HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
AI-driven fraud prevention platform that uses machine learning, device fingerprinting, and behavioral analytics to detect and prevent fraud in real-time. Features include adaptive AI, case management, and customizable rules for payment fraud, account takeover, and new account fraud prevention.
Solutions for identifying and preventing various types of fraud across banking channels and products.
More Fraud Detection and Prevention
More Compliance ...
Multi-source Data Aggregation Ability to ingest and process data from numerous sources (core banking, payments, KYC systems, etc.) |
Kount Command integrates multiple data sources such as device, behavior, payment, and network data for fraud analysis. | |
Real-time Data Processing Capability to process data and trigger analysis instantly as transactions occur. |
Product is described as real-time AI-driven fraud prevention, indicating real-time data processing. | |
API Integration Support Supports integration via REST, SOAP, or other standard APIs for seamless data exchange. |
Supports integration via REST and other APIs as advertised on Kount's technical documentation. | |
Historical Data Import Ability to import and analyze historical transaction data for establishing baselines and trend analysis. |
Kount supports historical data for trend and fraud profiling, per documentation. | |
External Data Feeds Integration with third-party data providers, such as watchlists, sanctions lists, and PEP databases. |
Kount integrates external data feeds including custom and consortium data for risk analysis. | |
Batch Data Processing Supports processing large batches of data for end-of-day or scheduled checks. |
Batch processing supported in scheduled risk assessments and case management. | |
Data Cleansing and Normalization Automatic normalization, deduplication, and cleansing of ingested data. |
Fraud platform performs normalization and deduplication steps on input data per documentation. | |
Scalable Ingestion Volume The maximum volume of records or transactions that can be ingested per second. |
No information available | |
Data Encryption in Transit Ensures all ingested data is encrypted while moving between systems. |
Cloud-based data in transit is TLS/SSL encrypted as described in Kount's security FAQ. | |
Data Encryption at Rest Ensures data is encrypted while stored in the system. |
Platform encrypts data at rest according to Equifax security documentation. |
Rule-based Detection Configurable static rules (e.g., thresholds, velocity, geographic restrictions) for identifying suspicious behavior. |
Kount supports static rule sets for customizable fraud detection. | |
Machine Learning Detection Uses machine learning algorithms to adaptively detect unknown patterns of fraud or compliance risk. |
Machine learning detection is core to the platform (AI-driven scoring and analytics). | |
Custom Rule Builder Allows users to create and modify their own rules without programming. |
Custom rule builders are supported for no-code configuration in the user interface. | |
Behavioral Profiling Builds profiles for customers and accounts to detect deviations from normal activity. |
Behavioral profiling is explicitly referenced as a feature in Kount marketing material. | |
Peer Group Analysis Compares customer activity to peer groups to spot anomalies. |
Peer group/consortium analysis available within Kount’s fraud decision engine. | |
Real-time Scoring Assigns risk/fraud scores to transactions or accounts instantly as activity is processed. |
Assigns fraud scores to transactions in real-time; referenced in product overview. | |
Adaptive Thresholds Adjusts detection thresholds dynamically based on risk and trends. |
Adaptive AI and risk thresholds are referenced as automated and dynamic. | |
False Positive Rate Percentage of alerts identified as non-fraudulent during investigation. |
No information available | |
Detection Latency Average time taken to identify and flag a suspicious event. |
No information available | |
Outlier/Anomaly Detection Identifies rare events that deviate from established patterns. |
Outlier and anomaly detection is explicitly described as a machine learning service in product. | |
Threat Intelligence Integration Access to global fraud, cyber, and compliance threat intelligence feeds. |
Threat intelligence and global fraud consortium integration available. | |
Case Prioritization & Risk Ranking Automatically scores and ranks alerts/cases by risk level. |
Risk scoring and prioritization of cases supported in dashboard and case management tools. | |
Sanctions and Watchlist Screening Real-time checks against OFAC, FATF, UN, and custom lists. |
No information available | |
Regulatory Rule Updates Automated updates of detection rules and patterns according to latest regulatory requirements. |
Detection rules, including compliance-related updates, are automated as regulations change. | |
Self-learning Feedback Loop System learns from investigator outcomes to reduce future false positives. |
Provides investigator feedback loop to improve future decisioning, per Kount resources. |
Automated Alert Generation Automatically creates alerts for potentially suspicious activities based on detection rules. |
Alerts are automatically generated for suspicious activity (core capability). | |
Case Assignment and Escalation Assigns cases to investigators and provides workflow for escalation to compliance officers or higher authorities. |
Support for case assignment and escalation in Investigation Suite. | |
Case Notes and Attachment Support Allows investigators to add notes and attach supporting documentation to cases. |
Case notes and documentation attachment is supported in case management workflows. | |
Case Tracking and Audit Trail Maintains a complete history of all case actions and changes for compliance and audit needs. |
Audit trail and case tracking built into case management system. | |
SLA Management Monitors compliance with service level agreements (e.g., investigation deadlines). |
No information available | |
Bulk Case Actions Enables management of multiple cases at once (e.g., close, escalate, assign). |
Bulk operations for case management available per Kount documentation. | |
Case Status Tracking Tracks the status (open, in progress, closed, etc.) for all alerts and cases. |
Tracks status for all cases in the system as per interface documentation. | |
Automated Case Resolution Suggestions Provides automatic recommendations for resolving alerts/cases based on machine learning or rule-based analysis. |
Offers case resolution suggestions and scoring based on AI and business logic. | |
Link Analysis between Cases Visualizes links and relationships between alerts and cases (e.g., network analysis). |
Offers relationship and link analysis between cases with visual tools. | |
Case Volume Capacity The maximum number of active cases that can be managed simultaneously. |
No information available | |
Multi-user Collaboration Supports multiple users working on a case simultaneously with tracked changes. |
Multiple users can collaborate on cases as detailed in collaborative investigation functionality. | |
Alert Deduplication Automatically removes duplicate alerts to improve investigator efficiency. |
Duplicate alert identification and merging available for efficiency. |
Role-based Access Control (RBAC) Allows creation of user roles with defined permissions. |
Role-based access and permissions management featured per documentation. | |
Two-factor Authentication Supports multi-factor login for enhanced user security. |
No information available | |
Single Sign-On (SSO) Integration Integrates with SSO standards (SAML, OAuth, etc.) for centralized authentication. |
Supports SSO integration using standard protocols (SAML/OAuth). | |
Granular Permission Management Enables detailed control over user rights at feature, data, or function level. |
Granular permission management available as part of user management interface. | |
User Activity Monitoring Tracks and logs all user actions for audit and security. |
Extensive user action tracking and activity logging in security and audit modules. | |
Password Policy Enforcement Supports enforcing strong password requirements and expiration policies. |
Enforces strong password policies per Equifax and Kount security compliance. | |
Session Timeout Automatically logs out users after inactivity to prevent unauthorized access. |
No information available | |
Access Attempt Logging Logs all successful or failed login attempts. |
No information available |
Pre-built Reports Provides standardized reports for common compliance and fraud scenarios. |
Standard and regulatory-ready reporting templates included as pre-built reports. | |
Custom Report Builder Allows users to design and schedule bespoke reports. |
Users can design and export custom reports on fraud and account activity. | |
Dashboard Visualization Interactive dashboards to visualize key metrics and trends. |
Interactive dashboards and metric visualization are integral to Kount’s admin UI. | |
Drill-down Analytics Ability to explore data in more detail from high-level summaries. |
Drill-down from high-level metrics to transactional data is supported. | |
Real-time Monitoring Widgets Live visualization of current alerts, cases, and operational KPIs. |
Dashboard widgets offer real-time views of alerts and operations. | |
Scheduled Report Distribution Automated emailing or distribution of regular reports. |
Scheduled and automated report distribution by email is available. | |
Exportable Data Formats Reports can be exported as PDF, CSV, XLS, etc. |
Exports supported in common formats (CSV, PDF) per product sheets. | |
Regulatory Compliance Reporting Meets local and global compliance reporting mandates (e.g., SAR, STR, CTR, AMLD). |
Supports SAR/regulatory compliance reporting and export. | |
Case Closure Time Analysis Reporting on average time to resolution for cases. |
No information available |
Configurable Regulatory Rules Flexibility to update compliance checks as local or global regulations change. |
Regulatory and compliance business rules are configurable by users/admins. | |
Automated Regulatory Updates System automatically receives and applies updates for new laws, sanctions, and best practices. |
Receives automatic regulatory/sanction updates via cloud platform. | |
Regulatory Audit Trail Complete, immutable logs for every action, decision, and change to meet regulator requirements. |
Audit trail capability supplied for all regulatory and compliance actions. | |
Retention Policy Management Configurable policies for data and case retention according to jurisdiction. |
No information available | |
SAR/STR Generation Automatic generation and formatting of Suspicious Activity/Transaction Reports. |
No information available | |
Customer Due Diligence (CDD) Support Verifies customer identity and risk at onboarding and ongoing intervals. |
No information available | |
Ongoing Monitoring of PEPs Continuous checks on Politically Exposed Persons and related entities. |
No information available | |
KYC/AML Compliance Tools Supports comprehensive Know Your Customer (KYC) and Anti-Money Laundering (AML) checks. |
No information available | |
Cross-border Compliance Support Handles international regulations and cross-jurisdiction risk scenarios. |
No information available |
Horizontal Scalability The system can add resources across servers or clusters for greater throughput. |
Cloud-based solution is horizontally scalable as per Equifax cloud architecture. | |
Vertical Scalability Supports increased performance by adding hardware to a single node. |
System resources can be scaled vertically in dedicated cloud deployments. | |
Cloud Deployment Support Functions in cloud environments (AWS, Azure, GCP) for flexibility and resilience. |
Product supports AWS and other cloud deployments (see website). | |
On-premise Deployment Support Can be installed in a privately managed infrastructure for data residency requirements. |
Not as far as we are aware.* Kount is offered exclusively as a cloud SaaS; no on-premise deployment. | |
Average Transaction Processing Speed Time taken to process and analyze a transaction/event. |
No information available | |
Maximum Supported Users Peak concurrent users the system can handle without performance degradation. |
No information available | |
Maximum Supported Data Volume Total amount of historical data the platform can store and analyze efficiently. |
No information available | |
Disaster Recovery Capability Automated backup, replication, and rapid recovery in case of hardware or software failure. |
Equifax documentation states disaster recovery, redundancy, and cloud backups are in place. |
Intuitive Navigation Modern, user-friendly design for easy access to key functions and data. |
Modern web interface described as intuitive and accessible in documentation and reviews. | |
Customizable Dashboards Users can personalize dashboards to focus on relevant alerts, KPIs, and tasks. |
User dashboards can be personalized for alert and task focus. | |
Responsiveness Interface functions well on desktop, tablet, and mobile devices. |
Web UI is mobile and desktop responsive (per product videos and user guides). | |
Accessibility Compliance (WCAG) Meets accessibility standards for vision, hearing, and mobility-impaired users. |
No information available | |
Multilingual Support Supports operation and visualization in multiple languages. |
No information available | |
Contextual Help and Tooltips Built-in guidance and documentation available throughout the platform. |
In-app help and tooltips available. | |
Quick Search and Filtering Fast lookup and advanced filtering for cases, alerts, and transactions. |
Supports quick search and advanced filtering across UI screens. | |
Bulk Data Editing Ability to process and update multiple records at once. |
Bulk operations for case and data updates are available. |
RESTful API Availability Comprehensive APIs for fetching or pushing data to/from other systems. |
RESTful API access is a standard integration method for Kount. | |
Webhook Support Send push notifications to external systems as events occur. |
Webhooks supported for push notifications to external systems. | |
Third-party Connector Marketplace Prebuilt connectors for leading systems (CRM, core banking, data enrichment, etc.). |
Marketplace and connectors for e-commerce, payments and CRM—see Integrations. | |
Custom Workflow Integration Allows incorporation of custom business logic or process automations. |
Custom workflow tools and API available for process automation. | |
Scripting & Plugin Support Extend platform with custom scripts or plug-ins as needed. |
Supports platform extension via scripting and plug-in modules. | |
Event-driven Architecture Supports trigger-based actions and responses to key platform events. |
Event-driven models supported for triggers (see API/events documentation). | |
Legacy System Integration Specialized adapters for older or proprietary systems. |
Has legacy integration adapters; supports older payment systems per solution sheets. | |
Data Output Formats Range of supported export formats for data exchange (CSV, JSON, XML). |
Exports and integrations support CSV, JSON, and XML for data exchange. |
Continuous Transaction Monitoring Ongoing real-time monitoring of all banking and payment transactions. |
Real-time monitoring of payment and account activity is the platform's core offering. | |
Customer Risk Scoring Assigns and updates risk scores for individual and business customers. |
Customer risk scoring is performed in real-time, per feature list. | |
Channel Monitoring Monitors transactions across branches, ATMs, online, mobile, call centers, etc. |
Supports omnichannel (web, mobile, in-store, call center) monitoring. | |
Entity Relationship Mapping Identifies connections between accounts, customers, vendors, and third parties. |
Entity and relationship mapping for fraud rings and connected activity available. | |
Transaction Velocity Checks Detects rapid succession of transactions that may indicate structuring or layering. |
Transaction velocity/rate analysis appears in the fraud configuration settings. | |
Geolocation Analysis Identifies transactions occurring from unusual or high-risk locations. |
Geolocation and IP risk analysis is incorporated in machine learning and rules. | |
Device Fingerprinting Detects usage of new, risky, or known suspicious devices. |
Device fingerprinting is a key technical feature advertised by Kount. | |
Biometric/Behavioral Biometrics Monitoring Supports detection of fraud via typing patterns, voice, facial recognition, etc. |
Behavioral biometrics (typing, velocity, device) built into analytics engine. | |
Real-time Alerts to Customers Notifies customers immediately when potentially suspicious activity is detected. |
Real-time alerts/notifications (e.g., SMS/email to customer) can be triggered via rules. |
24/7 Technical Support Access to round-the-clock technical support team. |
24/7 technical support available from Equifax/Kount per the support site. | |
Comprehensive Documentation Well-maintained reference docs, including API and configuration guides. |
Comprehensive online documentation for API, configuration, and onboarding. | |
Service Level Agreement (SLA) Uptime Guaranteed minimum percentage of system availability. |
No information available | |
Regular Product Updates Product enhancements and security patches delivered regularly. |
Regular security and product feature updates throughout the year. | |
Customer Success Management Dedicated resources for onboarding, training, and continual improvement. |
Customer onboarding and ongoing customer success teams are referenced in sales collateral. | |
Issue and Ticket Tracking System Central system for raising, tracking, and managing support incidents. |
Incident/ticket management system for support issues is included. | |
Online Community/Knowledge Base Access to user forums, known issues, and best practices resources. |
Online knowledge base and user community maintained per https://support.kount.com. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.