HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Suite of AML compliance solutions including transaction monitoring, customer screening, KYC/CDD, sanctions screening, and beneficial ownership identification. Leverages proprietary global data and analytics to provide risk intelligence.
More about LexisNexis Risk Solutions
Solutions for detecting, preventing, and reporting potential money laundering activities and suspicious transactions.
More Anti-Money Laundering Systems
More Compliance ...
Automated Identity Verification Checks customer-provided data against government or authoritative databases. |
LexisNexis AML suite advertises automated identity verification against authoritative databases as part of KYC/CDD. | |
Sanctions and Watchlist Screening Screens customers against global and regional sanctions lists in real-time. |
Sanctions and watchlist screening is a core offering on product page. | |
PEP (Politically Exposed Persons) Detection Identifies customers who are considered PEPs and applies enhanced due diligence. |
PEP detection is explicitly included as part of customer screening. | |
Ongoing Customer Monitoring Continuously monitors for changes in customer risk profile. |
Continuous/ongoing customer monitoring is highlighted as part of LexisNexis's risk monitoring. | |
Ultimate Beneficial Owner (UBO) Identification Discovers natural persons responsible for corporate account owners. |
Beneficial ownership (UBO) identification and screening are specifically available. | |
Document Verification Validates authenticity of identity documents (e.g., passports, IDs). |
LexisNexis provides document verification for passports, IDs, etc. as part of onboarding KYC. | |
Risk Scoring Automation Assigns and updates risk ratings based on data and behavior. |
Automated/computed risk scoring based on customer and transactional data referenced in literature and product documentation. | |
Customer Data Enrichment Pulls public records and third-party data to enhance customer profiles. |
Customer profiles are enriched using both global proprietary and public datasets. | |
Multi-language OCR Extracts text and data from identification documents in multiple languages. |
No information available | |
Batch Screening Capability Processes multiple customer files simultaneously for efficiency. |
Batch screening (mass onboarding and customer file loading) is described in sanctions screening solution. |
Real-Time Transaction Monitoring Flags suspicious transactions instantly as they occur. |
Real-time transaction monitoring is promoted for proactive detection on product webpage. | |
Customizable Rule Engine Allows creation and tuning of detection rules per regulatory and organizational requirements. |
Customizable risk rules and scenario configuration highlighted in technical overviews. | |
Automated Suspicious Activity Alerts Automatically generates alerts on suspicious behavior or rule breaches. |
Automated suspicious activity alerts are issued in event of flagged behaviour/rule breaches. | |
Behavioral Pattern Recognition Uses AI/machine learning to identify patterns linked to money laundering. |
Behavioral pattern recognition and advanced analytics (machine learning) referenced. | |
Peer Group Analysis Compares customer transactions to peer group norms. |
No information available | |
Anomaly Detection Capability Identifies deviations from typical transaction behavior. |
LexisNexis's transaction monitoring module includes anomaly detection capabilities. | |
Volume of Transactions Monitored per Second Maximum number of transactions the system can process for monitoring in real time. |
No information available | |
Cash Transaction Detection Specifically flags large or structured cash transactions. |
Cash transaction detection (structuring, large cash, etc.) is a standard alerting scenario. | |
Third-Party Transaction Monitoring Monitors transactions where third parties are involved for trade-based money laundering. |
Third-party transaction monitoring and trade-based money laundering scenarios are referenced in solution guides. | |
Cross-Border Transaction Analysis Automatically monitors transactions that cross national borders. |
Cross-border transaction analysis is described as a key scenario for LexisNexis monitoring and reporting. | |
Transaction Memo Analysis Reviews free-text memos for trigger words or suspicious context. |
No information available |
Alert Management Dashboard Centralizes and prioritizes alerts for compliance teams. |
Alert management dashboards for compliance teams are highlighted in product versions and screenshots. | |
Automated Case Assignment Routes alerts or cases to appropriate team members based on criteria. |
Automated case assignment/routing is included in investigation management module. | |
Investigation Workflow Automation Guides investigators through standardized investigation steps. |
Workflow automation for investigation and standardized steps mentioned in product documentation. | |
Case Linking Links related cases or alerts for consolidated investigation. |
Case linking via entity resolution is described as a feature in case management workflows. | |
Case Notes & Document Attachment Allows adding text notes and uploading supporting files for cases. |
Support for attachments and notes is standard for investigation case management. | |
Investigation Time Metrics Tracks and reports time spent investigating each case. |
No information available | |
Automatic Case Closure Closes cases automatically based on resolution rules. |
Automatic case closure based on workflow rules is a referenced feature. | |
Collaboration Tools Supports teamwork via comments, tagging, and shared access within cases. |
No information available | |
Audit Log for Case Actions Tracks all actions taken on a case for compliance purposes. |
Audit logs for case action and review are explicitly mentioned. | |
Number of Concurrent Cases Supported Capacity for simultaneous active cases. |
No information available |
Automated SAR/STR Filing Automatically generates and submits Suspicious Activity/Transaction Reports to authorities. |
Automated SAR/STR filing is offered in regions that support e-filing with authorities. | |
Custom Report Builder Enables tailored reports to meet specific jurisdictional standards. |
Custom report building is available (product brochures reference configurable regulatory reports). | |
Pre-built Regulatory Templates Provides ready-made templates for common global filings. |
Pre-built templates for various jurisdictions are referenced in reporting solution description. | |
Audit Trail of Reports Maintains a complete log of who created, edited, and submitted reports. |
Report audit trails (submitter, editor, status) are standard for compliance. | |
Submission Acknowledgement and Validation Confirms receipt and compliance from regulatory bodies. |
Submission acknowledgement and validation from regulators is available for e-filing regions. | |
Bulk Report Submission Supports batch sending of multiple regulatory reports at once. |
No information available | |
Automated Deadline Reminders Reminds users before regulatory submission deadlines. |
No information available | |
E-filing Integration Direct integration with regulators’ electronic portals. |
Direct e-filing integration is described as available for selected regulatory connections. | |
Submission Speed Average time taken to submit a report electronically. |
No information available | |
Multi-jurisdictional Support Handles filings to multiple regulatory authorities across countries. |
Multi-jurisdictional support is a product differentiator; highlighted by LexisNexis for global FIs. |
Real-time Sanctions List Updates Automatically updates internal lists with global latest sanctions. |
Sanctions list updates from global sources are provided in real time. | |
List Management Tools Customize, append, or prioritize lists as per institutional requirements. |
No information available | |
Fuzzy Matching Algorithms Detects potential matches despite name spelling variations. |
Fuzzy matching technology is advertised as core strength for sanctions/PEP match. | |
Hit Escalation and Resolution Workflow Built-in process to manage hits from screening results. |
Workflow for escalation and managing screening results is provided. | |
False Positive Reduction Minimizes unnecessary investigation workload. |
False positive reduction methods stated, including advanced match tuning. | |
Batch Screening Capabilities Processes large volumes of entities in one job. |
Batch screening of lists/entities highlighted in sanctions screening module. | |
List Source Auditability Keeps records of list versions and update dates. |
List versioning/audit reporting is referenced in administrative tools. | |
Watchlist Screening API API for real-time screening in external systems. |
No information available | |
Screening Throughput Maximum entities screened per minute. |
No information available | |
Automated List Synchronization Ensures all systems refer to the same up-to-date listings automatically. |
Automated synchronization for all customer and transaction screening lists is described. |
Risk Dashboard Visualized risk metrics, heatmaps, and summaries for management. |
Risk dashboard and visual analytics are provided for managers in solution screenshots. | |
Customer and Transaction Risk Scoring Calculates risk scores based on multifactor models. |
Customer and transaction risk scoring is detailed in LexisNexis documentation. | |
Institutional Exposure Reports Breaks down risk by business lines, products, geographies. |
No information available | |
Automated Model Validation Continuously tests and validates risk scoring models. |
No information available | |
Scenario/Sensitivity Analysis Assesses how risk metrics change with hypothetical rule changes. |
Scenario/sensitivity analysis modules are referenced in risk analysis documentation. | |
Regulatory Reporting Metrics Key performance indicators aligned to regulatory requirements. |
No information available | |
Historical Data Retention Maintains historical records for trend and pattern analysis. |
Historical data retention is highlighted for regulatory and investigative purposes. | |
Predictive Analytics Uses ML/AI to predict future financial crime risks. |
Predictive analytics using AI/ML are outlined in product situational risk documentation. | |
Custom Analytics Module User-defined analytics and dashboards. |
No information available | |
Number of Analytics Reports Supported Maximum parallel analytics reports generated. |
No information available |
Core Banking Platform Integration Connects with main system of record to extract customer and transaction data. |
Integration with core banking platforms is confirmed as standard. | |
Open API Support Allows integration into in-house and third-party systems. |
Open API and integration support for custom and third-party solutions is referenced. | |
Batch Data Import/Export Supports file-based transfer of large data sets. |
Batch data import/export is widely supported for onboarding and reporting. | |
Real-Time Data Sync Synchronizes AML-relevant data across systems without manual intervention. |
Real-time data synchronization between modules and external systems available. | |
Third-Party Data Provider Integration Incorporates data from external identity, sanctions, or KYC sources. |
Integration to third-party data providers (e.g. external KYC, sanctions, ID) is a key selling point. | |
Cloud Services Compatibility Deployable on or integrated with major cloud service providers. |
Software is deployable in cloud or integrates with common cloud providers. | |
Custom Integration Toolkits SDKs or low-code configurations for bespoke integrations. |
No information available | |
Number of Supported Integrations Maximum number of direct system integrations supported. |
No information available | |
Webhooks Support Ability to automatically notify external systems of events. |
No information available | |
ETL (Extract, Transform, Load) Capabilities Handles data normalization and enrichment when importing/exporting data. |
ETL capabilities are discussed in onboarding and migration documentation. |
Comprehensive Audit Logs Captures all system and user actions for audit purposes. |
Comprehensive audit logs for all actions are detailed in security and compliance sections. | |
Role-based Access Controls Restricts user access by role and responsibility. |
Role-based access controls are mentioned as key security feature. | |
Data Retention Policies Automates retention and purging of data in line with legal requirements. |
Data retention policies for compliance are configurable and documented. | |
Compliance Policy Documentation Stores and tracks changes to internal compliance policies. |
Internal policy storage and change tracking is described as available. | |
Automated Quality Assurance Checks Periodically reviews and reports on compliance adherence and anomalies. |
Automated QA checks for compliance adherence are included in operational modules. | |
Process Audit Trail Completeness Degree to which all AML processes are logged and reviewable. |
No information available | |
Regulatory Change Management Support Monitors and implements required changes following regulation updates. |
LexisNexis monitors regulatory changes, updates solutions, and provides alerts. | |
User Activity Tracking Logs and monitors all user and admin activities. |
User activity tracking is included in compliance and admin overview. | |
No. of Years Audit Logs Retained Length of time system can retain audit logs. |
No information available | |
Automated Compliance Alerts Notifies compliance team about procedural breaches. |
Automated alerts for compliance breach and anomalies are described as standard. |
End-to-End Encryption All data in transit and at rest is encrypted. |
End-to-end encryption of data in transit and at rest is claimed in security materials. | |
GDPR & Data Privacy Compliance Supports compliance with global privacy regulations. |
Data privacy compliance (GDPR, etc.) is called out as core requirement. | |
Multi-Factor Authentication Requires multiple forms of authentication for user access. |
Multi-factor authentication is offered on the platform to meet compliance best practices. | |
Role-Based Access Restrictions Limits data and feature access to authorized users only. |
Role-based restrictions enforced as per user type/clearance. | |
Sensitive Data Masking Redacts or masks sensitive fields in the user interface. |
Sensitive data masking is mentioned as available in UI documentation. | |
Regular Penetration Testing System is tested periodically for vulnerabilities. |
Regular penetration testing is referenced in LexisNexis security overview. | |
Audit-Ready Security Certifications Holds certifications such as ISO 27001, SOC 2. |
Audit-ready security certifications (SOC2, ISO27001) advertised on vendor site. | |
Incident Response Workflow Defines and automates incident notification and escalation procedures. |
Incident response plans and workflows are documented for compliance. | |
Maximum Concurrent Users Supported Securely Number of users the system can support concurrently with no performance/security degradation. |
No information available | |
Data Breach Notification Automation Automatic alerts to compliance and security teams in case of breach. |
LexisNexis advertises automated data breach notifications to client admins/security. |
Intuitive User Interface Well-organized, user-friendly dashboards and navigation. |
Product is described as having an intuitive user interface and user-friendly workflows. | |
Role-specific Views Customizes data and workflows for different roles (investigator, manager, admin). |
Role-specific dashboards/views are available for investigators, analysts, admins. | |
Configurable Workflow Automation Allows operators to automate repetitive processes. |
Configurable workflow automation for repetitive compliance operations is available. | |
Multilingual Support System available in multiple user languages. |
The suite is offered globally and lists multilingual user support. | |
Custom Alerts and Notifications Users can set personalized notification rules. |
Customizable notification/alerting rules are described in admin and workflow settings. | |
Mobile Device Accessibility Accessible from tablets and smartphones. |
Mobile accessibility (tablets, web) described in product details. | |
User Training and Tutorials Offers onboarding and contextual help to new users. |
Onboarding and contextual training materials are included for new users and modules. | |
Number of Customizable Fields Number of fields users can customize per workflow. |
No information available | |
Bulk Operations Support Ability to perform actions (e.g. closing alerts) on many cases/records at once. |
Bulk operations (batch alert handling, case dispositioning) are possible according to product literature. | |
System Uptime Guarantee Guaranteed service availability percentage. |
No information available |
Systems for screening clients against watchlists, monitoring transactions for suspicious activity, and maintaining regulatory compliance documentation.
More AML/KYC Compliance Software
More Compliance ...
Identity Document Verification Ability to verify government-issued identity documents (passports, national IDs, etc.) electronically. |
LexisNexis AML suite includes electronic verification of government-issued IDs, widely referenced in KYC onboarding documentation. | |
Facial Recognition/Matching Matches client-provided photos with ID documents using facial recognition technology. |
LexisNexis promotes biometric and facial recognition tech for identity match as part of its onboarding tools. | |
Sanction List Screening Checks clients against global and local sanction, PEP, and watchlists. |
Global sanction and watchlist screening is a key part of LexisNexis AML solution per official materials. | |
Adverse Media Screening Searches for negative news related to clients using media and public data sources. |
Adverse media screening is cited in product documentation and collateral. | |
Ongoing Customer Monitoring Continuously screens existing clients for changes in status or newly published risks. |
Ongoing monitoring is part of the ongoing client lifecycle monitoring promoted by LexisNexis. | |
Risk Scoring Engine Assigns dynamic risk scores to clients based on risk factors and behaviors. |
LexisNexis describes dynamic risk scoring and risk intelligence in their offering. | |
Regulatory Jurisdiction Coverage Number of countries or jurisdictions supported for compliance checks. |
No information available | |
Language Support Number of languages supported for global client onboarding and screening. |
No information available | |
Enhanced Due Diligence Handling Supports additional data collection and review for high risk clients. |
Enhanced due diligence is referenced as a core feature for high risk clients. | |
Batch Processing Capability Ability to process multiple client screenings at once. |
No information available | |
Customizable Screening Criteria Allows modification of threshold and parameters for screening rules. |
Screening parameters are described as configurable, supporting custom screening rules. |
Real-Time Transaction Monitoring Automatically scans transactions for suspicious patterns as they occur. |
LexisNexis advertises real-time and near real-time transaction monitoring. | |
Behavioral Pattern Detection Uses profiling and analytics to detect unusual or unexpected patterns. |
Behavior analytics and pattern recognition is referenced for AML transaction monitoring. | |
Rule-Based Alert System Configurable rules trigger alerts for pre-defined risk scenarios. |
Configurable alerts and rules engine are standard in the solution. | |
Machine Learning/AI Analytics Employs AI models to detect previously unknown or emerging risks. |
AI and machine learning is leveraged in LexisNexis products for emerging risk detection. | |
Alert Prioritization Ranks alerts based on severity and risk relevance for efficient case handling. |
Alert prioritization functions are cited in documentation/materials, to help manage workload. | |
False Positive Management System features to reduce unnecessary alerts and streamline review. |
False positive management and reduction is a promoted, differentiating feature. | |
Volume Handling Capacity Maximum number of transactions monitored per second. |
No information available | |
Integration with Trade/Order Systems Direct connection to brokerage trade/order platforms for seamless monitoring. |
Product integration with trading, onboarding, and order management platforms is referenced. | |
Peer Group Analysis Compares client behavior against similar client group averages. |
No information available | |
Historical Data Analysis Supports backtesting and review of historical transactions for compliance audits. |
LexisNexis describes support for historical and backtesting reviews in audits and compliance checks. | |
Automated Case Escalation Automatically escalates suspicious cases for compliance officer review. |
No information available |
Integrated Global Lists Supports all major regulatory and financial watchlists (OFAC, EU, UN, etc.). |
Supports all major regulatory and financial watchlists, e.g., OFAC, EU, UN. | |
Custom List Support Allows firms to upload and manage their own internal or regional watchlists. |
Custom watchlist functionality (client-uploaded lists) is referenced in product sheets. | |
Automated List Updates Regularly and automatically fetches the latest list changes. |
Automated, regular regulatory and sanction list updates are provided. | |
Version Control Tracks list changes and maintains history for audit purposes. |
No information available | |
List Capacity Maximum number of entries supported per watchlist. |
No information available | |
Fuzzy Matching Algorithms Detects similar names or entities with variable spellings. |
Fuzzy matching and advanced search for variant names is a core feature as described in LexisNexis matching methods. | |
Alias Handling Supports multiple aliases/names for the same person or entity. |
Alias and name variant handling is supported per product datasheets. | |
Bulk List Import/Export Allows batch file management for lists. |
Bulk import/export of lists and entities is supported as referenced in onboarding feature lists. | |
Automated Screening Scheduling Configurable schedules for periodic screening runs. |
Scheduling periodic screening runs is referenced in technical docs. | |
Geo-Restriction Handling Manages restricted or high-risk regions and jurisdictions. |
Geo-restriction/high-risk jurisdiction controls are supported per AML solution page. |
Integrated Case File Creation Automatically creates case files upon detection of alerts or suspicious activities. |
Automatic case file creation after alerts is a described workflow automation. | |
Investigation Workflow Engine Guided process for analysts through investigation, review, and resolution steps. |
Case management workflows are part of LexisNexis AML case manager. | |
Audit Trail Logging Maintains detailed logs of all actions taken on a case for compliance. |
Comprehensive audit trail is described for case management. | |
Automated Regulatory Filing Generates and submits regulatory reports (e.g., SAR/STR) in the required formats. |
Automated generation of SAR/STR reports configurable to jurisdiction; e-filing references present. | |
Role-Based Access Control Restricts and manages access to cases based on user roles or responsibilities. |
Role-based access and permissions explicitly described as standard. | |
Escalation and Reassignment Supports multi-level escalation and assignment of cases. |
Escalation and multi-stage workflow supported in compliance case management. | |
Case Review SLAs Tracks and enforces service-level agreements for case review duration. |
No information available | |
Document Storage Capacity Maximum storage allocated per case for supporting documents. |
No information available | |
Automated Case Notification Notifies relevant users upon updates, assignment, or need for action. |
Automated notifications are built into case workflow tools. | |
Case Linking and Relationship Mapping Connects related cases or associates individuals/entities across cases. |
Related cases and entity relationships can be linked in reviews. |
Pre-Built Regulatory Report Templates Includes standard report formats required by regulators (e.g., SAR, CTR, STR, KYC logs). |
Standard SAR, CTR, and related regulatory templates included. | |
Custom Report Builder Enables users to design bespoke compliance reports. |
Custom reporting builder referenced as available. | |
Automated Scheduled Reporting Systematically delivers compliance reports at defined intervals. |
Automated compliance report scheduling and delivery is part of LexisNexis suite. | |
Regulatory Data Retention Period Number of years for which compliance data is retained. |
No information available | |
E-Filing Integration Supports direct submissions via regulatory authority electronic channels. |
E-filing, direct authority integration described for SAR/CTR/STR filings. | |
Multi-Jurisdictional Compliance Built-in features for different global regulatory regimes. |
Multi-jurisdictional and cross-border provisions cited for global compliance. | |
Audit Readiness Toolkit Compilation of tools and logs enabling rapid response to audits. |
Audit readiness toolkit and downloadable logs listed in product feature summaries. | |
Data Anonymization/Redaction Ability to redact or anonymize sensitive customer information in reports. |
Data redaction and anonymization options included for reporting. | |
Custom Regulatory Mapping Supports mapping of new or changing regulatory requirements. |
Product supports mapping of emerging regulatory requirements. | |
Compliance Attestation Support Module for documentation and certification of compliance by officers. |
Attestation module for compliance officer signoff included in some modules. |
API Access and Documentation Provides detailed APIs for integration with proprietary or third-party systems. |
Robust API access and documentation available for all major modules. | |
Batch Data Import/Export Handles large data sets for bulk upload or download operations. |
Batch data import and export tools available and documented. | |
Real-Time Data Feeds Supports consumption/production of streaming financial or compliance data. |
Real-time event/transaction feeds supported. | |
Third-Party Data Provider Integration Easy integration with external KYC/AML data sources, credit bureaus, etc. |
Easy integration with various KYC, AML data providers/custom feeds. | |
Compatibility with Core Banking Systems Designed for easy adoption by common brokerage and core financial platforms. |
Marketed as compatible with industry standard banking/brokerage systems. | |
Customizable Webhooks Triggers actions in other systems upon specific compliance events. |
Customizable webhook and event integrations described. | |
SSO and Identity Provider Support Integrates with identity management and SSO for organizational identity control. |
Single sign-on and identity provider integration supported. | |
Plugin/Extension Support Can be extended with add-ons for specific compliance needs. |
Support for partner extensions/plugins described. | |
Connector Library Size Number of pre-built connectors to standard systems/platforms. |
No information available | |
Legacy System Support Compatible with non-modern or legacy brokerage infrastructures. |
Claimed to support integration with legacy/non-modern broker systems. |
Customizable Dashboards Personalized views for compliance officers, executives, or investigators. |
Customizable dashboards for different user roles are described. | |
Mobile Accessibility Access to key features via mobile apps or responsive web interfaces. |
Mobile responsive interfaces and apps are available. | |
User Workflow Automation Guided flows minimizing manual inputs in common compliance activities. |
Workflow automation referenced to streamline case and review flows. | |
Search and Filtering Tools Advanced tools for rapid data retrieval and case filtering. |
Advanced case search and filtering is promoted for case managers. | |
Bulk Action Tools Support for batch processing and bulk updates. |
Bulk actions (updates, approvals) supported in case, screening, and watchlist modules. | |
Multi-Language UI User interface offered in multiple languages. |
UI supports multi-language display per vendor datasheet. | |
Accessibility Compliance Meets accessibility standards such as WCAG for user inclusivity. |
LexisNexis states UI and documentation is WCAG-compliant for accessibility. | |
User Training and Help Center Built-in education modules and real-time assistance features. |
In-product training tools and help center are available to users. | |
Custom User Roles Tailorable user permissions for granular security and workflow management. |
Granular, customizable user role management included in administration tools. | |
Performance/Load Times Average time taken for the UI to load main dashboards. |
No information available |
Data Encryption In Transit/At Rest Encrypts all sensitive data both in motion and when stored. |
Encryption in transit and at rest using industry standards (AES-256, TLS). | |
Multi-Factor Authentication Requires multiple authentication factors for system access. |
MFA available for admin/users; required for sensitive admin functionality. | |
Access Logging and Monitoring Extensive logs of all user access and administrative actions. |
Extensive user access/action logging provided for audit. | |
Penetration Testing Frequency How often the system undergoes external security assessment. |
No information available | |
Data Residency Options Supports choice of specific regions/countries for data storage. |
Choice of regional data residency/storage confirmed for major compliance clients. | |
Compliance with Industry Standards Adheres to standards such as ISO 27001, PCI DSS, GDPR. |
Compliance to ISO 27001, SOC 2, GDPR, and other finance standards reported. | |
User Session Time-Outs Automatic log-off after a period of inactivity. |
Automatic user session time-outs configurable in administration. | |
Field-Level Data Masking Sensitive fields can be masked or hidden from unauthorized users. |
Field-level data masking/hiding available for sensitive personal info. | |
Secure Audit Log Storage Ensures immutability and backup of critical audit logs. |
Immutable audit log storage and backup is described for compliance. | |
Incident Response Procedures Documented processes for breach detection and notification. |
Incident response procedures documented for clients (SOC2 and legal obligations). |
Concurrent User Limit Maximum number of users supported simultaneously. |
No information available | |
Transaction Processing Latency Average time to process and analyze a single transaction. |
No information available | |
Uptime/Availability SLA Guaranteed system availability often expressed as a percentage. |
No information available | |
Data Ingestion Rate Speed at which system can ingest new compliance data. |
No information available | |
Horizontal Scaling Support System supports scaling across servers/nodes to accommodate growth. |
Scale-out (horizontal scaling) cited in LexisNexis cloud platform documentation. | |
Performance Monitoring Tools Built-in dashboards and alerts on system performance metrics. |
System dashboards on latency, volume, and service health provided. | |
Cloud Deployment Option System can be deployed as a cloud (SaaS) or hybrid solution. |
Can be delivered as SaaS (hosted/cloud) or hybrid deployment. | |
On-Premise Deployment Option Supports local/internal hosting for sensitive or regulated data. |
Local/on-prem installation available per highly regulated regions/clients. | |
Disaster Recovery RTO Recovery Time Objective in case of system outage. |
No information available | |
Database Size Limit Maximum database size supported without performance loss. |
No information available |
24/7 Support Availability Round-the-clock access to technical and compliance support. |
24/7 global support team provided as per SLA documents. | |
Dedicated Account Manager Single point of contact for service and issue escalation. |
Dedicated account managers referenced for enterprise/regulated clients. | |
Self-Service Knowledge Base Extensive library of documentation, FAQs, and training material. |
Comprehensive online documentation, FAQs, and video support provided. | |
Regular System Updates Frequency of non-disruptive security, functionality and rule updates. |
No information available | |
Custom SLA Options Ability to define support levels and response times contractually. |
Custom SLAs contractually available for enterprise clients. | |
Uptime Guarantee Contractual uptime guarantee for system operation. |
No information available | |
Automated Backup Scheduling Scheduled, automated backups of all system and client data. |
Automated, scheduled backup tools available in cloud product. | |
Patch Management Tools Automation of system security patching and compliance rule changes. |
Patch management and automated update utilities are documented. | |
User Feedback Loop Mechanisms for users to submit feedback and feature requests. |
LexisNexis collects and implements user feedback through structured feedback channels. | |
Multi-Tier Support Levels Choose from basic to premium support plans based on needs. |
Various support tiers available for different enterprise and business needs. |
Transparent Pricing Model Clearly published and predictable licensing or usage costs. |
No information available | |
Pay-As-You-Go Option Usage-based billing for modular feature access. |
No information available | |
Volume Discounts Available Lower per-unit pricing as transaction or client count increases. |
Volume pricing arrangements available for enterprise clients per sales literature. | |
Free Trial/POC Period for free evaluation or proof of concept. |
Free trials and proof-of-concept deployments are referenced for onboarding. | |
Feature-Based Licensing Modular pricing per individual function/module. |
Feature-based, module licensing options are outlined for different AML modules. | |
Perpetual License Option Option to purchase software outright rather than as a subscription. |
No information available | |
Annual Billing Option Discounted pricing for annual upfront payment. |
Annual billing with discount available for larger clients/contracts. | |
Multi-Entity Licensing Special terms for multi-subsidiary or group licensing. |
Multi-entity licensing/enterprise agreements arranged for holding companies and global brokerages. | |
Seat/User License Cap Maximum number of named users included without additional charges. |
No information available | |
Additional Data Storage Pricing Published price per additional unit of data storage. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.