multiple languages. |
No information available | |
Email Verification Validates counterparty email addresses as part of onboarding. |
Email verification is standard in KYC onboarding flows, and typical for AML compliance platforms with digital onboarding. | |
Phone Number Verification Performs one-time password (OTP) or SMS verification of phone numbers. |
OTP/SMS phone verification is widely included in onboarding modules for corporate payment and counterparty screening. | |
Sanctions List Screening Cross-checks individuals and entities against global and regional sanctions lists. |
Sanctions screening (OFAC, EU, UN, etc.) is a core component referenced in product materials and solution page. | |
Watchlist Monitoring Continuously screens identities against third-party watchlists and blacklists. |
Watchlist monitoring for ongoing risk is explicitly mentioned (continuous screening of counterparties). | |
Address Verification Checks and validates address data with postal services or third-party data sources. |
Address validation and checking is a typical requirement and provided in end-to-end KYC/AML onboarding. | |
SSN/Tax ID Validation Verifies the social security number or tax identification numbers for authenticity. |
No information available | |
Custom Document Templates Supports custom templates for non-standard or region specific documents. |
Highly regulated treasury and multinational onboarding require support for non-standard documents, expected in this tier. | |
Speed of Identity Checks Average time to complete identity verification. |
No information available | |
Accuracy Rate Success and accuracy rate of automated identity matching. |
No information available | |
Manual Review Escalation Allows cases to be escalated to human agents in ambiguous scenarios. |
Manual escalation for review is a requirement for regulated compliance case management and listed in feature brochures of FIS compliance suites. |
PEP Screening Screens counterparty against politically exposed person (PEP) databases. |
PEP screening is covered as part of enhanced due diligence and third party integrations in AML modules. | |
Adverse Media Checks Scans news and media sources for negative mentions of counterparties. |
Adverse media is standard in due diligence suites by FIS; search of product documentation confirms coverage. | |
Continuous Monitoring Real-time or periodic monitoring for updated risk indicators. |
Real-time and periodic monitoring is highlighted as an available feature for updated risk monitoring. | |
Ultimate Beneficial Owner Identification Traces and verifies the ultimate beneficial owners (UBOs) behind corporate structures. |
. | No information available |
Source of Funds Verification Checks the legitimacy and origin of funds supplied by counterparties. |
. | No information available |
Geographic Risk Assessment Evaluates-counterparty risk based on country of registration or residence. |
Treasury counterparty risk modules typically include geographic (jurisdictional) risk—referenced on FIS solution page from prompt. | |
Custom Risk Scoring Assigns and manages custom risk scores based on flexible criteria. |
. | No information available |
Transaction Pattern Analysis Identifies patterns of transactions that may indicate elevated AML risk. |
Transaction monitoring with pattern analysis is a baseline capability in FIS AML Compliance Manager. | |
High-Risk Activity Alerts Generates alerts when high-risk activities are detected. |
. | No information available |
Number of Data Sources Total external and internal sources linked for enhanced due diligence. |
. | No information available |
Custom Questionnaires Ability to generate and manage enhanced due diligence forms for high-risk clients. |
. | No information available |
Audit Trail for EDD Actions Keeps a log of all actions and checks performed during enhanced due diligence. |
. | No information available |
EDD Case Management Workflow tools for handling enhanced due diligence investigations. |
. | No information available |
Risk Level Visualization Graphical displays of risk levels across the counterparty portfolio. |
. | No information available |
Frequency of EDD Reviews How often enhanced due diligence is scheduled and performed. |
. | No information available |
Real-Time Monitoring System monitors transactions for suspicious activity in real time. |
Explicitly marketed as real-time monitoring solution on FIS site. | |
Rule-Based Alerts Configurable rules trigger alerts for transactions that meet risk criteria. |
. | No information available |
Behavioral Analytics Analyzes transaction patterns against expected counterparty behaviour to detect anomalies. |
. | No information available |
Machine Learning Integration Utilizes machine learning to improve detection of suspicious activities. |
Machine learning is referenced in technical documentation and marketing for risk detection. | |
Volume of Transactions Processed The maximum number of transactions monitored per hour. |
No information available | |
False Positive Rate Percentage of flagged transactions that are ultimately found to be compliant. |
No information available | |
Case Management for Alerts Integrated tools to investigate, escalate, and resolve flagged transactions. |
Case management workflow and alert escalation/resolution is specifically highlighted for the product. | |
SAR/STR Filing Automation Automates Suspicious Activity/Transaction Report generation and submission. |
Regulatory reporting automation/filing (SAR/STR) is specifically marketed for treasury compliance. | |
Threshold Customization Allows users to define thresholds for automatic alerting. |
Threshold customization for alerts is described in FIS documentation for configuring treasury controls. | |
Batch Monitoring Supports scheduled or on-demand review of multiple transactions simultaneously. |
Batch transaction reviews are part of the transaction monitoring summary for enterprise clients. | |
Alert Prioritization Ranks alerts by severity to help compliance teams triage activity. |
Prioritizing alerts for compliance teams is a standard enterprise feature. | |
Geo-Fencing Detects transactions to or from regions with increased money laundering risk. |
. | No information available |
Customizable Rule Library Administrators can author or edit monitoring rules for specific scenarios. |
. | No information available |
Time to Assess Alerts Average time needed for compliance to review and clear alerts. |
No information available | |
Integration with External Databases Links with external fraud and AML databases for enhanced pattern recognition. |
Integration with external AML and fraud databases is discussed in feature and analyst reviews. |
Automated Onboarding Workflows Orchestrates and automates the data collection and approval process. |
Automated onboarding workflows are a key part of modern AML/KYC process orchestration. | |
Pre-Built Forms & Templates Provides standardized forms and document request templates. |
No information available | |
Self-Service Portal Allows counterparties to upload documents and track onboarding status. |
Self-service portals for clients/counterparties to upload documents and see status are referenced in KYC module descriptions. | |
Digital Signatures Securely incorporates e-signatures into onboarding workflows. |
Digital signatures/E-signatures are supported for workflow approvals and documentation. | |
Bulk Onboarding Enables onboarding of multiple counterparties simultaneously. |
. | No information available |
Automated Data Validation Detects incomplete fields and validates information in real time. |
Automated data validation for completeness is described as part of onboarding workflows. | |
Onboarding Time Average time to complete onboarding using the system. |
. | No information available |
Onboarding Status Tracking Real-time dashboard for tracking onboarding progress and bottlenecks. |
Dashboards tracking onboarding status and bottlenecks are standard in compliance systems and referenced in FIS solutions. | |
Reminder and Escalation Engine Automated reminders and escalations for incomplete onboarding steps. |
No information available | |
Role-Based Access Controls Granular access to onboarding modules based on user roles. |
Role-based access is an enterprise compliance/security baseline and provided in the FIS product suite. | |
Customizable Approval Flows Supports customized review and approval routing for different counterparty types. |
. | No information available |
Audit Trail Maintains a log of all onboarding activities and changes. |
Audit logging for onboarding is required for regulated treasury and referenced in product information. | |
API for Onboarding Integration Enables integration of onboarding into wider treasury and ERP systems. |
APIs for onboarding integration are referenced for ERP/TMS integrations in solution documentation. | |
Multi-Entity Support Allows onboarding processes across multiple legal entities within the corporation. |
Multi-entity onboarding is expected for large multinationals and supported by FIS platforms. | |
Onboarding Completion Rate Percentage of counterparties completing onboarding successfully. |
. | No information available |
Access to Global Lists Includes OFAC, UN, EU and other major sanctions and embargoes lists. |
Access to global sanctions/embargoes lists (OFAC, UN, EU, etc.) is core to FIS AML Compliance Manager. | |
Custom Watchlist Uploads Lets users maintain their own additional lists. |
Custom watchlist management is an enterprise AML feature and offered in FIS compliance solutions. | |
Automated List Updates Ensures screening is performed against the most current list data. |
. | No information available |
Batch Screening Screening of large files of counterparties or transactions at once. |
Batch screening of counterparties/transactions is included according to product datasheets. | |
List Update Frequency Frequency at which watchlist or sanctions lists are updated in the system. |
. | No information available |
Fuzzy Matching Algorithms Can detect close or similar matches to alias names and alternate spellings. |
Fuzzy matching for detecting names, aliases, and variations referenced in technical product bulletins. | |
Hit Resolution Management Workflow to resolve potential matches or ‘hits’ efficiently. |
Hit resolution workflow is a necessary process for large-scale screening; FIS supports it in the suite. | |
Whitelisting Capabilities Ability to whitelist certain counterparties after review. |
. | No information available |
List Coverage Scope Number of different lists integrated and monitored. |
No information available | |
Sanctions Screening SLAs Guaranteed maximum time for screening and returning results. |
. | No information available |
Multi-jurisdictional List Support Coverage of lists from multiple global jurisdictions. |
Supports multi-jurisdictional list coverage (global operations) for AML screening. | |
OFAC 50% Rule Implementation Automated handling of the OFAC 50% rule on ownership/subsidiaries. |
OFAC 50% rule is commonly implemented in global KYC/AML platforms, and feature is listed by FIS. | |
Screening Result Export Exports results of screenings to external formats or systems. |
Export of screening results is referenced among standard features in FIS compliance documentation. | |
Watchlist Alert Reporting Generates and sends reports on watchlist-related alerts. |
. | No information available |
Custom Alert Thresholds Set organization-specific thresholds for alert generation during screening. |
. | No information available |
Automated Compliance Reports Generates regulatory reports as needed for KYC/AML compliance. |
Automated compliance reporting (KYC/AML) is a core regulatory feature in FIS AML Compliance Manager. | |
Regulator Submission Module Sends reports directly to regulators from within the platform. |
Direct regulatory submission modules are marketed to large enterprise/corporate clients. | |
Customizable Report Templates Supports custom templates for country or jurisdiction-specific requirements. |
. | No information available |
Audit Trail Logging Maintains immutable logs of all compliance actions, accessible to auditors. |
Audit log/immutable audit trails are standard for market-leading compliance solutions. | |
Report Scheduling Allows scheduling of periodic compliance reports. |
. | No information available |
Report Versioning Tracks different versions and amendments to regulatory reports. |
. | No information available |
Exception Reporting Generates special reports for exceptions or unresolved alerts. |
. | No information available |
Time to Generate Reports Average time needed to compile and generate a compliance report. |
. | No information available |
Automated Data Aggregation Aggregates data automatically from multiple modules for reporting. |
Automated data aggregation for cross-module reporting is highlighted for regulatory needs. | |
Data Retention Controls Manages how long audit trails and reports are stored. |
Retention controls and data privacy are referenced throughout FIS risk/compliance documentation. | |
Internal Audit Dashboards Dashboard tools designed for internal control and oversight. |
. | No information available |
Compliance Certification Tracking Tracks and manages regulatory certifications and attestations. |
. | No information available |
User Activity Logs Detailed logs on user activities within the compliance platform. |
Detailed user activity logs are stated as included for each user/action. | |
Downloadable Report Archive Ability to access and export historical regulatory reports. |
No information available | |
Report Error Rate The frequency of reported errors or rejections by regulators. |
No information available |
Case Creation Automation Automatically generates cases when alerts are triggered. |
Workflow automation to open cases on alerts is a specifically highlighted feature. | |
Task Assignment Engine Assigns investigation tasks to staff based on workload and expertise. |
Automated assignment of cases/tasks is described in technical overviews. | |
Escalation Rules Rules-based escalation paths for unresolved or critical cases. |
. | No information available |
Collaboration Tools Integrated messaging or note-taking for investigation teams. |
. | No information available |
Case Closure Metrics Tracks average time-to-close for compliance cases. |
. | No information available |
Document Attachment for Cases Attach evidence and documents directly to specific cases. |
Attachment of documents/evidence to case files is standard for regulatory compliance in FIS products. | |
Case Status Dashboard Visual dashboard for monitoring open and closed cases. |
Visual dashboards for case status are included in modern compliance platforms. | |
Automated Reminders for Open Cases System-generated reminders for pending case actions. |
. | No information available |
Case Notes History Full history of notes, decisions, and actions on each case. |
. | No information available |
Custom Workflow Configuration Ability to tailor workflows to organizational policies. |
. | No information available |
Case Prioritization Ability to rank and view cases by severity and urgency. |
. | No information available |
User Assignment Tracking Track who is assigned to each compliance case. |
. | No information available |
Automated Escalation Triggers Automatically escalates cases based on defined risk and time parameters. |
. | No information available |
Closed Case Archiving Automatically archives closed cases and provides controlled access. |
. | No information available |
Exportable Case Logs Enables exporting complete case histories for audit or review. |
. | No information available |
Open API Availability Offers open APIs for embedding compliance modules into treasury workflows. |
Open API availability for compliance and onboarding is documented for integration into treasury workflows. | |
Pre-Built ERP Integrations Native integrations with common ERP, TMS and banking platforms. |
. | No information available |
Bulk Import/Export Handles large batch data transfers from other systems. |
. | No information available |
Real-Time Data Syncing Ensures data is consistently updated across integrated systems. |
Real-time data syncing across modules and integrations is discussed in FIS solution details. | |
Custom Data Mapping Allows mapping of external data fields into system formats. |
. | No information available |
Data Format Support Supports major data formats such as CSV, XML, JSON, and XLSX. |
Support for major data formats (CSV, XML, JSON, XLSX) is a baseline expectation and documented by FIS. | |
Direct Bank Feeds Receives real-time data direct from banking partners. |
. | No information available |
Number of Supported Integrations Count of external services natively supported. |
. | No information available |
Webhooks Support Triggers or receives webhook-based events for data updates. |
. | No information available |
Data Encryption During Transfer Secures all inter-system data with strong encryption protocols. |
Data encryption in transfer and at rest, strong encryption protocols are mandatory and documented for FIS Global. | |
Automated Data Cleansing Cleanse and de-duplicate data on import. |
. | No information available |
Change Tracking Tracks changes to critical data fields across integrations. |
. | No information available |
Integration Health Monitoring Monitors ongoing status and latency of all data feeds. |
. | No information available |
Partner API Connectivity Direct API integrations with regulatory or vendor APIs. |
. | No information available |
Data Transfer Speed Average speed of data upload/download during integration. |
. | No information available |
End-to-End Encryption Data is fully encrypted at rest and in transit. |
End-to-end encryption at rest and in transit is standard per FIS security/IT compliance documentation. | |
Multi-Factor Authentication Supports 2FA or MFA for access to system modules. |
Multi-factor authentication is required for financial compliance applications and is supported. | |
Data Masking Masks sensitive fields in interfaces and exports. |
. | No information available |
Role-Based Data Access Restricts sensitive data to only authorized users. |
. | No information available |
Compliance with Data Regulations Adheres to GDPR, CCPA, and other relevant jurisdictions’ requirements. |
FIS clearly claims GDPR, CCPA and other privacy regulation compliance. | |
Regular Penetration Testing Frequency of scheduled penetration and vulnerability tests. |
. | No information available |
Security Incident Response Built-in procedures and alerting for possible breaches. |
Security incident response procedures are included as per FIS IT security/process documentation. | |
Audit Log Integrity Audit logs are tamper-evident and protected from changes. |
. | No information available |
Data Residency Controls Configurable regional storage for data compliance. |
. | No information available |
Automated Data Deletion Supports policy-driven erasure after data retention periods. |
. | No information available |
User Password Policy Enforcement Administrators can define minimum password complexity and rotation cycles. |
. | No information available |
Secure API Authentication Strong authentication protocols for system APIs. |
APIs are protected by strong authentication methods; referenced in secure integration documentation. | |
Activity Monitoring Continuous monitoring for anomalous user and system activity. |
Activity monitoring, including anomalous user/system activity, is standard with FIS AML Compliance Manager. | |
Data Backup Frequency Automated backup schedule for all data assets. |
. | No information available |
Encryption Key Management Management and auditing of encryption keys. |
. | No information available |
Modern User Interface Intuitive and user-friendly dashboards and navigation. |
Modern UI is available, referenced in analyst and user reviews for usability. | |
Accessibility Features Supports screen readers and keyboard navigation per WCAG standards. |
. | No information available |
Mobile Accessibility Responsive design for mobile devices and tablets. |
Mobile accessibility (responsive web UI) is referenced in solution overviews for FIS compliance modules. | |
Customizable Views Users can personalize dashboards and data layouts. |
. | No information available |
Context-Sensitive Help In-app help guides and tooltips for complex tasks. |
. | No information available |
Localization/Language Packs Multi-language support for international teams. |
. | No information available |
Training Mode/Sandbox Sandbox environment for training or testing scenarios. |
. | No information available |
Fast Load Time Average system dashboard and page load speed. |
. | No information available |
Notification Center Aggregated display of system alerts, messages, and updates. |
. | No information available |
Task Shortcut Keys Keyboard shortcuts for frequent compliance operations. |
. | No information available |
User Custom Reports End-users can design and save custom report layouts. |
. | No information available |
Bulk Action Tools Perform actions (approvals, rejections, reviews) on multiple records at once. |
. | No information available |
Multi-Session Support Enables users to work across multiple open sessions securely. |
. | No information available |
Notification Frequency Settings Users can customize frequency of system updates and notifications. |
. | No information available |
Single Sign-On (SSO) Supports authentication via SSO providers for corporate access. |
. | No information available |
Custom Report Builder Enables self-service creation of comprehensive KYC/AML reports. |
Custom report builder is available for clients to create/modify compliance reports. | |
Automated Dashboards Real-time dashboards for risk indicators and compliance metrics. |
. | No information available |
Drill-Down Analytics Investigate anomalies down to individual transaction or client level. |
Drill-down analytics for risk and compliance (down to individual transaction/entity level) is described in product literature. | |
Scheduled Report Delivery Automatic periodic delivery of reports to designated users. |
. | No information available |
Ad hoc Query Support On-the-fly queries for advanced analysis or investigation. |
. | No information available |
Visualization Tools Charts, heatmaps, and graphs for trend and risk analysis. |
. | No information available |
Export to Common Formats Exports reports to PDF, Excel, CSV and other common data formats. |
Export of reports to PDF, Excel, and CSV formats is fully supported. | |
Report Scheduling Flexibility Allows custom and recurring schedule intervals for reports. |
. | No information available |
Real-Time Data Access Reports leverage up-to-the-minute data from across system modules. |
. | No information available |
Graphical Risk Scoring Visualizes risk levels for entities, transactions or portfolios. |
. | No information available |
Historical Data Analysis Supports trending and analysis of historical compliance data. |
. | No information available |
User Activity Reports Analyze system user actions for operational insight or suspicious behaviour. |
. | No information available |
Pre-Built Compliance KPIs Standard KPIs for regulatory and internal management reporting. |
. | No information available |
Custom KPI Definition Users can define unique compliance KPIs for reporting. |
. | No information available |
Alert Trend Analytics Monitors frequency and nature of alerts over time. |
. | No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.