HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Trade and communications surveillance platform that provides monitoring, recording, and analytics of voice and electronic communications. Includes trade reconstruction, behavioral analytics, and AI capabilities to detect compliance issues specific to fund management operations.
Solutions that monitor trading activities to detect potentially suspicious patterns, market abuse, insider trading, or other compliance violations through pattern recognition and behavioral analysis.
More Trade Surveillance Systems
More Risk & Compliance ...
Market Abuse Detection Automatic identification of patterns indicative of market manipulation or abuse. |
Product explicitly states automatic detection of market manipulation and abuse as a core function using behavioral analytics and AI. | |
Insider Trading Detection Systems to flag potential insider trading based on trading behavior and informational access. |
Surveillance and analytics functions include monitoring for insider trading behaviors. | |
Front-Running Detection Ability to detect trades executed ahead of client or fund orders. |
Front-running detection is typical in trade surveillance systems, and IPC documentation and marketing reference detection of front-running. | |
Wash Trade Detection Detection of self-trading or artificially generated trades. |
Wash trade detection is a standard market manipulation scenario supported by behavioral analytics. | |
Spoofing/Layering Detection Recognition of order book manipulation techniques like fake orders. |
Spoofing/layering is referenced as detectable through their analytics engine in compliance literature. | |
Cross Asset Class Surveillance Coverage across multiple asset classes (equities, fixed income, derivatives). |
Multiple asset class coverage is promoted, including equities, fixed income, FX, and derivatives. | |
Custom Rule Development Ability to create or edit surveillance rules based on firm-specific criteria. |
User-defined rule creation/editing is offered as a differentiator for IPC Chrono Compliance. | |
Real-time Monitoring Capability to analyze trading activity as it happens. |
System provides real-time trade and comms monitoring as a key selling point. | |
Historical Analysis Ability to review and analyze past trading data for retrospective investigations. |
Surveillance includes historical analysis through trade reconstruction capability. | |
Alert Prioritization/Scoring Systematically ranks alerts by risk level or likelihood of breach. |
Alert prioritization and scoring by risk are shown in UI screenshots and descriptions. | |
Pattern Recognition Engine Advanced analytics for identifying complex or novel manipulative behaviors. |
Pattern recognition analytics engine specifically highlighted in solution brief. |
Multi-Source Data Ingestion Capability to load data from multiple internal and external sources (trading, market, news, reference). |
Ingests trade, comms, market, and third-party data from multiple sources. | |
Data Normalization Automatically transforms heterogeneous data formats into a unified structure. |
Platform normalizes disparate data sources for unified analytics. | |
Real-time Data Ingestion Speed Latency from data input to analysis. |
No information available | |
Big Data Scalability Handles high volumes of transactions and market data without performance loss. |
Advertising supports 'petabyte-scale' trade & voice surveillance, indicating big data scalability. | |
APIs for Integration Standard APIs for integration with other front/middle/back office systems. |
APIs for integration with upstream/downstream systems are described on product pages. | |
Support for Structured & Unstructured Data Processes diverse data types, such as emails, chats, portfolio positions. |
Processes both structured (trade, orders) and unstructured (voice, chat, email) data. | |
Reference Data Management Maintains and updates static data for accuracy (identifiers, market codes). |
Reference data management is mentioned as essential for trade reconstruction and regulatory reporting. | |
Data Lineage Tracking Shows data transformation history for audits and investigations. |
Data lineage and provenance are described in support materials for audits and investigations. | |
Data Retention Period Maximum period for which data is stored and accessible. |
No information available | |
Cloud Data Storage Support Option to store data securely in the cloud. |
IPC offers secure cloud storage as a deployment option. |
Global Regulatory Rule Library Built-in rules for major regulations (e.g., MAR, MiFID II, Dodd-Frank, ASIC, HKMA). |
Features pre-built compliance logic for MAR, MiFID II, Dodd-Frank, and global rules. | |
Jurisdiction Awareness Easily applies rules by geographical region or regulator. |
Allows rule assignment based on regulatory jurisdiction/geography. | |
Automated Regulatory Update Mechanism Continuously updates surveillance logic for regulatory changes. |
Automated updates to handle regulatory change management are described. | |
Configurable Regulatory Reports Generates reports in formats required by various regulatory bodies. |
Regulatory reporting is configurable and supports multiple formats. | |
SME Consultation Service Access to subject matter experts for interpretation and configuration. |
No information available | |
Audit Trail for Rule Changes Tracks changes to surveillance logic for compliance review. |
Tracks all changes to rules for compliance audit trails. | |
Compliance Dashboard Real-time visualization of compliance status and exposures. |
Real-time compliance dashboards are visible in product UI and literature. | |
Regulator Submission Automation Automates periodic or ad-hoc regulatory filing. |
Supports regulatory filing automation, including MiFID and Dodd-Frank submissions. | |
Benchmarking to Peers Compares own compliance posture to industry standards. |
No information available |
Case Management System Integrated workflows to assign, escalate, and document alert investigations. |
Case/alert management is an integrated workflow feature. | |
Alert Triage Tools Assists analysts in reviewing, prioritizing, and closing alerts efficiently. |
System includes alert triage tools and workflow. | |
Alert Suppression & Deduplication Reduces noise by filtering false positives and duplicates. |
Alert deduplication/suppression is part of the approach to false positive management. | |
Alert Volume Capacity Maximum number of alerts the system can generate/manage daily. |
No information available | |
Workflow Customization Customizable investigation workflows to fit internal processes. |
Custom workflows can be configured within the platform. | |
Annotating and Tagging Alerts Users can add notes and categorize alerts for tracking. |
Users can annotate and tag alerts in the interface (as seen in demo materials). | |
Root Cause Analysis Tools Features to help analysts determine the underlying cause of alerts. |
Analytics tools to help uncover root cause of alerts are part of the investigations interface. | |
Bulk Alert Handling Ability to review, close, or escalate multiple alerts simultaneously. |
No information available | |
Integration with Email/Communication Directly send correspondence from within the alert system. |
Integration with email/messaging/voice comms is a key aspect of the solution. |
Customizable Dashboards Personalized interfaces for different user roles (compliance, operations, management). |
UI is customizable by user/role according to documentation. | |
Mobile Device Access Access system via tablets, mobile phones, or browser-based apps. |
Supports access via mobile/tablets, browser and dedicated app. | |
Role-Based Access Control Limit data and functionality access based on user roles. |
Role-based access permissions management is present. | |
Multi-language Support Available in multiple languages for global teams. |
Promoted as being used by global teams in multiple languages. | |
User Training Modules Embedded tutorials and guides for training new users. |
Product includes user training modules and onboarding aids. | |
Accessibility Features Supports users with disabilities (e.g., screen readers, keyboard navigation). |
No information available | |
Query Builder for Non-technical Users Visual interface to create complex searches without coding. |
Offers query builder and visual search for non-technical users. | |
Search and Filtering Speed Average latency to execute queries or filter large datasets. |
No information available |
Data Encryption at Rest and In Transit Encryption of all sensitive data, both stored and during transfer. |
Describes encryption both at rest and in transit in compliance materials. | |
Single Sign-On (SSO) Integration Supports SSO for seamless and secure user authentication. |
Single sign-on (SSO) is referenced in administration documentation. | |
Multi-Factor Authentication (MFA) Requires two or more authentication factors for access. |
Multi-factor authentication supported for enhanced security. | |
Detailed User Access Logging Complete logs of all user access and actions. |
All user actions are logged for audit purposes. | |
GDPR and Local Data Privacy Compliance Designed to comply with relevant data protection laws. |
States GDPR and local compliance in all relevant geographies. | |
Regular Security Audits Periodic internal and third-party penetration testing. |
Regular penetration testing is mentioned as part of IPC hosted solutions. | |
Data Masking & Redaction Sensitive data fields can be hidden or obfuscated where required. |
Provides masking/redaction for sensitive data fields. | |
Incident Response Workflow Defined procedures for security breach response. |
Incident response workflows detailed in ITSEC and compliance support documentation. |
Custom Report Builder Users can design and generate reports tailored to their needs. |
Custom reporting available to users via report designer. | |
Regulatory Reporting Templates Pre-built formats for standard regulatory filings. |
Has out-of-the-box regulatory report templates for global standards. | |
Automated Scheduled Reports Ability to automatically generate and distribute reports at set intervals. |
Supports scheduled reports and distribution. | |
Data Export Capabilities Download data and reports in multiple formats (CSV, PDF, Excel). |
Data/report export formats supported (CSV, Excel, PDF). | |
Ad hoc Query Support Generate reports or data sets on the fly as needed. |
Users can generate ad hoc queries/data extracts. | |
Interactive Data Visualization Graphical dashboards and analytics tools for insight. |
Interactive dashboards and analytics tools are highlighted as a user benefit. | |
Comprehensive Audit Trails Immutable logs of all actions, changes, and investigations. |
All system actions/audits are logged and made available for review. | |
Report Generation Speed Average time to generate standard compliance reports. |
No information available |
Machine Learning-Based Pattern Detection Uses ML algorithms to discover previously unknown compliance risks. |
AI/ML pattern detection is a differentiator in their analytics pitch. | |
Natural Language Processing (NLP) Analyzes unstructured communications (emails, chats) for compliance issues. |
Includes NLP to analyze chat, email, and voice comms for compliance. | |
Self-Learning Alert Calibration System adapts thresholds based on changing risk profiles and outcomes. |
Mentions auto-calibrating alert thresholds based on outcomes/risk. | |
Predictive Analytics Forecasts likely future risks based on historical trends. |
Promotes predictive analytics for future risk and trends. | |
Explainable AI Provides transparency into the logic behind AI-driven alerts. |
Explainability in AI-supported alerts is featured in whitepapers and demos. | |
Anomaly Detection Engine Identifies outlier activity that warrants investigation. |
Anomaly detection engine is a core AI function cited. | |
False Positive Reduction Rate Reduction in unnecessary alerts due to smart analytics. |
No information available | |
Continuous Model Training System can update AI/ML models without manual intervention. |
AI/ML retraining is mentioned as ongoing/continuous. |
Cloud Deployment Option Supports deployment as a SaaS or cloud-hosted solution. |
Cloud deployment/SaaS option explicitly available. | |
On-Premise Deployment Option Supports a local installation option for sensitive environments. |
On-premise deployment supported; often a requirement for banks. | |
Disaster Recovery Support Capabilities for rapid recovery and continuity in the event of system failure. |
Promotes high-availability, backup, and DR support SLAs. | |
Uptime/Availability SLA Level of guaranteed system uptime. |
No information available | |
Zero-Downtime Upgrades System can be upgraded without interrupting service. |
No information available | |
Automated Patch Management Automatic deployment of security patches and bug fixes. |
Automated patch management is often bundled in hosted/SaaS models as described for this product. | |
24/7 Vendor Support Round-the-clock technical support from the provider. |
24/7 support availability is referenced in SLA and vendor documentation. | |
Performance Monitoring Tools Comprehensive tracking of application health and speed. |
Product includes real-time system monitoring and performance tracking tools. |
Customizable Rule Sets Users can modify existing rules or add new controls easily. |
Supports customizable/extensible compliance rule sets. | |
Plugin/Extension Interface Supports third-party add-ons or internal custom modules. |
No information available | |
White Labeling Capability System can be branded to an organization's specifications. |
White-labeling (branding customization) is available for managed service providers and private cloud options. | |
Automated Workflow Triggers Configurable automation in response to certain events or alerts. |
Rule-based workflow automation/triggers are supported. | |
Scalable User Licensing Flexible pricing/licensing as user numbers grow. |
Scales licensing/pricing as user count increases (per-user/per-entity pricing). | |
Time to Deploy New Rule Average time required to configure, test, and deploy a new surveillance rule. |
No information available | |
Multi-Tenancy Support Supports multiple client entities in one deployment (for managed service providers). |
No information available |
Transparent Fee Structure Clear upfront pricing with no hidden fees. |
Transparent, published pricing for modules/features on request (per RFP and proposals). | |
Modular Pricing Options Ability to choose/cost features à la carte. |
Can be quoted with modular pricing per feature/module based on requirements. | |
Support & Maintenance Included Ongoing support, maintenance, and upgrades included in base cost. |
IPC subscription/support includes maintenance and software upgrades. | |
Scalability of Costs Costs scale appropriately with usage, users, or data volume. |
Pricing scales as usage/user/data volume increases (per product info). | |
Free Trial/Proof of Concept Offered prior to contract to validate suitability. |
Demonstrations and PoC/free trials available on request. | |
Flexible Contract Length Ability to agree short- or long-term contracts. |
Flexible contract terms available (short and long). | |
Exit/Transition Support Assistance with offboarding and data migration on contract end. |
Exit and data migration support referenced in the managed service offering. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.