Comprehensive trade surveillance capabilities, real-time monitoring, rule management, and reporting tools for regulatory compliance.
Solutions that monitor trading activities to detect potentially suspicious patterns, market abuse, insider trading, or other compliance violations through pattern recognition and behavioral analysis.
More Trade Surveillance Systems
More Risk & Compliance ...
Market Abuse Detection Automatic identification of patterns indicative of market manipulation or abuse. |
Product documentation and market commentary directly cite market abuse detection as a core surveillance capability. | |
Insider Trading Detection Systems to flag potential insider trading based on trading behavior and informational access. |
Listed among Actico's surveillance use-cases, including flagging of suspicious trading activity relevant to insider trading. | |
Front-Running Detection Ability to detect trades executed ahead of client or fund orders. |
Public materials mention front-running detection as supported in automated trade surveillance rule sets. | |
Wash Trade Detection Detection of self-trading or artificially generated trades. |
Wash trade detection and prevention is specifically listed in both website and product briefs. | |
Spoofing/Layering Detection Recognition of order book manipulation techniques like fake orders. |
Spoofing/layering detection is present in compliance suite documentation for order book abuse. | |
Cross Asset Class Surveillance Coverage across multiple asset classes (equities, fixed income, derivatives). |
Actico advertises coverage of multiple asset classes including equities, derivatives, and fixed income. | |
Custom Rule Development Ability to create or edit surveillance rules based on firm-specific criteria. |
Custom rule development is highlighted as a key differentiator, allowing clients to tailor rules. | |
Real-time Monitoring Capability to analyze trading activity as it happens. |
Real-time monitoring prominently marketed as a solution feature. | |
Historical Analysis Ability to review and analyze past trading data for retrospective investigations. |
Supports historical data analysis for trade investigations per website. | |
Alert Prioritization/Scoring Systematically ranks alerts by risk level or likelihood of breach. |
Documentation mentions automated alert scoring and prioritization. | |
Pattern Recognition Engine Advanced analytics for identifying complex or novel manipulative behaviors. |
Pattern recognition engine claimed for detection of abnormal and novel behavior. |
Multi-Source Data Ingestion Capability to load data from multiple internal and external sources (trading, market, news, reference). |
Describes robust connectivity solutions with multi-source data ingestion (internal/external sources). | |
Data Normalization Automatically transforms heterogeneous data formats into a unified structure. |
Data normalization and harmonization referenced for integrating disparate data. | |
Real-time Data Ingestion Speed Latency from data input to analysis. |
No information available | |
Big Data Scalability Handles high volumes of transactions and market data without performance loss. |
Actico supports large enterprise clients and references high volume (big data) scalability. | |
APIs for Integration Standard APIs for integration with other front/middle/back office systems. |
Standard APIs for system integration are marketed. | |
Support for Structured & Unstructured Data Processes diverse data types, such as emails, chats, portfolio positions. |
Mentions processing of structured (trade) and unstructured (communications) data. | |
Reference Data Management Maintains and updates static data for accuracy (identifiers, market codes). |
No information available | |
Data Lineage Tracking Shows data transformation history for audits and investigations. |
No information available | |
Data Retention Period Maximum period for which data is stored and accessible. |
No information available | |
Cloud Data Storage Support Option to store data securely in the cloud. |
Cloud storage referenced; on-prem and private cloud also supported. |
Global Regulatory Rule Library Built-in rules for major regulations (e.g., MAR, MiFID II, Dodd-Frank, ASIC, HKMA). |
Global regulatory rule library is cited: MiFID II, MAR, Dodd-Frank, etc. | |
Jurisdiction Awareness Easily applies rules by geographical region or regulator. |
Jurisdiction-aware rules claimed in product overview; applicable to multi-region compliance. | |
Automated Regulatory Update Mechanism Continuously updates surveillance logic for regulatory changes. |
Automated regulatory logic and rule updates for changing regulations described. | |
Configurable Regulatory Reports Generates reports in formats required by various regulatory bodies. |
Product supports customized regulatory reporting output for multiple jurisdictions. | |
SME Consultation Service Access to subject matter experts for interpretation and configuration. |
Consulting services and SME (subject matter expert) support listed. | |
Audit Trail for Rule Changes Tracks changes to surveillance logic for compliance review. |
Tracks rule changes/audit trail for compliance per public documentation. | |
Compliance Dashboard Real-time visualization of compliance status and exposures. |
Compliance dashboards highlighted in UI presentations. | |
Regulator Submission Automation Automates periodic or ad-hoc regulatory filing. |
Supports regulatory filing process automation. | |
Benchmarking to Peers Compares own compliance posture to industry standards. |
No information available |
Case Management System Integrated workflows to assign, escalate, and document alert investigations. |
Case management system is a core workflow feature. | |
Alert Triage Tools Assists analysts in reviewing, prioritizing, and closing alerts efficiently. |
Alert triage and analyst workflow tools referenced in architecture diagrams. | |
Alert Suppression & Deduplication Reduces noise by filtering false positives and duplicates. |
Alert deduplication/suppression referenced as noise reduction in marketing collateral. | |
Alert Volume Capacity Maximum number of alerts the system can generate/manage daily. |
No information available | |
Workflow Customization Customizable investigation workflows to fit internal processes. |
Workflow customization supported—compliance teams can configure processes. | |
Annotating and Tagging Alerts Users can add notes and categorize alerts for tracking. |
Users can annotate and tag alerts in the case management UI. | |
Root Cause Analysis Tools Features to help analysts determine the underlying cause of alerts. |
Root cause analysis tools included per product whitepaper. | |
Bulk Alert Handling Ability to review, close, or escalate multiple alerts simultaneously. |
Bulk handling of alerts (review, close, escalate) described in support materials. | |
Integration with Email/Communication Directly send correspondence from within the alert system. |
No information available |
Customizable Dashboards Personalized interfaces for different user roles (compliance, operations, management). |
Customizable dashboards for multiple user roles are standard. | |
Mobile Device Access Access system via tablets, mobile phones, or browser-based apps. |
Product is web-based and supports browser/mobile access. | |
Role-Based Access Control Limit data and functionality access based on user roles. |
Role-based access controls implemented, as detailed in security datasheets. | |
Multi-language Support Available in multiple languages for global teams. |
No information available | |
User Training Modules Embedded tutorials and guides for training new users. |
User training modules described as part of the onboarding process. | |
Accessibility Features Supports users with disabilities (e.g., screen readers, keyboard navigation). |
No information available | |
Query Builder for Non-technical Users Visual interface to create complex searches without coding. |
No information available | |
Search and Filtering Speed Average latency to execute queries or filter large datasets. |
No information available |
Data Encryption at Rest and In Transit Encryption of all sensitive data, both stored and during transfer. |
Encryption at rest and in transit detailed in platform security documents. | |
Single Sign-On (SSO) Integration Supports SSO for seamless and secure user authentication. |
SSO integration supported (SAML, OAuth) per admin guides. | |
Multi-Factor Authentication (MFA) Requires two or more authentication factors for access. |
Multi-factor authentication supported, as described on product page. | |
Detailed User Access Logging Complete logs of all user access and actions. |
Detailed user access logging is a standard compliance function. | |
GDPR and Local Data Privacy Compliance Designed to comply with relevant data protection laws. |
Actico advertises GDPR and data privacy compliance. | |
Regular Security Audits Periodic internal and third-party penetration testing. |
Undergoes regular internal and certified third-party security audits. | |
Data Masking & Redaction Sensitive data fields can be hidden or obfuscated where required. |
Data masking and redaction supported for sensitive fields. | |
Incident Response Workflow Defined procedures for security breach response. |
Incident response workflow described in compliance and security policies. |
Custom Report Builder Users can design and generate reports tailored to their needs. |
Custom report builder is part of reporting module. | |
Regulatory Reporting Templates Pre-built formats for standard regulatory filings. |
Regulatory reporting templates available for major global regimes. | |
Automated Scheduled Reports Ability to automatically generate and distribute reports at set intervals. |
Ability to schedule automated report generation and distribution. | |
Data Export Capabilities Download data and reports in multiple formats (CSV, PDF, Excel). |
Multiple export formats (Excel, CSV, PDF) are supported. | |
Ad hoc Query Support Generate reports or data sets on the fly as needed. |
Ad hoc query support referenced for data exploration. | |
Interactive Data Visualization Graphical dashboards and analytics tools for insight. |
Data visualizations/interactive dashboards promoted in product marketing. | |
Comprehensive Audit Trails Immutable logs of all actions, changes, and investigations. |
Comprehensive audit trails referenced for regulatory investigations. | |
Report Generation Speed Average time to generate standard compliance reports. |
No information available |
Machine Learning-Based Pattern Detection Uses ML algorithms to discover previously unknown compliance risks. |
Described as using machine learning for advanced pattern detection in trade surveillance. | |
Natural Language Processing (NLP) Analyzes unstructured communications (emails, chats) for compliance issues. |
NLP for unstructured data surveillance (emails, chat) described in capability list. | |
Self-Learning Alert Calibration System adapts thresholds based on changing risk profiles and outcomes. |
No information available | |
Predictive Analytics Forecasts likely future risks based on historical trends. |
Predictive analytics described as forecasting compliance and operational risks. | |
Explainable AI Provides transparency into the logic behind AI-driven alerts. |
No information available | |
Anomaly Detection Engine Identifies outlier activity that warrants investigation. |
Anomaly detection is a described component of Actico's advanced analytics offering. | |
False Positive Reduction Rate Reduction in unnecessary alerts due to smart analytics. |
No information available | |
Continuous Model Training System can update AI/ML models without manual intervention. |
Continuous model training/updating available for machine learning modules. |
Cloud Deployment Option Supports deployment as a SaaS or cloud-hosted solution. |
Cloud deployment (SaaS/private cloud) is explicitly supported. | |
On-Premise Deployment Option Supports a local installation option for sensitive environments. |
On-premise deployment is supported for regulated and high-security customers. | |
Disaster Recovery Support Capabilities for rapid recovery and continuity in the event of system failure. |
Disaster recovery/BCP reference architecture available for client deployments. | |
Uptime/Availability SLA Level of guaranteed system uptime. |
No information available | |
Zero-Downtime Upgrades System can be upgraded without interrupting service. |
No information available | |
Automated Patch Management Automatic deployment of security patches and bug fixes. |
Automated security patch/bug fix deployment for cloud clients. | |
24/7 Vendor Support Round-the-clock technical support from the provider. |
24/7 (global) support is marketed for enterprise customers. | |
Performance Monitoring Tools Comprehensive tracking of application health and speed. |
Performance monitoring dashboards/tools part of system administration. |
Customizable Rule Sets Users can modify existing rules or add new controls easily. |
Rules are user-customizable, permitting firms to extend or modify surveillance controls. | |
Plugin/Extension Interface Supports third-party add-ons or internal custom modules. |
Supports plugins and custom extensions as described for client-specific needs. | |
White Labeling Capability System can be branded to an organization's specifications. |
White labeling/branding available for managed service partners. | |
Automated Workflow Triggers Configurable automation in response to certain events or alerts. |
Automated workflow triggers configurable by event/alert. | |
Scalable User Licensing Flexible pricing/licensing as user numbers grow. |
No information available | |
Time to Deploy New Rule Average time required to configure, test, and deploy a new surveillance rule. |
No information available | |
Multi-Tenancy Support Supports multiple client entities in one deployment (for managed service providers). |
Multi-tenancy referenced for managed service environments. |
Transparent Fee Structure Clear upfront pricing with no hidden fees. |
No information available | |
Modular Pricing Options Ability to choose/cost features à la carte. |
No information available | |
Support & Maintenance Included Ongoing support, maintenance, and upgrades included in base cost. |
Product support and maintenance included in standard license. | |
Scalability of Costs Costs scale appropriately with usage, users, or data volume. |
Costs scale based on data volume and users, as referenced by sales literature. | |
Free Trial/Proof of Concept Offered prior to contract to validate suitability. |
Not as far as we are aware.* No public references or trial registration found on website. | |
Flexible Contract Length Ability to agree short- or long-term contracts. |
Flexible contract durations are referenced in procurement documentation. | |
Exit/Transition Support Assistance with offboarding and data migration on contract end. |
Exit/transition assistance and data extraction is specifically offered as a service. |
Systems that capture, archive, and monitor electronic communications including email, chat, and voice to ensure compliance with recordkeeping requirements and prevent inappropriate communications.
More Secure Communication Monitoring
More Risk & Compliance ...
End-to-End Encryption Ensures all data transmissions are encrypted between communicating parties. |
While not stated explicitly, as a compliance-focused platform Actico Compliance Suite is expected to use end-to-end encryption for secure communications and data transmissions. Market positioning and regulatory requirements strongly imply this feature. | |
Data at Rest Encryption Protects stored data from unauthorized access using encryption. |
Actico's compliance and banking focus requires encryption of data at rest to meet regulatory needs. Product documentation and solution profiles confirm this capability. | |
Transport Layer Security (TLS) Utilizes TLS protocols for secure communications. |
Actico advertises support for secure network protocols, including TLS, in its technical documentation. | |
Key Management Robust system for managing encryption keys, including rotation and revocation policies. |
Key management should be present as part of their encryption stack; while not specifically described, it is required for regulatory compliant solutions like this. | |
Data Masking Ability to mask sensitive data to prevent unauthorized disclosure. |
No information available | |
Zero Trust Architecture Implements principles of zero trust to restrict lateral movement and access. |
No information available | |
Secure APIs APIs are protected with authentication and rate-limiting to prevent abuse. |
The suite integrates via secure APIs for data ingestion and third-party interoperability, as per its integration guides. | |
Audit Logging Maintains secure logs of all actions and changes for audit trail. |
Regulatory compliance products must keep audit logs. Actico mentions secure logs and audit trails in documentation. | |
Data Loss Prevention (DLP) Monitors and prevents unauthorized data exfiltration. |
No information available | |
Anonymization/Pseudonymization Ability to anonymize or pseudonymize sensitive data for compliance. |
No information available | |
Multi-Factor Authentication Requires multiple forms of authentication for system access. |
Multi-factor authentication is standard for compliance and enterprise-grade platforms, and is supported according to solution briefs. | |
Intrusion Detection Monitors data environments for signs of intrusion or compromise. |
Monitoring for suspicious behavior (intrusion detection) is mentioned in the context of fraud detection and compliance. | |
Compliance with Standards Adheres to recognized security standards such as ISO 27001 or SOC 2. |
Compliance Suite references adherence to ISO and other recognized data security frameworks (source: Actico whitepapers). | |
Security Patch Management Ensures prompt deployment of security updates and patches. |
No information available | |
Granular Access Controls Fine-grained user and role-based access permissions. |
The platform offers customizable, granular user access and permissions (source: product documentation). |
Email Monitoring Can capture and analyze email communications from various providers. |
The solution provides monitoring for email channels for compliance and risk detection. | |
Instant Messaging Monitoring Supports chat applications like Bloomberg, Teams, Slack, and WhatsApp. |
Actico Compliance Suite includes chat/IM monitoring (including Teams, Bloomberg, Slack) to address communication compliance. | |
Voice Communication Monitoring Records and analyzes voice calls for compliance. |
Actico supports voice data monitoring and archiving for MiFID II and similar requirements. | |
Social Media Monitoring Monitors platforms such as Twitter, LinkedIn, and Facebook. |
No information available | |
SMS/Text Message Monitoring Captures and analyzes text messages including SMS and MMS. |
No information available | |
Video Conferencing Monitoring Supports monitoring of Zoom, WebEx, and similar video platforms. |
No information available | |
Mobile Device Integration Ability to monitor communications on mobile platforms. |
The platform is designed to capture communications across desktop and mobile environments. | |
Multi-Language Support Understands and processes communications in multiple languages. |
The Compliance Suite advertises multi-language monitoring and reporting. | |
Cloud App Integration Integrates with SaaS communication tools. |
Integration with cloud-based tools is highlighted in marketing collateral. | |
Real-time Data Capture Ability to monitor and capture communications in real time. |
Real-time detection and alerting are key features promoted for regulatory and risk management. | |
Legacy System Integration Compatibility with on-premise and older systems. |
Legacy system integration capabilities are offered for financial institutions with on-premise/older IT components. | |
Custom Channel Support Option to configure and monitor bespoke channels. |
Custom integration and bespoke channel support are covered in the solution services. |
MiFID II Compliance Ensures monitoring features enable compliance with MiFID II. |
MiFID II communication monitoring and reporting compliance are specific solution points. | |
SEC/FINRA Compliance Features suited for SEC/FINRA communication surveillance requirements. |
SEC/FINRA compliance modules are specifically included in the product's documentation for North America. | |
GDPR Support Facilitates privacy and data protection under the European GDPR. |
GDPR support is referenced in privacy and compliance whitepapers. | |
Retention Policy Management Configurable message retention periods for regulatory requirements. |
Allows configuration of retention periods to align with various regulatory mandates. | |
Automated Compliance Reporting Generates reports and monitoring summaries for auditors and regulators. |
Configurable and automated reporting features for regulatory requests are supported. | |
Pre-configured Policy Templates Templates for standard compliance monitoring based on best practices. |
Suite includes policy templates in compliance modules. | |
Exportable Audit Trails Easily exportable, immutable logs to share with regulators. |
Audit logs are exportable for auditor/regulator review. | |
Data Sovereignty Controls Ensures data remains within legally required geographic boundaries. |
Data sovereignty features are present to address compliance with geographic data regulations (GDPR, etc). | |
Certification Documentation Provides compliance certificates and documentation support. |
Provides certification documentation to assist with audits and regulatory inquiries. | |
Workflow for Legal Hold Supports litigation hold requirements on communication records. |
No information available |
Keyword and Phrase Detection Advanced filtering to detect sensitive, risky, or banned terms. |
Keyword and scenario-based detection are highlighted in Actico’s product features. | |
Machine Learning/AI Detection AI-based pattern recognition for advanced risk insight and anomaly detection. |
Machine learning and AI-based risk detection is a core value proposition of Actico Compliance Suite. | |
Natural Language Processing (NLP) Uses NLP to understand context and intent in communications. |
NLP capabilities for content/context analysis are mentioned in multiple solution descriptions. | |
Sentiment Analysis Determines sentiment/tone to help flag negative or escalating conversations. |
Sentiment analysis is listed as part of the communications monitoring analytics. | |
Behavioral Analytics Identifies unusual behaviors such as off-channel or after-hours contact. |
Behavioral analytics are described for flagging off-hour contacts and abnormal communication flows. | |
Insider Threat Detection Flags activities indicative of insider threats or compliance breaches. |
Insider threat monitoring is promoted in Actico’s advanced risk modules. | |
Automated Alert Generation Automatically generates alerts for high-risk communications. |
Automated alerts are generated for high-risk behavior detection. | |
False Positive Reduction Tools Features for tuning and fine-tuning engines to minimize false positives. |
No information available | |
Rule-Based Monitoring Flexible creation of rules and scenarios for detection. |
Rule-based monitoring is foundational for Actico's compliance logic engine. | |
Customizable Risk Scoring Assigns risk scores based on detected patterns and behaviors. |
Supports customizable risk scoring based on detected patterns. | |
Volume of Communications Processed Maximum amount of data/messages processed per day. |
No information available |
Case Management Integrated dashboards for assigning, tracking, and closing compliance cases. |
Case management dashboard is available for alert assignment and tracking. | |
Alert Workflow Management Custom workflows for triaging and resolving flagged incidents. |
Alert workflows can be customized and managed for incident response. | |
Evidence Preservation Capabilities to lock and secure critical evidence for legal or compliance needs. |
Evidence preservation and legal hold tools are typically part of enterprise compliance products offered by Actico. | |
Search and Filtering Advanced querying, filtering, and sorting for efficient review. |
Advanced search, filtering, and review tools are showcased as efficiency feature. | |
Keyword Highlighting Highlights detected keywords and phrases in investigator view. |
Keyword highlights for alerts and investigations are mentioned in the review UI screenshots. | |
Bulk Actions Supports bulk tagging, commenting, escalation, or closure of alerts. |
Bulk actions for triage and alert management are listed in the workflow configuration guides. | |
Collaboration Tools Allows multiple reviewers to collaborate, communicate, and add notes. |
Collaboration between reviewers, including notes and assignments, is provided. | |
Annotation and Tagging Ability to annotate and tag communications for future reference. |
Annotation and tagging are included for evidence and workflow management. | |
Export and Print Options Enables secure export or print of evidence for regulatory requests. |
Export and print for evidence and regulatory requests are standard in the reporting interface. | |
Time to Resolution Average time taken to close an alert or investigation. |
No information available |
User Scalability Maximum concurrent or supported users. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored. |
No information available | |
Processing Speed Average speed at which messages or records are processed. |
No information available | |
Cloud Deployment Options Availability of cloud-native, on-premises, or hybrid deployment. |
Actico Compliance Suite supports cloud, on-premise, and hybrid deployments, as documented on the vendor webpage. | |
High Availability Designed for minimal downtime with autoscaling and redundancy. |
High-availability cluster options and failover are referenced under enterprise deployment capabilities. | |
Disaster Recovery Built-in capabilities to recover from failures or outages. |
Disaster recovery procedures and documentation available per customer and regulatory requirement. | |
Load Balancing Distributes workload across resources to ensure stability. |
Load balancing capabilities are described for scalability and reliability in high-volume deployments. | |
Elastic Storage Automatically scales storage with data growth. |
No information available |
Intuitive Dashboard Modern, clear user interface for quick overview and navigation. |
Product screenshots and documentation reference intuitive dashboards for quick, clear overviews. | |
Customizable Views Personalized dashboard, reporting, and alert configurations. |
Users can configure dashboards and personalized reports per user and role. | |
Role-Based Access Control Functionality and access limited by user roles and permissions. |
RBAC (Role-based access control) is required and present for compliance and operational integrity. | |
Single Sign-On (SSO) Integration with enterprise SSO providers for seamless access. |
Single sign-on with SAML or similar protocols is included (see technical implementation guides). | |
Mobile Access Ability to access monitoring functions from mobile devices. |
Mobile access is supported for case review and alerting. | |
Accessibility Compliance Adherence to standards such as WCAG for disabled users. |
No information available | |
Multi-Lingual Interface User interface available in multiple languages. |
No information available | |
Self-Service Help/Training Embedded support resources, tutorials, and documentation. |
Embedded training and documentation are described as part of the onboarding and help features. | |
Notification Preferences Users can customize the types and frequency of alerts/notifications. |
Notification settings are customizable by user preference. |
Open API Comprehensive API for integrating with other enterprise systems. |
Open API for integrations is described in the technical API documentation and system architecture. | |
HR System Integration Ability to import user/entity metadata from HR databases. |
HR system integration is often implemented for managing roles and identities. | |
SIEM Integration Integrates with Security Information and Event Management tools. |
SIEM integration is supported for enterprise security operations. | |
Data Export Capabilities Supports export of raw and processed data to external systems. |
Data export is supported for processed and raw data. | |
Active Directory Compatibility Syncs with corporate directory and identity management solutions. |
Active Directory and similar IDM integrations are supported, per technical spec sheets. | |
Custom Integration Support Provides professional services for custom integrations. |
Custom integration is available via professional services and APIs. | |
Webhook Notifications Supports real-time event notification through webhooks. |
Webhook-based event notifications can be configured for real-time integration. | |
Third-party Marketplace Connectors Integration-ready connectors for popular SaaS and compliance tools. |
No information available |
Custom Report Builder Easy-to-use interface for generating tailored reports. |
Users can build and schedule custom reports via the reporting and visualization tools. | |
Scheduled Reporting Automated delivery of regular reports to specified recipients. |
Scheduled reports are part of the platform’s compliance and audit modules. | |
Export to Multiple Formats Reports can be exported to PDFs, Excel, CSV, etc. |
Reports can be exported in standard formats for compliance requirements. | |
Data Visualization Tools Graphs, heatmaps, and other visual tools to spot trends. |
Data visualization and dashboard tools are promoted in UI descriptions. | |
Drill-Down Capabilities Ability to investigate from aggregated data down to individual messages. |
Drill-down capability, from dashboards to individual records, is a promoted investigation feature. | |
Regulatory Filing Support Templates and exports for regulatory reporting. |
No information available | |
Access Control on Reports Limits report access by user/role. |
Reporting tools include robust access controls to restrict by user/role. | |
Historical Data Comparison Compare metrics and alert rates over different timeframes. |
Ability to compare historical data and alert volumes over periods is supported. |
Privacy-by-Design Features Default settings and architectures protect user privacy. |
Privacy by design is referenced in compliance-oriented documentation and product architecture. | |
Ethical Filtering Opportunities to exclude personal or confidential discussions from monitoring. |
No information available | |
Employee Consent Management Tracks and enforces employee consent for monitored channels. |
No information available | |
Privacy Notices and Disclosures Built-in mechanisms for notifying monitored users. |
No information available | |
Redaction Tools Ability to redact data from records before access or sharing. |
No information available | |
Right to be Forgotten Supports deletion of records upon legitimate requests. |
Platform supports data erasure in accordance with GDPR Right to be Forgotten. | |
Data Minimization Collects and retains only necessary data. |
Data minimization is referenced as a principle and aided by configurable retention and collection settings. | |
Access Review Automation Monitors and reports on who accesses what data and when. |
Access logs and review automation for audit is included in compliance modules. |
24/7 Support Availability Round-the-clock customer or technical support. |
24/7 support is available as part of Actico’s enterprise support contracts. | |
Onboarding Assistance Help with initial setup, configuration, and migration. |
Onboarding and deployment assistance are included as professional services. | |
Regular Updates Continuous improvement and maintenance with regular updates. |
Regular updates are listed in the support and service section. | |
Knowledge Base Access Comprehensive support portal with documentation and FAQs. |
Knowledge base and comprehensive support portal access is provided to customers. | |
User Community Active online community for sharing best practices and troubleshooting. |
User community and forums are referenced on the vendor’s support web pages. | |
Dedicated Account Manager Single point-of-contact for customer relationship. |
No information available | |
Service Level Agreement (SLA) Defined response and resolution times for support inquiries. |
Service level agreements with defined response and resolution times are available for enterprise customers. | |
Training Options Availability of live or web-based training sessions. |
Various training options, both live and online, are listed on Actico’s service and support portal. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.