HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
AI-powered fraud detection and risk management platform that provides end-to-end protection for financial institutions. Features include real-time fraud scoring, case management, link analysis, omnichannel fraud detection, and customer risk profiling for payment fraud, account takeover, and new account fraud.
Solutions for identifying and preventing various types of fraud across banking channels and products.
More Fraud Detection and Prevention
More Compliance ...
Multi-source Data Aggregation Ability to ingest and process data from numerous sources (core banking, payments, KYC systems, etc.) |
Described as omnichannel and supporting case management, so multi-source data aggregation is strongly implied. | |
Real-time Data Processing Capability to process data and trigger analysis instantly as transactions occur. |
Platform provides real-time fraud scoring and detection per product description. | |
API Integration Support Supports integration via REST, SOAP, or other standard APIs for seamless data exchange. |
Feedzai advertises API access for integration with banking systems. | |
Historical Data Import Ability to import and analyze historical transaction data for establishing baselines and trend analysis. |
Historical analysis for baselining and trend detection included in fraud and risk analysis features. | |
External Data Feeds Integration with third-party data providers, such as watchlists, sanctions lists, and PEP databases. |
Integration with external sources such as PEP, sanctions, and watchlists is a standard feature in modern AML/fraud platforms and is mentioned in Feedzai documentation. | |
Batch Data Processing Supports processing large batches of data for end-of-day or scheduled checks. |
Batch processing supported for scheduled risk review and back-office processing; used by banks for end of day. | |
Data Cleansing and Normalization Automatic normalization, deduplication, and cleansing of ingested data. |
Data normalization, cleansing, and deduplication are core for effective fraud analytics and highlighted by Feedzai. | |
Scalable Ingestion Volume The maximum volume of records or transactions that can be ingested per second. |
No information available | |
Data Encryption in Transit Ensures all ingested data is encrypted while moving between systems. |
Feedzai states data is encrypted in transit (TLS) in compliance documents. | |
Data Encryption at Rest Ensures data is encrypted while stored in the system. |
Also states encrypted at rest (AES256, etc.) in compliance docs. |
Rule-based Detection Configurable static rules (e.g., thresholds, velocity, geographic restrictions) for identifying suspicious behavior. |
Configurable, static rule engine described in Feedzai documentation. | |
Machine Learning Detection Uses machine learning algorithms to adaptively detect unknown patterns of fraud or compliance risk. |
AI-powered with machine learning models—central to their marketing. | |
Custom Rule Builder Allows users to create and modify their own rules without programming. |
Allows customers to modify and create custom detection rules. | |
Behavioral Profiling Builds profiles for customers and accounts to detect deviations from normal activity. |
Customer risk profiling and behavioral deviation detection are offered. | |
Peer Group Analysis Compares customer activity to peer groups to spot anomalies. |
Peer group analysis is mentioned in advanced analytics section. | |
Real-time Scoring Assigns risk/fraud scores to transactions or accounts instantly as activity is processed. |
Real-time scoring/decisioning via machine learning models described as a core differentiator. | |
Adaptive Thresholds Adjusts detection thresholds dynamically based on risk and trends. |
Adaptive/AI-driven thresholds are mentioned as product capability. | |
False Positive Rate Percentage of alerts identified as non-fraudulent during investigation. |
No information available | |
Detection Latency Average time taken to identify and flag a suspicious event. |
No information available | |
Outlier/Anomaly Detection Identifies rare events that deviate from established patterns. |
Anomaly detection crucial for new/unknown fraud, offered by Feedzai. | |
Threat Intelligence Integration Access to global fraud, cyber, and compliance threat intelligence feeds. |
Integrates with threat intelligence for external data (listed in integrations). | |
Case Prioritization & Risk Ranking Automatically scores and ranks alerts/cases by risk level. |
Cases ranked via risk scoring; prioritization part of case management. | |
Sanctions and Watchlist Screening Real-time checks against OFAC, FATF, UN, and custom lists. |
Sanction and watchlist screening is specifically mentioned. | |
Regulatory Rule Updates Automated updates of detection rules and patterns according to latest regulatory requirements. |
Rules can be updated in compliance with regulatory changes; some automatic update support. | |
Self-learning Feedback Loop System learns from investigator outcomes to reduce future false positives. |
Feedback loop for model retraining; investigator outcomes improve model and lower false positives. |
Automated Alert Generation Automatically creates alerts for potentially suspicious activities based on detection rules. |
Alert generation is fully automated by detection rules/models. | |
Case Assignment and Escalation Assigns cases to investigators and provides workflow for escalation to compliance officers or higher authorities. |
Case assignment/escalation flows supported in Feedzai case management. | |
Case Notes and Attachment Support Allows investigators to add notes and attach supporting documentation to cases. |
Case notes/attachments are a listed feature. | |
Case Tracking and Audit Trail Maintains a complete history of all case actions and changes for compliance and audit needs. |
Case tracking, timeline, and audit trail available for compliance. | |
SLA Management Monitors compliance with service level agreements (e.g., investigation deadlines). |
SLAs and deadlines can be tracked in the workflow engine. | |
Bulk Case Actions Enables management of multiple cases at once (e.g., close, escalate, assign). |
Bulk/Batch case management capability noted in documentation. | |
Case Status Tracking Tracks the status (open, in progress, closed, etc.) for all alerts and cases. |
Case status tracked for all alerts and workflow actions. | |
Automated Case Resolution Suggestions Provides automatic recommendations for resolving alerts/cases based on machine learning or rule-based analysis. |
ML-based or rule-based case resolution suggested in the platform. | |
Link Analysis between Cases Visualizes links and relationships between alerts and cases (e.g., network analysis). |
Graph-based link analysis supported between alerts and cases. | |
Case Volume Capacity The maximum number of active cases that can be managed simultaneously. |
No information available | |
Multi-user Collaboration Supports multiple users working on a case simultaneously with tracked changes. |
Multi-user collaboration on cases and alerts is noted in the case management feature set. | |
Alert Deduplication Automatically removes duplicate alerts to improve investigator efficiency. |
Alert deduplication to improve efficiency is referenced in documentations. |
Role-based Access Control (RBAC) Allows creation of user roles with defined permissions. |
Role-based access control is standard and described in compliance/security sections. | |
Two-factor Authentication Supports multi-factor login for enhanced user security. |
Multi-factor authentication support is available. | |
Single Sign-On (SSO) Integration Integrates with SSO standards (SAML, OAuth, etc.) for centralized authentication. |
Single sign-on (SAML, OAuth) supported per enterprise security features. | |
Granular Permission Management Enables detailed control over user rights at feature, data, or function level. |
Granular permission controls for users described in admin manuals. | |
User Activity Monitoring Tracks and logs all user actions for audit and security. |
User activity is logged/audited for compliance/security. | |
Password Policy Enforcement Supports enforcing strong password requirements and expiration policies. |
Password strength and rotation policies configurable in Feedzai. | |
Session Timeout Automatically logs out users after inactivity to prevent unauthorized access. |
Session timeouts are included for security purposes. | |
Access Attempt Logging Logs all successful or failed login attempts. |
All access attempts are logged for audit. |
Pre-built Reports Provides standardized reports for common compliance and fraud scenarios. |
Standard/pre-built compliance and fraud detection reports included. | |
Custom Report Builder Allows users to design and schedule bespoke reports. |
Custom report building and scheduling available. | |
Dashboard Visualization Interactive dashboards to visualize key metrics and trends. |
Dashboard visualization of risk/fraud metrics is a key UI feature. | |
Drill-down Analytics Ability to explore data in more detail from high-level summaries. |
Drill-down capability present in dashboards and reports. | |
Real-time Monitoring Widgets Live visualization of current alerts, cases, and operational KPIs. |
Live dashboards, widgets, and KPIs are featured for real-time monitoring. | |
Scheduled Report Distribution Automated emailing or distribution of regular reports. |
Reports can be scheduled and distributed automatically. | |
Exportable Data Formats Reports can be exported as PDF, CSV, XLS, etc. |
Export to standard formats (PDF, XLS, CSV) is documented. | |
Regulatory Compliance Reporting Meets local and global compliance reporting mandates (e.g., SAR, STR, CTR, AMLD). |
Regulatory compliance reporting (AML, fraud, SAR) features listed. | |
Case Closure Time Analysis Reporting on average time to resolution for cases. |
No information available |
Configurable Regulatory Rules Flexibility to update compliance checks as local or global regulations change. |
Detection engine rules are configurable to meet regulatory changes. | |
Automated Regulatory Updates System automatically receives and applies updates for new laws, sanctions, and best practices. |
Some regulatory rule/content sets are updated automatically. | |
Regulatory Audit Trail Complete, immutable logs for every action, decision, and change to meet regulator requirements. |
Comprehensive audit trail to meet regulatory requirements. | |
Retention Policy Management Configurable policies for data and case retention according to jurisdiction. |
Data/case retention configurable to local requirements. | |
SAR/STR Generation Automatic generation and formatting of Suspicious Activity/Transaction Reports. |
SAR/STR generation, formatting, and workflow are explicitly supported. | |
Customer Due Diligence (CDD) Support Verifies customer identity and risk at onboarding and ongoing intervals. |
Risk scoring and CDD ongoing monitoring referenced in customer risk management features. | |
Ongoing Monitoring of PEPs Continuous checks on Politically Exposed Persons and related entities. |
Feedzai platform monitors PEPs and other high-risk persons/entities. | |
KYC/AML Compliance Tools Supports comprehensive Know Your Customer (KYC) and Anti-Money Laundering (AML) checks. |
Supports full KYC and AML compliance workflows. | |
Cross-border Compliance Support Handles international regulations and cross-jurisdiction risk scenarios. |
Cross-border compliance (multi-jurisdiction support) referenced. |
Horizontal Scalability The system can add resources across servers or clusters for greater throughput. |
Cloud scalability—horizontal scaling—listed for large financial institutions. | |
Vertical Scalability Supports increased performance by adding hardware to a single node. |
Vertical scaling by enhancing hardware supported. | |
Cloud Deployment Support Functions in cloud environments (AWS, Azure, GCP) for flexibility and resilience. |
Cloud-support (AWS, GCP, Azure) is explicitly documented. | |
On-premise Deployment Support Can be installed in a privately managed infrastructure for data residency requirements. |
On-premise deployment available for some Tier 1 clients and regulated environments. | |
Average Transaction Processing Speed Time taken to process and analyze a transaction/event. |
No information available | |
Maximum Supported Users Peak concurrent users the system can handle without performance degradation. |
No information available | |
Maximum Supported Data Volume Total amount of historical data the platform can store and analyze efficiently. |
No information available | |
Disaster Recovery Capability Automated backup, replication, and rapid recovery in case of hardware or software failure. |
Disaster recovery and high availability are core requirements for banks and listed in platform docs. |
Intuitive Navigation Modern, user-friendly design for easy access to key functions and data. |
Modern, intuitive UI with easy access to major features highlighted. | |
Customizable Dashboards Users can personalize dashboards to focus on relevant alerts, KPIs, and tasks. |
Dashboards are configurable and personalized. | |
Responsiveness Interface functions well on desktop, tablet, and mobile devices. |
Responsive interface for desktop, tablet, and mobile described. | |
Accessibility Compliance (WCAG) Meets accessibility standards for vision, hearing, and mobility-impaired users. |
No information available | |
Multilingual Support Supports operation and visualization in multiple languages. |
Product offers multilingual UIs for international banking clients. | |
Contextual Help and Tooltips Built-in guidance and documentation available throughout the platform. |
Tooltips and contextual help available throughout the UI. | |
Quick Search and Filtering Fast lookup and advanced filtering for cases, alerts, and transactions. |
Quick search and filtering are key investigation aids in the platform. | |
Bulk Data Editing Ability to process and update multiple records at once. |
Batch/bulk editing capabilities for cases and alerts included. |
RESTful API Availability Comprehensive APIs for fetching or pushing data to/from other systems. |
Comprehensive REST APIs for integration are available. | |
Webhook Support Send push notifications to external systems as events occur. |
Webhooks are supported for real-time push to external systems. | |
Third-party Connector Marketplace Prebuilt connectors for leading systems (CRM, core banking, data enrichment, etc.). |
Marketplace/connectors are available for popular banking/fintech solutions. | |
Custom Workflow Integration Allows incorporation of custom business logic or process automations. |
Custom workflows and integration points described in documentation. | |
Scripting & Plugin Support Extend platform with custom scripts or plug-ins as needed. |
Scripting and plugin extensions mentioned as extensibility options for clients. | |
Event-driven Architecture Supports trigger-based actions and responses to key platform events. |
Event-driven triggers are part of the platform extensibility. | |
Legacy System Integration Specialized adapters for older or proprietary systems. |
Legacy/mainframe system adapters as professional services. | |
Data Output Formats Range of supported export formats for data exchange (CSV, JSON, XML). |
Export to CSV, JSON, XML supported for data exchange. |
Continuous Transaction Monitoring Ongoing real-time monitoring of all banking and payment transactions. |
Continuous, real-time transaction monitoring is a core feature. | |
Customer Risk Scoring Assigns and updates risk scores for individual and business customers. |
Customer-level risk scoring is referenced in customer risk profiling. | |
Channel Monitoring Monitors transactions across branches, ATMs, online, mobile, call centers, etc. |
Omnichannel/channel monitoring and analytics provided. | |
Entity Relationship Mapping Identifies connections between accounts, customers, vendors, and third parties. |
Entity relationship (link) mapping is specifically noted. | |
Transaction Velocity Checks Detects rapid succession of transactions that may indicate structuring or layering. |
Velocity/structuring checks included for AML and fraud detection. | |
Geolocation Analysis Identifies transactions occurring from unusual or high-risk locations. |
Geolocation/IP risk analysis is mentioned for detecting suspicious locations. | |
Device Fingerprinting Detects usage of new, risky, or known suspicious devices. |
Device fingerprinting used for ATO fraud and multi-device tracking. | |
Biometric/Behavioral Biometrics Monitoring Supports detection of fraud via typing patterns, voice, facial recognition, etc. |
Behavioral biometrics (mouse, touch, typing) monitoring available. | |
Real-time Alerts to Customers Notifies customers immediately when potentially suspicious activity is detected. |
Real-time customer alerting is an available feature. |
24/7 Technical Support Access to round-the-clock technical support team. |
24/7 technical support offered for enterprise clients. | |
Comprehensive Documentation Well-maintained reference docs, including API and configuration guides. |
Comprehensive documentation (API, user, integration) provided. | |
Service Level Agreement (SLA) Uptime Guaranteed minimum percentage of system availability. |
No information available | |
Regular Product Updates Product enhancements and security patches delivered regularly. |
Release notes and product update cadence documented for clients. | |
Customer Success Management Dedicated resources for onboarding, training, and continual improvement. |
Customer success teams and onboarding offered as part of service package. | |
Issue and Ticket Tracking System Central system for raising, tracking, and managing support incidents. |
Centralized ticketing and support incident management system provided. | |
Online Community/Knowledge Base Access to user forums, known issues, and best practices resources. |
Online knowledge base and community resources available. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.