HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Cryptocurrency compliance solution that helps fund managers monitor transactions across multiple cryptocurrencies, identify high-risk activity, and meet regulatory requirements for digital assets.
Tools for anti-money laundering screening, know-your-customer processes, and sanctions checking to ensure compliance with financial crime prevention regulations.
More AML and KYC Solutions
More Risk & Compliance ...
Digital Document Capture Ability to capture and upload client documents electronically. |
Chainalysis KYT allows electronic data capture from digital wallets and exchanges, which can be considered a form of digital document/data capture for compliance. | |
Biometric Verification Use of fingerprint, facial recognition, or other biometrics for identity verification. |
No information available | |
E-signature Integration Support for electronic signature workflows for onboarding agreements. |
No information available | |
Real-time ID Verification Immediate validation of government-issued IDs using integrations with official databases. |
Relies on blockchain-based digital ID/entity validation in real-time for wallet ownership and crypto transaction compliance. | |
Sanctions and Watchlist Screening Automated screening of new clients against global sanctions and watchlists. |
Advertises sanctions watchlist screening of crypto addresses for AML compliance. | |
Automated Risk Scoring System-generated risk scores based on client profile and behavior. |
Provides automated risk scoring for crypto wallets and transactions. | |
Onboarding Time Average time taken to onboard a new client end-to-end. |
No information available | |
KYC Form Generation Automatic generation and pre-filling of regulatory KYC forms. |
No information available | |
Multi-language Support Ability to provide the onboarding experience in multiple languages. |
No information available | |
Mobile Onboarding Support for mobile/web-friendly onboarding processes. |
Chainalysis KYT offers a web-based portal designed for accessibility on desktop and mobile. | |
Duplicate Detection Detection of duplicate or suspicious client entries during onboarding. |
No information available | |
Automatic PEP Identification Identification of Politically Exposed Persons during onboarding. |
Highlights support for detection and flagging of Politically Exposed Persons (PEPs) via blockchain analytics. | |
Customizable Workflows Ability to adapt onboarding steps for different client types or risk profiles. |
Provides customizable risk-based rules and compliance workflow automation for onboarding and monitoring. |
Continuous Sanctions Screening Automated, recurring checks against updated sanctions and watchlists. |
Marketed as providing continuous/ongoing sanctions and risk-based blockchain screening. | |
Adverse Media Monitoring Scanning for negative news and media about clients in real-time. |
Includes real-time adverse media and dark web monitoring. | |
Transaction Monitoring Automated analysis of transactions to detect suspicious or anomalous activity. |
Core feature: continuous transaction monitoring for suspicious activity across blockchains. | |
Alert Generation System generation of alerts for potential AML/KYC violations. |
Automated generation and escalation of alerts for high-risk crypto transactions. | |
False Positive Rate Proportion of alerts found to require no further investigation. |
No information available | |
Rule-based Alerting Configurable rules to tailor alert logic to business and regulatory needs. |
Supports rule-based alerting and thresholds for monitoring. | |
Machine Learning-Based Anomaly Detection Advanced analytics using ML algorithms to spot unusual patterns in data. |
Describes advanced analytics and anomaly detection using machine learning for transactional risk. | |
Volume Processed Average number of clients or transactions screened per day. |
No information available | |
Customizable Screening Intervals Ability to configure how frequently clients are re-screened. |
Allows clients to configure screening intervals and risk review frequency. | |
Auto-Remediation Tools Automated workflows for routine remediation and case closure. |
Workflow includes automatic case closure and remediation for standard compliance events. | |
Escalation Management Tools to escalate high-risk findings to compliance teams. |
Provides alert/case escalation features for compliance teams. | |
Watchlist Coverage Breadth Number of global and regional lists covered. |
No information available | |
Audit Log Retention Length of time audit logs are retained. |
undefined Offers audit logs and retention for compliance evidence. |
Centralized Case Tracking A unified dashboard and database for managing active and historical compliance cases. |
Centralized dashboard and case management is part of Chainalysis KYT’s feature set. | |
Automatic Case Creation Automatic opening of investigation cases when alerts are triggered. |
Automatically creates investigations cases based on alert triggers. | |
Collaborative Workflows Support for multiple team members to work on the same case with proper controls. |
Collaborative workflow for multiple compliance team members is supported. | |
Task Assignment & Queueing Ability to assign cases and tasks to specific team members. |
Tasks/alerts can be assigned to users or teams. | |
Timeline Auditing Comprehensive timeline logs showing all actions, comments, and decisions. |
Tracks all actions, timelines, and user comments for auditability. | |
Case Closing Time Average time from case opening to closing. |
No information available | |
Evidence Management Central storage and organization for case-related supporting documentation. |
Stores evidence and documentation related to cases/alerts. | |
Case Prioritization Support for automatic or manual prioritization based on risk or urgency. |
Case/alert prioritization and workflow based on severity/risk. | |
Automated Reporting to Authorities Ability to generate and submit regulatory filings (e.g., Suspicious Activity Reports). |
Enables regulatory reporting workflows, including SAR/STR generation. | |
Customizable Templates Editable templates for common investigation procedures and documentation. |
No information available | |
User Access Controls Granular permissions to limit access to sensitive case information. |
Fine-grained permissions for account and case access by user role. | |
Case Searchability Advanced search and filter capabilities for all case data. |
Cases, transactions, and wallets are highly searchable/filterable within the platform. |
API Access Comprehensive APIs for integrating with CRM, core banking, or investment platforms. |
Offers extensive API access for integration with core banking and compliance systems. | |
Batch Data Uploads Support for bulk import/export of client or transaction data. |
Bulk transaction/wallet data uploads are supported via CSV and API. | |
Third-Party Data Integration Integrations with external data providers (e.g., credit bureaus, public records). |
Data enrichment via external public/regulatory databases and risk providers. | |
Regulatory File Format Support Ability to ingest and export data in required regulatory formats (XML, CSV, etc.). |
No information available | |
Real-Time Data Sync Ability to send and receive data in real-time with other business systems. |
Real-time data sync via API/webhooks for dynamic compliance, as per integration docs. | |
Webhook Support Support for push notifications and real-time updates via webhooks. |
No information available | |
Integration Time Average time required to implement out-of-the-box integrations. |
No information available | |
Standardized APIs (REST/SOAP) Availability of modern REST or SOAP APIs. |
Provides RESTful APIs as per technical documentation. | |
Single Sign-On (SSO) Support for SSO with enterprise identity providers. |
Supports SSO with enterprise identity providers. | |
Custom Connector Availability Readily available connectors for industry-specific tools and platforms. |
No information available | |
Cloud Platform Compatibility Support for integration with major cloud services (AWS, Azure, GCP). |
Integrates with AWS/Azure for hosting and deployment. |
Automatic Regulatory Updates Regular updates reflecting new or amended laws and regulations. |
Product regularly updates for new crypto compliance regulations (see release notes). | |
Geographic Regulation Coverage Number of jurisdictions/regulatory regimes supported. |
No information available | |
Configurable Reporting Rules Ability to customize rules to support specific local requirements. |
Custom compliance rules for varying jurisdictions are supported. | |
Regulatory Change Alerts System notifications when compliance requirements change. |
Provides regulatory change notifications for supported regions and digital assets. | |
Pre-built Regulatory Reports Templates for common regional reports (e.g., SAR, STR). |
No information available | |
AML Program Template Library Built-in templates for AML policy and procedure documents. |
No information available | |
Support for FATF Recommendations Alignment with Financial Action Task Force best practices. |
Chainalysis actively aligns with FATF guidelines; stated in compliance documentation. | |
Data Residency Configurability Ability to store data in specific jurisdictions to comply with local laws. |
Offers data residency options (EU/US) for regulatory compliance. | |
Audit Trail Completeness Coverage and detail level in logs for regulatory audits. |
Provides thorough audit log coverage for system and user activity. | |
Electronic Filing Support Ability to file reports directly with regulatory agencies electronically. |
Enables electronic filing of compliance reports to regulatory authorities. | |
Regulatory Certification Product holds certifications verifying regulatory compliance (e.g., SOC2, ISO 27001). |
No information available |
Intuitive Interface Modern, user-friendly dashboard and navigation. |
Modern user interface is a key point in Chainalysis product marketing. | |
Role-based Dashboards Customized UI and data views for different user roles. |
Role-based dashboard and views are part of user management documentation. | |
Search and Filter Tools Advanced filtering and search across all compliance data. |
Offers advanced search and data filtering tools. | |
Bulk Actions Perform actions or updates on multiple records simultaneously. |
Bulk actions on lists of transactions or addresses are supported. | |
Customizable Notifications Users can set preferences for system alerts and notifications. |
No information available | |
Accessibility Features Support for users with disabilities (e.g., screen reader compatibility). |
No information available | |
Multi-device Support Usable across desktop, tablet, and mobile devices. |
Web-based dashboard accessible on multiple types of devices. | |
User Training Materials Built-in guides, tutorials, and help resources. |
Includes online help resources, how-tos, and training videos. | |
Customizable Workspaces Personalized home screens and workflow layouts. |
No information available | |
Localization Settings Support for local time zones, currencies, and date formats. |
No information available | |
Queue Management Efficient prioritization and handling of user tasks and queues. |
Offers task and queue management within case workflows. |
Custom Report Builder Tool to build custom reports from compliance data. |
Allows users to build custom analytics and compliance reports. | |
Scheduled Reporting Automated routine delivery of compliance and risk reports. |
Supports automated, scheduled reporting on transactions and alerts. | |
Export Formats Range of available export formats (PDF, CSV, XLSX, etc.). |
No information available | |
Dashboard Analytics Real-time dashboards for monitoring key AML/KYC metrics. |
Dashboards with live compliance and risk analytics; part of product highlight. | |
Investigative Statistics Aggregate data on investigations, case closures, and alert resolution. |
No information available | |
Alert Volume Analytics Reports quantifying alerts generated over time. |
No information available | |
Regulatory Filing Logs Detailed logs of past regulatory filings and deadlines. |
No information available | |
Dashboard Refresh Rate Frequency with which live dashboards are updated. |
No information available | |
Audit-Ready Reports Reports configured to satisfy audit requirements. |
Audit-ready reporting is a compliance selling point for regulatory exams. | |
Case Productivity Metrics KPIs on team performance and case handling speed. |
No information available | |
Data Visualization Tools Built-in graphs, charts, and data visualization capabilities. |
Charts and visualizations for transaction history and risk signals are integrated. |
End-to-End Encryption All data encrypted at rest and in transit. |
Chainalysis states they use encryption at rest and in transit per security documentation. | |
Role-Based Access Control (RBAC) Policy-driven access restrictions based on employee roles. |
Supports RBAC for controlling employee access to sensitive data/workflows. | |
Multi-factor Authentication Requirement for multiple methods of identity verification. |
Multi-factor authentication is supported for admin and user logins. | |
Data Masking Automatic obfuscation of sensitive fields in UI and exports. |
Sensitive data such as wallet addresses can be masked in UI/exports. | |
Granular Audit Logs Detailed records of all data access and changes. |
Granular logs of user actions and system changes are available. | |
GDPR Compliance Features supporting General Data Protection Regulation requirements. |
Explicit statement of GDPR compliance for EU customers. | |
Data Deletion and Retention Automated procedures for retention and secure deletion of records. |
Provides configurable data retention and deletion policies for compliance. | |
Secure Data Export/Import Encrypted transfers of data during bulk export/import. |
Supports CSV imports/exports with secure, encrypted channels. | |
Penetration Testing Frequency How often the system undergoes security testing. |
No information available | |
Data Breach Notification Tools Capabilities to identify, report, and manage data breaches. |
Data breach monitoring and notification tools are described in security documentation. | |
Redaction Tools Built-in support for redacting sensitive data upon request. |
No information available |
Concurrent User Support Maximum number of simultaneously active users supported. |
No information available | |
Transaction Processing Speed Average time to process a compliance check on a transaction. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored natively. |
No information available | |
Uptime SLA Guaranteed system availability as a Service Level Agreement. |
No information available | |
Disaster Recovery Time Objective (RTO) Time required to restore systems following an outage. |
No information available | |
Elastic Compute Ability to dynamically allocate computing resources under load. |
No information available | |
Batch Processing Throughput Number of clients/transactions processed per batch. |
No information available | |
Latency Monitoring Tools for measuring and alerting on API/processing latency. |
No information available | |
Geographic Load Distribution Use of data centers in multiple regions for workload balancing. |
No information available | |
Auto-scaling Capabilities Automatic scaling of resources based on user or transaction volume. |
No information available |
24/7 Multichannel Support Availability of technical and compliance support at all hours via multiple channels. |
Provides 24/7 email and phone support per website. | |
Dedicated Account Manager Assignment of a named relationship manager for client queries. |
Named account managers are available for enterprise clients (see pricing/support page). | |
Onboarding & Training Services Provision of user onboarding and comprehensive training. |
Onboarding and training offered with initial setup as part of implementation. | |
SLAs for Issue Resolution Defined escalation paths and timeframes for issue resolution. |
SLA and issue escalation documented in enterprise agreements. | |
User Community Access Forums, events, and online communities for shared knowledge. |
Chainalysis maintains user community and online forums. | |
Comprehensive Documentation Up-to-date documentation, user guides, and FAQs. |
Has extensive technical and user-facing documentation. | |
Product Roadmap Transparency Visibility into upcoming features and planned improvements. |
Publishes product roadmap and update information for customers. | |
Change Management Support Guidance and tools for deploying updates and system changes. |
No information available | |
SLAs for System Uptime Service guarantees for application and API availability. |
No information available | |
Feature Request Process Formal mechanism for clients to request improvements. |
Has a mechanism in place for customers to request new features. |
Transparent Pricing Full disclosure of all fees, including setup, support, and maintenance. |
No information available | |
Modular Licensing Ability to license and pay for only required functions. |
Quoted and paid per feature/module (risk, exchanges, wallet screening, etc). | |
Scalable Pricing Tiers Pricing flexibility as business and usage scales. |
Pricing scales with transaction volume and usage. | |
Pay-per-use Model Option for consumption-based pricing. |
Pay-as-you-go options available for some API modules; see pricing page. | |
No Hidden Fees No undisclosed or unanticipated charges outside standard pricing. |
States that there are no hidden fees—all pricing is transparent and available from Chainalysis representatives. | |
Volume Discounts Discounted pricing for large numbers of users or transactions. |
Discounts available for high-volume transaction screening (negotiated for enterprise accounts). | |
Contract Flexibility Provisions for short, medium, or long-term contracts and renewal options. |
Annual and multi-year contracts available with flexible renewal. | |
Free Trial Availability Ability to try the software before committing financially. |
No information available | |
Implementation Fee Upfront costs for implementation and integration. |
No information available | |
Annual Maintenance Fee Yearly fee for updates and ongoing support. |
No information available |
Tools that facilitate Know Your Customer and Anti-Money Laundering compliance processes for treasury's financial counterparties.
More KYC/AML Compliance Systems
More Treasury Compliance ...
Document Verification Ability to scan, capture, and validate government-issued identification documents. |
Chainalysis KYT provides automated document and transaction screening, including cryptocurrency wallet verification, addressing regulatory requirements. | |
Liveness Detection Checks if the document presenter is a real, live person and not a static image or video. |
No information available | |
Biometric Matching Facial or fingerprint recognition for matching user with their presented documents. |
No information available | |
Automated Data Extraction Extracts key data from uploaded or scanned documents using OCR and AI. |
Chainalysis KYT supports automated extraction of key data from blockchain transactions and associated metadata. | |
Multi-language Support Supports identity documents issued in multiple languages. |
Chainalysis KYT is used globally and supports multiple document and cryptocurrency formats, implying multi-language and international document support. | |
Email Verification Validates counterparty email addresses as part of onboarding. |
No information available | |
Phone Number Verification Performs one-time password (OTP) or SMS verification of phone numbers. |
No information available | |
Sanctions List Screening Cross-checks individuals and entities against global and regional sanctions lists. |
Chainalysis KYT screens transactions and wallet addresses against sanctions lists relevant for digital assets compliance. | |
Watchlist Monitoring Continuously screens identities against third-party watchlists and blacklists. |
Ongoing monitoring of blockchain entities and transactions for new sanctions/watchlist ‘hits’ is a key offering of Chainalysis KYT. | |
Address Verification Checks and validates address data with postal services or third-party data sources. |
No information available | |
SSN/Tax ID Validation Verifies the social security number or tax identification numbers for authenticity. |
No information available | |
Custom Document Templates Supports custom templates for non-standard or region specific documents. |
No information available | |
Speed of Identity Checks Average time to complete identity verification. |
No information available | |
Accuracy Rate Success and accuracy rate of automated identity matching. |
No information available | |
Manual Review Escalation Allows cases to be escalated to human agents in ambiguous scenarios. |
No information available |
PEP Screening Screens counterparty against politically exposed person (PEP) databases. |
PEP database screening is typically incorporated for financial compliance products; Chainalysis integrates third-party PEP screening for exchanges and financial institutions. | |
Adverse Media Checks Scans news and media sources for negative mentions of counterparties. |
Product description details adverse media and investigation capabilities for entities flagged in blockchain compliance. | |
Continuous Monitoring Real-time or periodic monitoring for updated risk indicators. |
Chainalysis KYT supports continuous, real-time monitoring for updated risk and regulatory indicators. | |
Ultimate Beneficial Owner Identification Traces and verifies the ultimate beneficial owners (UBOs) behind corporate structures. |
No information available | |
Source of Funds Verification Checks the legitimacy and origin of funds supplied by counterparties. |
No information available | |
Geographic Risk Assessment Evaluates-counterparty risk based on country of registration or residence. |
Geographic risk of wallet source/destination and associated compliance risk is presented in the software UI and API. | |
Custom Risk Scoring Assigns and manages custom risk scores based on flexible criteria. |
Custom risk scoring is supported for user-defined scenarios in monitoring digital wallets and activities. | |
Transaction Pattern Analysis Identifies patterns of transactions that may indicate elevated AML risk. |
Chainalysis is known for its transaction pattern and anomaly detection for anti-money laundering in crypto flows. | |
High-Risk Activity Alerts Generates alerts when high-risk activities are detected. |
Product issues real-time alerts when high-risk activity is detected, as stated on the official site. | |
Number of Data Sources Total external and internal sources linked for enhanced due diligence. |
No information available | |
Custom Questionnaires Ability to generate and manage enhanced due diligence forms for high-risk clients. |
No information available | |
Audit Trail for EDD Actions Keeps a log of all actions and checks performed during enhanced due diligence. |
No information available | |
EDD Case Management Workflow tools for handling enhanced due diligence investigations. |
No information available | |
Risk Level Visualization Graphical displays of risk levels across the counterparty portfolio. |
Chainalysis provides dashboards for risk-level visualization, showing flagged entities and transactions. | |
Frequency of EDD Reviews How often enhanced due diligence is scheduled and performed. |
No information available |
Real-Time Monitoring System monitors transactions for suspicious activity in real time. |
Chainalysis KYT performs real-time monitoring and risk assessment for all incoming/outgoing transactions. | |
Rule-Based Alerts Configurable rules trigger alerts for transactions that meet risk criteria. |
Rules-based monitoring is a cornerstone; customers can configure alert logic for suspicious crypto fund flows. | |
Behavioral Analytics Analyzes transaction patterns against expected counterparty behaviour to detect anomalies. |
Chainalysis employs behavioral analytics to spot anomalous patterns in transaction behavior. | |
Machine Learning Integration Utilizes machine learning to improve detection of suspicious activities. |
Machine learning is used to improve fraud and risk alerts as explicitly described in product documentation. | |
Volume of Transactions Processed The maximum number of transactions monitored per hour. |
No information available | |
False Positive Rate Percentage of flagged transactions that are ultimately found to be compliant. |
No information available | |
Case Management for Alerts Integrated tools to investigate, escalate, and resolve flagged transactions. |
Case management features exist allowing for investigation/escalation of AML alerts. | |
SAR/STR Filing Automation Automates Suspicious Activity/Transaction Report generation and submission. |
SAR/STR (Suspicious Activity/Transaction Reporting) automation is a documented feature of Chainalysis KYT. | |
Threshold Customization Allows users to define thresholds for automatic alerting. |
Customized alert thresholds are configurable in Chainalysis for different risk appetites. | |
Batch Monitoring Supports scheduled or on-demand review of multiple transactions simultaneously. |
Batch monitoring is supported for large volumes of transactions/wallets. | |
Alert Prioritization Ranks alerts by severity to help compliance teams triage activity. |
Risk-based prioritization of AML alerts is implemented for compliance officers’ triage. | |
Geo-Fencing Detects transactions to or from regions with increased money laundering risk. |
Geographic risk/geo-fencing is included in transaction/flow anomaly logic. | |
Customizable Rule Library Administrators can author or edit monitoring rules for specific scenarios. |
Custom monitoring rules can be authored by clients for bespoke compliance scenarios. | |
Time to Assess Alerts Average time needed for compliance to review and clear alerts. |
No information available | |
Integration with External Databases Links with external fraud and AML databases for enhanced pattern recognition. |
Chainalysis offers integration with regulatory and third-party databases to improve AML detection. |
Automated Onboarding Workflows Orchestrates and automates the data collection and approval process. |
No information available | |
Pre-Built Forms & Templates Provides standardized forms and document request templates. |
No information available | |
Self-Service Portal Allows counterparties to upload documents and track onboarding status. |
No information available | |
Digital Signatures Securely incorporates e-signatures into onboarding workflows. |
No information available | |
Bulk Onboarding Enables onboarding of multiple counterparties simultaneously. |
No information available | |
Automated Data Validation Detects incomplete fields and validates information in real time. |
No information available | |
Onboarding Time Average time to complete onboarding using the system. |
No information available | |
Onboarding Status Tracking Real-time dashboard for tracking onboarding progress and bottlenecks. |
No information available | |
Reminder and Escalation Engine Automated reminders and escalations for incomplete onboarding steps. |
No information available | |
Role-Based Access Controls Granular access to onboarding modules based on user roles. |
No information available | |
Customizable Approval Flows Supports customized review and approval routing for different counterparty types. |
No information available | |
Audit Trail Maintains a log of all onboarding activities and changes. |
No information available | |
API for Onboarding Integration Enables integration of onboarding into wider treasury and ERP systems. |
Robust APIs are available for integrating KYT into other compliance and ERP systems. | |
Multi-Entity Support Allows onboarding processes across multiple legal entities within the corporation. |
No information available | |
Onboarding Completion Rate Percentage of counterparties completing onboarding successfully. |
No information available |
Access to Global Lists Includes OFAC, UN, EU and other major sanctions and embargoes lists. |
Chainalysis integrates with OFAC, UN, EU, and multiple global sanctions lists for digital assets. | |
Custom Watchlist Uploads Lets users maintain their own additional lists. |
Allows users to upload their own watchlists for custom screening, as per the product FAQ. | |
Automated List Updates Ensures screening is performed against the most current list data. |
Automatic and regular list updates for sanctions/watchlists confirmed by official support docs. | |
Batch Screening Screening of large files of counterparties or transactions at once. |
Batch screening of addresses/transactions is a documented Chainalysis feature. | |
List Update Frequency Frequency at which watchlist or sanctions lists are updated in the system. |
No information available | |
Fuzzy Matching Algorithms Can detect close or similar matches to alias names and alternate spellings. |
Sophisticated fuzzy matching for aliases and non-exact name screening is regularly cited in solution literature. | |
Hit Resolution Management Workflow to resolve potential matches or ‘hits’ efficiently. |
Workflow management for hit resolution is supported within the KYT UI. | |
Whitelisting Capabilities Ability to whitelist certain counterparties after review. |
No information available | |
List Coverage Scope Number of different lists integrated and monitored. |
No information available | |
Sanctions Screening SLAs Guaranteed maximum time for screening and returning results. |
No information available | |
Multi-jurisdictional List Support Coverage of lists from multiple global jurisdictions. |
Multi-jurisdictional support is available (OFAC, EU, UN, etc.), covering crypto’s cross-border risk. | |
OFAC 50% Rule Implementation Automated handling of the OFAC 50% rule on ownership/subsidiaries. |
Chainalysis automates OFAC 50% rule implementation for blockchain assets per solution documentation. | |
Screening Result Export Exports results of screenings to external formats or systems. |
Screening results can be exported via UI or API for further investigation or reporting. | |
Watchlist Alert Reporting Generates and sends reports on watchlist-related alerts. |
Generates standardized and ad hoc alerting reports, including watchlist details. | |
Custom Alert Thresholds Set organization-specific thresholds for alert generation during screening. |
No information available |
Automated Compliance Reports Generates regulatory reports as needed for KYC/AML compliance. |
Automated compliance reporting for AML/KYC including for VASPs, fund managers, etc. described in datasheets. | |
Regulator Submission Module Sends reports directly to regulators from within the platform. |
No information available | |
Customizable Report Templates Supports custom templates for country or jurisdiction-specific requirements. |
Supports customizable report templates for different jurisdictions, as per their compliance white papers. | |
Audit Trail Logging Maintains immutable logs of all compliance actions, accessible to auditors. |
All compliance actions/audits are logged, as per assurance and audit documentation. | |
Report Scheduling Allows scheduling of periodic compliance reports. |
Scheduled compliance reporting is available and can be customized via dashboard and API. | |
Report Versioning Tracks different versions and amendments to regulatory reports. |
No information available | |
Exception Reporting Generates special reports for exceptions or unresolved alerts. |
Exception and alert-based reports are part of standard regulatory and workflow reporting. | |
Time to Generate Reports Average time needed to compile and generate a compliance report. |
No information available | |
Automated Data Aggregation Aggregates data automatically from multiple modules for reporting. |
Aggregated data from all sources/modules is included for compliance and risk reporting. | |
Data Retention Controls Manages how long audit trails and reports are stored. |
No information available | |
Internal Audit Dashboards Dashboard tools designed for internal control and oversight. |
No information available | |
Compliance Certification Tracking Tracks and manages regulatory certifications and attestations. |
No information available | |
User Activity Logs Detailed logs on user activities within the compliance platform. |
User and system activity is logged and exportable; aids auditing functions. | |
Downloadable Report Archive Ability to access and export historical regulatory reports. |
Download and export of regulatory and risk reports is supported. | |
Report Error Rate The frequency of reported errors or rejections by regulators. |
No information available |
Case Creation Automation Automatically generates cases when alerts are triggered. |
Case creation is automated on alert for further review and escalation. | |
Task Assignment Engine Assigns investigation tasks to staff based on workload and expertise. |
No information available | |
Escalation Rules Rules-based escalation paths for unresolved or critical cases. |
No information available | |
Collaboration Tools Integrated messaging or note-taking for investigation teams. |
No information available | |
Case Closure Metrics Tracks average time-to-close for compliance cases. |
No information available | |
Document Attachment for Cases Attach evidence and documents directly to specific cases. |
No information available | |
Case Status Dashboard Visual dashboard for monitoring open and closed cases. |
Dashboard for cases and alert status is readily available, as per solution screenshots. | |
Automated Reminders for Open Cases System-generated reminders for pending case actions. |
Automated reminders and escalation processes are provided for aged or unresolved investigations. | |
Case Notes History Full history of notes, decisions, and actions on each case. |
No information available | |
Custom Workflow Configuration Ability to tailor workflows to organizational policies. |
Workflow customization for different asset types or jurisdictions exists. | |
Case Prioritization Ability to rank and view cases by severity and urgency. |
No information available | |
User Assignment Tracking Track who is assigned to each compliance case. |
No information available | |
Automated Escalation Triggers Automatically escalates cases based on defined risk and time parameters. |
Automated escalation based on risk/timing noted in case management documentation. | |
Closed Case Archiving Automatically archives closed cases and provides controlled access. |
No information available | |
Exportable Case Logs Enables exporting complete case histories for audit or review. |
No information available |
Open API Availability Offers open APIs for embedding compliance modules into treasury workflows. |
Chainalysis provides open APIs for KYT module integration. | |
Pre-Built ERP Integrations Native integrations with common ERP, TMS and banking platforms. |
Integration options for ERPs and financial platforms (e.g. Oracle, SAP, TMS) are documented. | |
Bulk Import/Export Handles large batch data transfers from other systems. |
No information available | |
Real-Time Data Syncing Ensures data is consistently updated across integrated systems. |
Real-time data sync across partner and internal systems is a promoted capability. | |
Custom Data Mapping Allows mapping of external data fields into system formats. |
No information available | |
Data Format Support Supports major data formats such as CSV, XML, JSON, and XLSX. |
System supports import/export in standard formats like CSV, JSON, and Excel. | |
Direct Bank Feeds Receives real-time data direct from banking partners. |
Direct bank feed equivalency is real-time blockchain feed for wallets. | |
Number of Supported Integrations Count of external services natively supported. |
No information available | |
Webhooks Support Triggers or receives webhook-based events for data updates. |
No information available | |
Data Encryption During Transfer Secures all inter-system data with strong encryption protocols. |
All system data exchanges are protected with strong encryption as per compliance page. | |
Automated Data Cleansing Cleanse and de-duplicate data on import. |
No information available | |
Change Tracking Tracks changes to critical data fields across integrations. |
Chainalysis tracks all sensitive changes as part of its audit and compliance guarantees. | |
Integration Health Monitoring Monitors ongoing status and latency of all data feeds. |
No information available | |
Partner API Connectivity Direct API integrations with regulatory or vendor APIs. |
API integrations with regulatory, banking, and monitoring partners are available. | |
Data Transfer Speed Average speed of data upload/download during integration. |
No information available |
End-to-End Encryption Data is fully encrypted at rest and in transit. |
End-to-end encryption (in motion and at rest) is specifically promised for compliance data. | |
Multi-Factor Authentication Supports 2FA or MFA for access to system modules. |
2FA and/or multi-factor authentication for privileged access is a standard feature. | |
Data Masking Masks sensitive fields in interfaces and exports. |
Data masking is mentioned in compliance architecture for sensitive fields. | |
Role-Based Data Access Restricts sensitive data to only authorized users. |
RBAC and granular access controls are implemented for data privacy. | |
Compliance with Data Regulations Adheres to GDPR, CCPA, and other relevant jurisdictions’ requirements. |
Chainalysis states compliance with GDPR and other regulatory frameworks as a differentiator. | |
Regular Penetration Testing Frequency of scheduled penetration and vulnerability tests. |
No information available | |
Security Incident Response Built-in procedures and alerting for possible breaches. |
Alerting and response to possible security incidents is provided and emphasized for regulators. | |
Audit Log Integrity Audit logs are tamper-evident and protected from changes. |
Audit log tamper-resistance and change tracking is standard per product whitepaper. | |
Data Residency Controls Configurable regional storage for data compliance. |
No information available | |
Automated Data Deletion Supports policy-driven erasure after data retention periods. |
No information available | |
User Password Policy Enforcement Administrators can define minimum password complexity and rotation cycles. |
User password policies with customizable complexity are mentioned for enterprise accounts. | |
Secure API Authentication Strong authentication protocols for system APIs. |
Chainalysis API endpoints use modern secure authentication protocols. | |
Activity Monitoring Continuous monitoring for anomalous user and system activity. |
Monitoring for anomalous user and system activity is core to suspicious activity detection. | |
Data Backup Frequency Automated backup schedule for all data assets. |
No information available | |
Encryption Key Management Management and auditing of encryption keys. |
No information available |
Modern User Interface Intuitive and user-friendly dashboards and navigation. |
UI is modern and designed for compliance teams, as seen in product screenshots and reviews. | |
Accessibility Features Supports screen readers and keyboard navigation per WCAG standards. |
No information available | |
Mobile Accessibility Responsive design for mobile devices and tablets. |
Responsive, accessible web app for mobile and desktop per marketing and user feedback. | |
Customizable Views Users can personalize dashboards and data layouts. |
No information available | |
Context-Sensitive Help In-app help guides and tooltips for complex tasks. |
No information available | |
Localization/Language Packs Multi-language support for international teams. |
Localization/language pack documentation exists for global corporate use. | |
Training Mode/Sandbox Sandbox environment for training or testing scenarios. |
No information available | |
Fast Load Time Average system dashboard and page load speed. |
No information available | |
Notification Center Aggregated display of system alerts, messages, and updates. |
No information available | |
Task Shortcut Keys Keyboard shortcuts for frequent compliance operations. |
No information available | |
User Custom Reports End-users can design and save custom report layouts. |
No information available | |
Bulk Action Tools Perform actions (approvals, rejections, reviews) on multiple records at once. |
No information available | |
Multi-Session Support Enables users to work across multiple open sessions securely. |
Multiple simultaneous sessions are permitted for enterprise users. | |
Notification Frequency Settings Users can customize frequency of system updates and notifications. |
No information available | |
Single Sign-On (SSO) Supports authentication via SSO providers for corporate access. |
Single sign-on (SSO) is supported for large enterprise clients. |
Custom Report Builder Enables self-service creation of comprehensive KYC/AML reports. |
Custom reporting builder in dashboard is a core differentiator for advanced compliance. | |
Automated Dashboards Real-time dashboards for risk indicators and compliance metrics. |
Dashboards update in real time as new blockchain data is processed. | |
Drill-Down Analytics Investigate anomalies down to individual transaction or client level. |
Users can drill down to individual transaction/entity for detailed investigation. | |
Scheduled Report Delivery Automatic periodic delivery of reports to designated users. |
Scheduled and automated delivery of compliance and risk reports is available. | |
Ad hoc Query Support On-the-fly queries for advanced analysis or investigation. |
Ad hoc search and investigation tools are provided within the platform. | |
Visualization Tools Charts, heatmaps, and graphs for trend and risk analysis. |
Charts and graphs of risk, transaction volumes, and trends feature in analytics suite. | |
Export to Common Formats Exports reports to PDF, Excel, CSV and other common data formats. |
Exports to PDF, Excel, CSV, and JSON are documented for compliance reports. | |
Report Scheduling Flexibility Allows custom and recurring schedule intervals for reports. |
Schedule flexibility for automated and recurring reporting is provided in the product admin. | |
Real-Time Data Access Reports leverage up-to-the-minute data from across system modules. |
Dashboards and reports offer real-time view for transaction and entity risk. | |
Graphical Risk Scoring Visualizes risk levels for entities, transactions or portfolios. |
Chainalysis visualizes risk scores for cryptocurrency transactions/entities. | |
Historical Data Analysis Supports trending and analysis of historical compliance data. |
Platform supports searching and trend analysis over historical blockchain and compliance data. | |
User Activity Reports Analyze system user actions for operational insight or suspicious behaviour. |
User activity analysis available for management and internal controls. | |
Pre-Built Compliance KPIs Standard KPIs for regulatory and internal management reporting. |
Standard set of compliance KPIs pre-configured, per documentation. | |
Custom KPI Definition Users can define unique compliance KPIs for reporting. |
KPIs and reporting tools allow custom metrics for organizations. | |
Alert Trend Analytics Monitors frequency and nature of alerts over time. |
Alert analytics monitor incidence and trends over time. |
Solutions that continuously monitor treasury activities against defined compliance rules and thresholds, generating alerts for potential violations.
More Compliance Monitoring Tools
More Treasury Compliance ...
Real-Time Monitoring Ability to monitor transactions and treasury activities in real-time. |
Chainalysis KYT is purpose-built for real-time monitoring of cryptocurrency transactions for suspicious or high-risk activity. | |
Rule-Based Engine Configurable engine to define, manage, and update compliance rules. |
KYT offers configurable rules and detection scenarios to define risk conditions. | |
Automated Violation Detection System automatically detects and flags activities that breach compliance rules. |
Chainalysis KYT automatically detects and flags risky or possibly illicit transactions. | |
Coverage Breadth Number of treasury domains or modules under monitoring (e.g., payments, investments, FX, liquidity). |
No information available | |
Multi-Regulation Support Ability to support and update multiple regulatory regimes (e.g., SOX, Dodd-Frank, EMIR, GDPR). |
Supports multiple regulatory frameworks (FATF, BSA/AML, EU requirements, etc.) relevant to digital assets. | |
Threshold Sensitivity Granularity by which thresholds or limits can be defined for compliance alerts. |
No information available | |
Frequency of Checks Interval at which compliance checks are performed. |
No information available | |
Historical Data Analysis Can the system analyze past activity for compliance reviews? |
Platform supports search, filters, and analysis of historical transaction data at any time. | |
Batch vs. Continuous Monitoring Allows switching or combining periodic and real-time monitoring options. |
Clients can use both real-time and batch/periodic analysis as needed. | |
Audit Trail Generation Maintains immutable records of compliance events and monitoring activities. |
Immutable logs and audit trails of monitoring activities and risk events are maintained. | |
Exception Handling Mechanisms for managing, escalating, and resolving exceptions and false positives. |
The platform provides escalation flows and resolution options for exceptions and false positives. | |
Data Integrity Verification Ensures the monitored data is complete, consistent, and accurate. |
Ongoing data integrity checks and reconciliations are core to Chainalysis' proposition. | |
Alert Prioritization Ability to rank and prioritize alerts based on criticality and impact. |
Alerts are ranked and prioritized by risk typology and severity. |
Multi-Channel Alerting Can send alerts via email, SMS, dashboards, or push notifications. |
KYT supports alerting via email and dashboard and can integrate with other notification channels via API. | |
Customizable Alert Templates Users can configure the content and format of compliance alerts. |
Alert templates can be customized for recipient group and event type. | |
Escalation Workflows Automated workflows to escalate unresolved or critical compliance violations. |
Includes automation for escalating unresolved or severe risk alerts. | |
Alert Acknowledgement Tracking Tracks user responses and acknowledgements for each alert. |
The system logs alert acknowledgements and actions taken. | |
Alert Resolution Time Average time to acknowledge and resolve compliance alerts. |
No information available | |
Severity Level Classification Allows classification of alerts by severity (e.g., Low, Medium, High, Critical). |
Severity labels (High, Medium, Low) are assigned to detected risks and alerts. | |
Audit Logging of Alerts Maintains an audit trail for alerts sent, received, and acted upon. |
KYT documents all alerts, actions, and audit logs for compliance review. | |
Repeat Notification Thresholds Configurable settings for repeated notifications/escalations if alerts remain unresolved. |
Repeat and escalation notifications are supported via custom workflow configurations. | |
Alert Analytics & Dashboard Visualization and reporting of alert history, trends, and statuses. |
Dashboards provide analytics on alert frequency and risk trends. | |
Integration with Incident Management Can connect with external incident or case management systems. |
The platform offers APIs to synchronize with external incident/case management tools. | |
User-specific Notification Preferences Supports user-defined preferences for receiving alerts. |
User profiles can be set to receive personalized notifications. |
On-demand Report Generation Users can generate compliance reports at any time. |
Reports can be generated and exported on-demand. | |
Scheduled Reporting Automates the production and distribution of recurring compliance reports. |
Compliance reports distribution can be scheduled. | |
Custom Report Builder Enables users to create custom reports tailored to specific requirements. |
Offers custom report creation with filters, parameters, and templates. | |
Visualization Tools Dashboards and charts to visualize compliance trends and KPIs. |
Provides dashboards, trend charts, and visualizations for compliance activities. | |
Export Capabilities Supports exporting reports in multiple formats (PDF, Excel, CSV, etc.). |
Reports are exportable as CSV, PDF, and Excel files. | |
Automated Distribution Ability to automatically distribute reports to defined recipients. |
Automated report delivery to designated recipients supported with scheduling. | |
Access Controls for Reports Supports user-level permissions for viewing or modifying reports. |
Role-based controls for report access are included in user management. | |
Drill-down and Filtering Users can drill down into detailed data and filter by parameters. |
Reports/data can be drilled down by entity, address, currency, etc. | |
Historical Comparisons Report tools allow comparison of compliance performance over time. |
Historical report comparisons available for compliance over time. | |
Exception Reporting Automated highlighting of outlier or exception events. |
Exceptions and outliers are automatically highlighted and reported. |
Role-Based Access Control (RBAC) System restricts access based on user roles and permissions. |
Role-based access is a standard security feature. | |
Single Sign-On (SSO) Integration with identity providers for seamless and secure authentication. |
Single sign-on is supported for enterprise clients. | |
Multi-factor Authentication (MFA) Provides multi-level user authentication for enhanced security. |
MFA is supported for all users to enhance security. | |
Activity Logging Records all user actions and sessions for forensic and audit purposes. |
System tracks all user actions for forensic/audit trail. | |
Data Encryption (In-Transit/At-Rest) Protects sensitive treasury and compliance data via encryption. |
Encryption of data at rest and in transit is a requirement for crypto compliance, implemented by KYT. | |
User Provisioning/De-provisioning Automated management of user access throughout employment. |
User access/roles managed; supports provisioning and de-provisioning. | |
Password Policy Enforcement System enforces complexity, expiration, and change policies for passwords. |
Enforces password complexity and change policy. | |
Session Timeout Automatic logout after a set period of inactivity. |
No information available | |
Access Audit Reports Ability to generate reports on system access and user activity. |
Ability to generate audit/access reports is standard. |
API Availability Standard APIs for seamless integration with internal or external systems. |
APIs provided for integration with external/internal workflows. | |
ERP/TMS Integration Ability to integrate directly with ERP or Treasury Management Systems. |
Platform advertises direct integration with ERP and TMS solutions via API. | |
Real-Time Data Feeds Supports live data connectivity to and from other systems. |
Live blockchain data feeds are one of the core features. | |
Bank Data Integration Connects with banks for real-time bank statement monitoring. |
Direct bank integrations not typical, but exchange and wallet integrations offer bank-like visibility. | |
Third-party Data Source Support Integrates data from external regulatory or reference sources. |
Can integrate with external regulatory/reference data (sanction lists, watchlists). | |
Custom File Import/Export Permits bi-directional data flows with custom file formats. |
Allows import/export in CSV and custom formats; bi-directional file/data interop. | |
Integration Support for Cloud Platforms Can connect with cloud-based apps/services (e.g., Azure, AWS, GCP). |
Supports major cloud integrations (AWS, Azure and others listed in documentation). | |
Number of Supported Integrations Number of unique external systems integrated. |
No information available | |
Data Synchronization Frequency Interval at which data is synchronized with connected systems. |
No information available |
Custom Rule Authoring Users can define their own compliance conditions and thresholds. |
Allows users to define custom risk and compliance rules. | |
Dynamic Thresholds Thresholds can be set to auto-adjust based on treasury context or risk profile. |
No information available | |
Localization/Internationalization System supports multiple languages and regional compliance requirements. |
No information available | |
Reporting Customization Allows users to customize layout and content of compliance reports. |
Report content and layout customization is available. | |
Custom Workflow Configuration Administrators can design and implement bespoke compliance workflows. |
Custom workflows for compliance processes are supported via integrations. | |
User Interface Personalization Options to personalize dashboards, views, and alert settings. |
No information available | |
Configurable Alert Triggers Users may set triggers for alerts based on a variety of attributes. |
User-configurable alert triggers (amount, typology, entity) are a standard feature. | |
Delegation/Approval Workflows Enables delegation or multi-step approvals for compliance processes. |
No information available | |
Template Management Pre-built and editable templates for compliance documentation. |
No information available |
Automated Regulatory Updates System updates compliance rules for new or amended regulations automatically. |
Chainalysis offers automated regulatory content and rule updates for new risk typologies. | |
Regulatory Library Integrated repository of applicable laws, rules, and guidance. |
Library of international AML, KYC, and digital asset compliance resources available. | |
Multi-jurisdiction Support Handles compliance across multiple countries or regions. |
Global scope includes regulations across US, EU, APAC, and other regions. | |
Regulatory Gap Analysis Automated gap analysis as rules/policies change. |
No information available | |
Compliance Calendar Tracks key regulatory deadlines and review dates. |
No information available | |
Policy Document Management Centralized storage and versioning of compliance policy documents. |
Central repository for AML/compliance/transaction monitoring policies is included. | |
Attestation Management Manages user attestations acknowledging compliance policies. |
No information available | |
Regulatory Impact Assessment Assesses how new rules will affect current compliance programs. |
No information available | |
Update Notification Mechanism Notifies relevant users of regulatory or policy updates promptly. |
Change notifications and regulatory update messages sent to users. |
Risk Scoring Assigns and updates risk scores for compliance events or violations. |
Risk scoring applied to transactions and flagged entities based on typology and context. | |
Integration with Risk Register Compliance violations can be pushed directly to corporate risk registers. |
Compliance violations can be routed to risk/regulatory management platforms. | |
Scenario Analysis Enables modeling of compliance breaches and their impacts. |
Scenario/simulation of potential risk and compliance breaches available for assessment. | |
KRI Monitoring Monitors key risk indicators in parallel with compliance rules. |
Monitoring of key risk indicators (e.g., velocity, size, destination of transactions) is standard. | |
Compliance-Risk Mapping Maps compliance policies to organizational risk categories. |
Compliance risk events mapped to buckets/categories for easy reporting. | |
Automated Risk Mitigation Guidance Provides inline suggestions or protocols to mitigate flagged risks. |
No information available | |
Management Dashboard Unified dashboard to view both risk and compliance status. |
Management dashboards include combined compliance-risk status views. | |
Incident Response Playbooks Embedded best practice guides for responding to compliance incidents. |
No information available | |
Early Warning Indicators Features to set up early warning signals based on risk trends. |
No information available |
Concurrent User Support Number of users who can use the compliance system simultaneously. |
No information available | |
Transaction Processing Rate Number of transactions or activities the system can monitor per second. |
No information available | |
Maximum Alert Volume Number of compliance alerts the system can handle without performance degradation. |
No information available | |
System Uptime Percentage of time the compliance monitoring system is operational. |
No information available | |
Data Retention Capacity Max period the system retains historical compliance data. |
No information available | |
Geographical Redundancy Supports deployment across multiple geographies/data centers for resilience. |
No information available | |
Disaster Recovery Capability System has built-in disaster recovery features with quick failover. |
No information available | |
Elastic Resource Scaling Ability to auto-scale resources during peaks in activity. |
No information available |
Intuitive Dashboard Interface Clean, user-friendly dashboards to monitor compliance status and actions. |
Modern web UI with intuitive dashboards and quick navigation. | |
Mobile Device Compatibility Compliance system is accessible from mobile devices and tablets. |
KYT is accessible from mobile web browsers. | |
Accessibility Standard Compliance Meets accessibility guidelines for users with disabilities (e.g. WCAG 2.1). |
No information available | |
In-app Guidance Provides contextual help and tooltips within the application. |
On-screen help and contextual tooltips are provided throughout. | |
Global Search Functionality Allows users to search across all compliance data and rules. |
Global search of all transactions, wallets, and entities is a built-in feature. | |
Task Automation Features Automates repetitive monitoring or reporting tasks for end users. |
Routine compliance and reporting tasks can be automated via policy and API. | |
Multi-language Support User interface available in multiple languages. |
User interface available in English and other languages per documentation. | |
Self-service Knowledge Base Online guides, FAQs, and documentation for users. |
Hosted knowledge base and documentation available through Chainalysis website. | |
Onboarding and Training Tools Features for new user onboarding and ongoing training within the tool. |
Onboarding/training materials and guided product walkthroughs are provided. |
Automated Evidence Collection Automatically gathers supporting evidence for compliance monitoring activities. |
Evidence of compliance review is packaged and associated with monitoring activities automatically. | |
Centralized Audit Documentation Repository A central place for storing and retrieving all audit documents and evidence. |
Central document/evidence repository is a feature aimed at audit and compliance professionals. | |
Audit Log Integrity Controls Tools to ensure audit logs are tamper-proof and verifiable. |
Audit logs are cryptographically signed or otherwise verified for tamper-evidence. | |
Access-Based Audit Views Audit reports and evidence are accessible only to authorized users. |
Access rights assigned to audit/evidence documents by user or team role. | |
Automated Audit Trail Reporting On-demand reports showing full history of compliance actions and user activity. |
Audit trail reporting can be generated for compliance, with full user/event record. | |
Third-party Auditor Access Temporary, controlled access for external auditors. |
No information available | |
Audit Timeline Visualization Tools to visually review chronological sequences of compliance events. |
No information available | |
Evidence Version Control Maintains historical versions of audit evidence and documentation. |
No information available |
Systems for screening clients against watchlists, monitoring transactions for suspicious activity, and maintaining regulatory compliance documentation.
More AML/KYC Compliance Software
More Compliance ...
Identity Document Verification Ability to verify government-issued identity documents (passports, national IDs, etc.) electronically. |
Not as far as we are aware.* Chainalysis KYT focuses on transaction-level monitoring rather than ID document verification; document KYC is not core. | |
Facial Recognition/Matching Matches client-provided photos with ID documents using facial recognition technology. |
No information available | |
Sanction List Screening Checks clients against global and local sanction, PEP, and watchlists. |
Product monitors wallets and entities against international sanction and watchlists for cryptocurrencies. | |
Adverse Media Screening Searches for negative news related to clients using media and public data sources. |
Chainalysis provides adverse media screening for named blockchain addresses and entities as part of risk profiles. | |
Ongoing Customer Monitoring Continuously screens existing clients for changes in status or newly published risks. |
The product provides ongoing, real-time monitoring of transactions and related parties for new threats or risks. | |
Risk Scoring Engine Assigns dynamic risk scores to clients based on risk factors and behaviors. |
It assigns risk scores to blockchain wallets and transactions based on behavior and typologies. | |
Regulatory Jurisdiction Coverage Number of countries or jurisdictions supported for compliance checks. |
No information available | |
Language Support Number of languages supported for global client onboarding and screening. |
No information available | |
Enhanced Due Diligence Handling Supports additional data collection and review for high risk clients. |
Product allows for enhanced due diligence on high risk wallets/entities via enriched profiles and investigation tools. | |
Batch Processing Capability Ability to process multiple client screenings at once. |
No information available | |
Customizable Screening Criteria Allows modification of threshold and parameters for screening rules. |
Chainalysis KYT allows configuration of risk thresholds and scenario alerts for compliance teams. |
Real-Time Transaction Monitoring Automatically scans transactions for suspicious patterns as they occur. |
Provides real-time monitoring of all cryptocurrency transactions passing through clients' platforms. | |
Behavioral Pattern Detection Uses profiling and analytics to detect unusual or unexpected patterns. |
Uses analytics and typology detection to surface behavioral anomalies and patterns in crypto flows. | |
Rule-Based Alert System Configurable rules trigger alerts for pre-defined risk scenarios. |
Configurable rule-based alerts for suspicious or high-risk transaction scenarios are documented features. | |
Machine Learning/AI Analytics Employs AI models to detect previously unknown or emerging risks. |
Machine learning and analytics are highlighted for improved detection of unknown money laundering typologies. | |
Alert Prioritization Ranks alerts based on severity and risk relevance for efficient case handling. |
Alerts are prioritized and push the highest risk flags to analyst dashboards for review. | |
False Positive Management System features to reduce unnecessary alerts and streamline review. |
Chainalysis advertises features for reducing false positives via tuning and feedback loops. | |
Volume Handling Capacity Maximum number of transactions monitored per second. |
No information available | |
Integration with Trade/Order Systems Direct connection to brokerage trade/order platforms for seamless monitoring. |
Product offers APIs for integration with crypto trading systems and operational platforms. | |
Peer Group Analysis Compares client behavior against similar client group averages. |
Peer group and typology analysis is used to compare transaction behavior to the broader ecosystem. | |
Historical Data Analysis Supports backtesting and review of historical transactions for compliance audits. |
Product supports historical blockchain analysis, including backtesting of previous transactions. | |
Automated Case Escalation Automatically escalates suspicious cases for compliance officer review. |
No information available |
Integrated Global Lists Supports all major regulatory and financial watchlists (OFAC, EU, UN, etc.). |
Integration with all major global watchlists and PEP lists for crypto entities is a documented feature. | |
Custom List Support Allows firms to upload and manage their own internal or regional watchlists. |
No information available | |
Automated List Updates Regularly and automatically fetches the latest list changes. |
Automated syncing of sanction and risk lists as part of the continuous monitoring core. | |
Version Control Tracks list changes and maintains history for audit purposes. |
No information available | |
List Capacity Maximum number of entries supported per watchlist. |
No information available | |
Fuzzy Matching Algorithms Detects similar names or entities with variable spellings. |
No information available | |
Alias Handling Supports multiple aliases/names for the same person or entity. |
No information available | |
Bulk List Import/Export Allows batch file management for lists. |
No information available | |
Automated Screening Scheduling Configurable schedules for periodic screening runs. |
No information available | |
Geo-Restriction Handling Manages restricted or high-risk regions and jurisdictions. |
Product manages jurisdictional risk, geo-restrictions, and exposure to high-risk crypto sources. |
Integrated Case File Creation Automatically creates case files upon detection of alerts or suspicious activities. |
Automatic case file generation triggered by alert or suspicious transaction detection. | |
Investigation Workflow Engine Guided process for analysts through investigation, review, and resolution steps. |
Case management embedded for review, workflow, notes, and escalation within the UI. | |
Audit Trail Logging Maintains detailed logs of all actions taken on a case for compliance. |
System tracks all case actions for audit and compliance. | |
Automated Regulatory Filing Generates and submits regulatory reports (e.g., SAR/STR) in the required formats. |
No information available | |
Role-Based Access Control Restricts and manages access to cases based on user roles or responsibilities. |
Features include user roles and granular access for case and workflow management. | |
Escalation and Reassignment Supports multi-level escalation and assignment of cases. |
Multi-level escalation and reassignment in workflows described in documentation. | |
Case Review SLAs Tracks and enforces service-level agreements for case review duration. |
No information available | |
Document Storage Capacity Maximum storage allocated per case for supporting documents. |
No information available | |
Automated Case Notification Notifies relevant users upon updates, assignment, or need for action. |
Email and in-app notifications for updates, actions, and escalations are included. | |
Case Linking and Relationship Mapping Connects related cases or associates individuals/entities across cases. |
Case linking tools associate related wallets, transactions, and entities. |
Pre-Built Regulatory Report Templates Includes standard report formats required by regulators (e.g., SAR, CTR, STR, KYC logs). |
Standard regulatory templates (SAR/STR) for crypto regulatory reporting included. | |
Custom Report Builder Enables users to design bespoke compliance reports. |
Supports custom report generation for compliance and management. | |
Automated Scheduled Reporting Systematically delivers compliance reports at defined intervals. |
Automated scheduling for periodic and ad-hoc compliance report delivery available. | |
Regulatory Data Retention Period Number of years for which compliance data is retained. |
No information available | |
E-Filing Integration Supports direct submissions via regulatory authority electronic channels. |
No information available | |
Multi-Jurisdictional Compliance Built-in features for different global regulatory regimes. |
System cited as capable of supporting compliance across multiple jurisdictions. | |
Audit Readiness Toolkit Compilation of tools and logs enabling rapid response to audits. |
No information available | |
Data Anonymization/Redaction Ability to redact or anonymize sensitive customer information in reports. |
Redaction and anonymization are standard features to comply with various privacy laws. | |
Custom Regulatory Mapping Supports mapping of new or changing regulatory requirements. |
No information available | |
Compliance Attestation Support Module for documentation and certification of compliance by officers. |
No information available |
API Access and Documentation Provides detailed APIs for integration with proprietary or third-party systems. |
API access and published API documentation is available for integration. | |
Batch Data Import/Export Handles large data sets for bulk upload or download operations. |
Batch import/export for wallet addresses, entities, transaction data supported. | |
Real-Time Data Feeds Supports consumption/production of streaming financial or compliance data. |
System supports real-time data feeds from blockchains and partners. | |
Third-Party Data Provider Integration Easy integration with external KYC/AML data sources, credit bureaus, etc. |
Integrates with third-party identity and data providers for richer compliance signals. | |
Compatibility with Core Banking Systems Designed for easy adoption by common brokerage and core financial platforms. |
No information available | |
Customizable Webhooks Triggers actions in other systems upon specific compliance events. |
No information available | |
SSO and Identity Provider Support Integrates with identity management and SSO for organizational identity control. |
Chainalysis KYT provides SSO integration (Okta, SAML) for enterprise identity. | |
Plugin/Extension Support Can be extended with add-ons for specific compliance needs. |
No information available | |
Connector Library Size Number of pre-built connectors to standard systems/platforms. |
No information available | |
Legacy System Support Compatible with non-modern or legacy brokerage infrastructures. |
No information available |
Customizable Dashboards Personalized views for compliance officers, executives, or investigators. |
System allows dashboard customization for compliance teams. | |
Mobile Accessibility Access to key features via mobile apps or responsive web interfaces. |
Responsive web interface works on mobile devices; dedicated app not mentioned. | |
User Workflow Automation Guided flows minimizing manual inputs in common compliance activities. |
Compliance workflows are embedded, minimizing manual intervention. | |
Search and Filtering Tools Advanced tools for rapid data retrieval and case filtering. |
Advanced search, filtering, case sorting, and data drill-down tools available. | |
Bulk Action Tools Support for batch processing and bulk updates. |
Bulk actions supported for mass updates of flagged addresses/entities. | |
Multi-Language UI User interface offered in multiple languages. |
No information available | |
Accessibility Compliance Meets accessibility standards such as WCAG for user inclusivity. |
No information available | |
User Training and Help Center Built-in education modules and real-time assistance features. |
Online help center and training materials for product usage and support. | |
Custom User Roles Tailorable user permissions for granular security and workflow management. |
Custom user roles and permissions model is available in enterprise plans. | |
Performance/Load Times Average time taken for the UI to load main dashboards. |
No information available |
Data Encryption In Transit/At Rest Encrypts all sensitive data both in motion and when stored. |
Chainalysis encrypts data in transit and at rest; security section on web confirms. | |
Multi-Factor Authentication Requires multiple authentication factors for system access. |
Multi-factor authentication required by default for user accounts. | |
Access Logging and Monitoring Extensive logs of all user access and administrative actions. |
Comprehensive access and usage logging for monitoring and compliance. | |
Penetration Testing Frequency How often the system undergoes external security assessment. |
No information available | |
Data Residency Options Supports choice of specific regions/countries for data storage. |
Data residency selectable for US/EU regions according to compliance requirements. | |
Compliance with Industry Standards Adheres to standards such as ISO 27001, PCI DSS, GDPR. |
Chainalysis KYT is SOC 2, ISO 27001, and GDPR compliant. | |
User Session Time-Outs Automatic log-off after a period of inactivity. |
Session time-outs are enforced for web and mobile interfaces. | |
Field-Level Data Masking Sensitive fields can be masked or hidden from unauthorized users. |
Sensitive field masking included for compliance with user access rules. | |
Secure Audit Log Storage Ensures immutability and backup of critical audit logs. |
No information available | |
Incident Response Procedures Documented processes for breach detection and notification. |
Incident response and notification flows documented for breach scenarios. |
Concurrent User Limit Maximum number of users supported simultaneously. |
No information available | |
Transaction Processing Latency Average time to process and analyze a single transaction. |
No information available | |
Uptime/Availability SLA Guaranteed system availability often expressed as a percentage. |
No information available | |
Data Ingestion Rate Speed at which system can ingest new compliance data. |
No information available | |
Horizontal Scaling Support System supports scaling across servers/nodes to accommodate growth. |
Runs on AWS/GCP with auto-scaling and horizontal expansion for performance needs. | |
Performance Monitoring Tools Built-in dashboards and alerts on system performance metrics. |
System includes health monitoring, dashboards, and service alerting. | |
Cloud Deployment Option System can be deployed as a cloud (SaaS) or hybrid solution. |
Product available as a fully managed SaaS (cloud) or hybrid. | |
On-Premise Deployment Option Supports local/internal hosting for sensitive or regulated data. |
Not as far as we are aware.* On-premise deployment is not a supported model as per public documentation. | |
Disaster Recovery RTO Recovery Time Objective in case of system outage. |
No information available | |
Database Size Limit Maximum database size supported without performance loss. |
No information available |
24/7 Support Availability Round-the-clock access to technical and compliance support. |
24/7 global support included for enterprise clients. | |
Dedicated Account Manager Single point of contact for service and issue escalation. |
No information available | |
Self-Service Knowledge Base Extensive library of documentation, FAQs, and training material. |
Comprehensive self-service knowledgebase for clients. | |
Regular System Updates Frequency of non-disruptive security, functionality and rule updates. |
No information available | |
Custom SLA Options Ability to define support levels and response times contractually. |
Custom SLAs available on enterprise contracts. | |
Uptime Guarantee Contractual uptime guarantee for system operation. |
No information available | |
Automated Backup Scheduling Scheduled, automated backups of all system and client data. |
Daily automated backup schedules detailed in compliance policy. | |
Patch Management Tools Automation of system security patching and compliance rule changes. |
No information available | |
User Feedback Loop Mechanisms for users to submit feedback and feature requests. |
System provides user feedback functionality for product improvements. | |
Multi-Tier Support Levels Choose from basic to premium support plans based on needs. |
Standard, advanced, and premium support tiers available. |
Transparent Pricing Model Clearly published and predictable licensing or usage costs. |
Pricing structure is transparent on the website and through quotes. | |
Pay-As-You-Go Option Usage-based billing for modular feature access. |
Pay-as-you-go billing option available for API-based usage. | |
Volume Discounts Available Lower per-unit pricing as transaction or client count increases. |
No information available | |
Free Trial/POC Period for free evaluation or proof of concept. |
Free evaluation and trial provided to institutional clients. | |
Feature-Based Licensing Modular pricing per individual function/module. |
No information available | |
Perpetual License Option Option to purchase software outright rather than as a subscription. |
No information available | |
Annual Billing Option Discounted pricing for annual upfront payment. |
No information available | |
Multi-Entity Licensing Special terms for multi-subsidiary or group licensing. |
No information available | |
Seat/User License Cap Maximum number of named users included without additional charges. |
No information available | |
Additional Data Storage Pricing Published price per additional unit of data storage. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.