HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Comprehensive KYC solution for corporate treasury that streamlines customer onboarding, risk assessment, and ongoing monitoring. Includes automated screening against global watchlists, PEP identification, beneficial ownership verification, and integration with Oracle's treasury management solutions.
More about Oracle Financial Services
Tools that facilitate Know Your Customer and Anti-Money Laundering compliance processes for treasury's financial counterparties.
More KYC/AML Compliance Systems
More Treasury Compliance ...
Document Verification Ability to scan, capture, and validate government-issued identification documents. |
Oracle Financial Services KYC states support for ID document capture and validation as part of identity verification suite. | |
Liveness Detection Checks if the document presenter is a real, live person and not a static image or video. |
No information available | |
Biometric Matching Facial or fingerprint recognition for matching user with their presented documents. |
Facial biometric matching is described in Oracle KYC solution documentation. | |
Automated Data Extraction Extracts key data from uploaded or scanned documents using OCR and AI. |
Automated OCR and data extraction is featured for onboarding and verification flows. | |
Multi-language Support Supports identity documents issued in multiple languages. |
Known to support multiple national document types, implying multi-language OCR and document support. | |
Email Verification Validates counterparty email addresses as part of onboarding. |
Product includes email verification during onboarding. | |
Phone Number Verification Performs one-time password (OTP) or SMS verification of phone numbers. |
Phone/SMS OTP verification described as part of onboarding workflow. | |
Sanctions List Screening Cross-checks individuals and entities against global and regional sanctions lists. |
Global and regional sanctions list screening listed as a primary feature. | |
Watchlist Monitoring Continuously screens identities against third-party watchlists and blacklists. |
Continuous watchlist monitoring highlighted for ongoing KYC/AML compliance. | |
Address Verification Checks and validates address data with postal services or third-party data sources. |
Address verification offered using external and postal data. | |
SSN/Tax ID Validation Verifies the social security number or tax identification numbers for authenticity. |
SSN/Tax ID validations are managed as part of US onboarding flows. | |
Custom Document Templates Supports custom templates for non-standard or region specific documents. |
Custom document template support available for local/regional variations. | |
Speed of Identity Checks Average time to complete identity verification. |
No information available | |
Accuracy Rate Success and accuracy rate of automated identity matching. |
No information available | |
Manual Review Escalation Allows cases to be escalated to human agents in ambiguous scenarios. |
System supports manual escalation for ambiguous or high-risk verification cases. |
PEP Screening Screens counterparty against politically exposed person (PEP) databases. |
PEP screening (politically exposed persons) prominently mentioned. | |
Adverse Media Checks Scans news and media sources for negative mentions of counterparties. |
Adverse media (negative news) checks are available in EDD flow. | |
Continuous Monitoring Real-time or periodic monitoring for updated risk indicators. |
Describes real-time and periodic monitoring as ongoing risk management feature. | |
Ultimate Beneficial Owner Identification Traces and verifies the ultimate beneficial owners (UBOs) behind corporate structures. |
UBO (Ultimate Beneficial Owner) identification is a headline feature for corporates. | |
Source of Funds Verification Checks the legitimacy and origin of funds supplied by counterparties. |
Source of funds verification included in standard EDD modules. | |
Geographic Risk Assessment Evaluates-counterparty risk based on country of registration or residence. |
Product includes country risk evaluation based on residence/registration. | |
Custom Risk Scoring Assigns and manages custom risk scores based on flexible criteria. |
Product supports custom risk scoring as standard functionality. | |
Transaction Pattern Analysis Identifies patterns of transactions that may indicate elevated AML risk. |
Transaction pattern monitoring available as part of AML risk analytics. | |
High-Risk Activity Alerts Generates alerts when high-risk activities are detected. |
High-risk activity alerts provided as part of AML defense. | |
Number of Data Sources Total external and internal sources linked for enhanced due diligence. |
No information available | |
Custom Questionnaires Ability to generate and manage enhanced due diligence forms for high-risk clients. |
Custom questionnaires for high-risk clients are part of enhanced due diligence flows. | |
Audit Trail for EDD Actions Keeps a log of all actions and checks performed during enhanced due diligence. |
Audit trails/logs are emphasized for compliance and due diligence documentation. | |
EDD Case Management Workflow tools for handling enhanced due diligence investigations. |
EDD case management includes workflow tools and escalation. | |
Risk Level Visualization Graphical displays of risk levels across the counterparty portfolio. |
Visual risk scoring and dashboards for risk management are included. | |
Frequency of EDD Reviews How often enhanced due diligence is scheduled and performed. |
No information available |
Real-Time Monitoring System monitors transactions for suspicious activity in real time. |
Described as supporting real-time transaction monitoring for AML compliance. | |
Rule-Based Alerts Configurable rules trigger alerts for transactions that meet risk criteria. |
Configurable rule-based alerts for transactions mentioned in documentation. | |
Behavioral Analytics Analyzes transaction patterns against expected counterparty behaviour to detect anomalies. |
Behavioral analytics module available for anomaly detection. | |
Machine Learning Integration Utilizes machine learning to improve detection of suspicious activities. |
Machine learning integration cited as a detection improvement for suspicious AML activity. | |
Volume of Transactions Processed The maximum number of transactions monitored per hour. |
No information available | |
False Positive Rate Percentage of flagged transactions that are ultimately found to be compliant. |
No information available | |
Case Management for Alerts Integrated tools to investigate, escalate, and resolve flagged transactions. |
Case management for alerts highlighted as a core part of the investigative process. | |
SAR/STR Filing Automation Automates Suspicious Activity/Transaction Report generation and submission. |
The solution automates SAR/STR filing as part of regulatory process. | |
Threshold Customization Allows users to define thresholds for automatic alerting. |
Alert/threshold configuration for AML rules is supported. | |
Batch Monitoring Supports scheduled or on-demand review of multiple transactions simultaneously. |
Batch monitoring of multiple transactions is available. | |
Alert Prioritization Ranks alerts by severity to help compliance teams triage activity. |
Alert prioritization is offered in queue management for compliance staff. | |
Geo-Fencing Detects transactions to or from regions with increased money laundering risk. |
Geo-fencing and regional risk detection included. | |
Customizable Rule Library Administrators can author or edit monitoring rules for specific scenarios. |
Rule libraries and customizable monitoring rules are supported. | |
Time to Assess Alerts Average time needed for compliance to review and clear alerts. |
No information available | |
Integration with External Databases Links with external fraud and AML databases for enhanced pattern recognition. |
Oracle KYC solution integrates with external fraud and AML databases. |
Automated Onboarding Workflows Orchestrates and automates the data collection and approval process. |
End-to-end onboarding including automated workflows described. | |
Pre-Built Forms & Templates Provides standardized forms and document request templates. |
Standardized onboarding forms and templates included. | |
Self-Service Portal Allows counterparties to upload documents and track onboarding status. |
Self-service portal provided for document upload and onboarding progress. | |
Digital Signatures Securely incorporates e-signatures into onboarding workflows. |
Digital signature capabilities included for regulatory-compliant onboarding. | |
Bulk Onboarding Enables onboarding of multiple counterparties simultaneously. |
Bulk onboarding of counterparties supported. | |
Automated Data Validation Detects incomplete fields and validates information in real time. |
Real-time data validation and incomplete field detection described. | |
Onboarding Time Average time to complete onboarding using the system. |
No information available | |
Onboarding Status Tracking Real-time dashboard for tracking onboarding progress and bottlenecks. |
Real-time tracking dashboard for onboarding status available. | |
Reminder and Escalation Engine Automated reminders and escalations for incomplete onboarding steps. |
Automated reminders and escalation engine for onboarding completion. | |
Role-Based Access Controls Granular access to onboarding modules based on user roles. |
Role-based access controls available for different onboarding and compliance modules. | |
Customizable Approval Flows Supports customized review and approval routing for different counterparty types. |
Product allows customized approval and review routing by counterparty type. | |
Audit Trail Maintains a log of all onboarding activities and changes. |
Full onboarding audit trail maintained for all changes and activities. | |
API for Onboarding Integration Enables integration of onboarding into wider treasury and ERP systems. |
APIs are provided for onboarding integration with core treasury/ERP systems. | |
Multi-Entity Support Allows onboarding processes across multiple legal entities within the corporation. |
Multi-entity onboarding processes are supported. | |
Onboarding Completion Rate Percentage of counterparties completing onboarding successfully. |
No information available |
Access to Global Lists Includes OFAC, UN, EU and other major sanctions and embargoes lists. |
Oracle supports screening against OFAC, UN, EU, and major global sanction lists. | |
Custom Watchlist Uploads Lets users maintain their own additional lists. |
Custom watchlists can be uploaded by clients. | |
Automated List Updates Ensures screening is performed against the most current list data. |
Automated updates to compliance lists delivered as part of SaaS updates. | |
Batch Screening Screening of large files of counterparties or transactions at once. |
Product supports batch screening for multiple counterparties and transactions at once. | |
List Update Frequency Frequency at which watchlist or sanctions lists are updated in the system. |
No information available | |
Fuzzy Matching Algorithms Can detect close or similar matches to alias names and alternate spellings. |
Fuzzy matching algorithms are employed to reduce false negatives on name variations. | |
Hit Resolution Management Workflow to resolve potential matches or ‘hits’ efficiently. |
Workflow and hit resolution management described for efficiently clearing hits. | |
Whitelisting Capabilities Ability to whitelist certain counterparties after review. |
Whitelisting mechanisms included for reviewed counterparties. | |
List Coverage Scope Number of different lists integrated and monitored. |
No information available | |
Sanctions Screening SLAs Guaranteed maximum time for screening and returning results. |
No information available | |
Multi-jurisdictional List Support Coverage of lists from multiple global jurisdictions. |
Multi-jurisdictional support is stated for global financial institutions. | |
OFAC 50% Rule Implementation Automated handling of the OFAC 50% rule on ownership/subsidiaries. |
OFAC 50% rule logic for ownership/subsidiary screening described in features. | |
Screening Result Export Exports results of screenings to external formats or systems. |
Screening result export to system and file formats available. | |
Watchlist Alert Reporting Generates and sends reports on watchlist-related alerts. |
Watchlist alert reporting available as part of sanctions/watchlist module. | |
Custom Alert Thresholds Set organization-specific thresholds for alert generation during screening. |
Product supports setting custom thresholds for alerts. |
Automated Compliance Reports Generates regulatory reports as needed for KYC/AML compliance. |
Automated compliance report generation for regulatory KYC/AML needs. | |
Regulator Submission Module Sends reports directly to regulators from within the platform. |
Direct regulator submission modules available in selected jurisdictions. | |
Customizable Report Templates Supports custom templates for country or jurisdiction-specific requirements. |
Product enables custom report templates for local rule requirements. | |
Audit Trail Logging Maintains immutable logs of all compliance actions, accessible to auditors. |
Immutable audit trail logging included as part of audit and compliance. | |
Report Scheduling Allows scheduling of periodic compliance reports. |
Report scheduling (periodic reporting) is available. | |
Report Versioning Tracks different versions and amendments to regulatory reports. |
Report versioning and amendments tracked within the compliance suite. | |
Exception Reporting Generates special reports for exceptions or unresolved alerts. |
Exception reporting available for compliance and unresolved items. | |
Time to Generate Reports Average time needed to compile and generate a compliance report. |
No information available | |
Automated Data Aggregation Aggregates data automatically from multiple modules for reporting. |
Aggregated data for regulatory reports pulled automatically from modules. | |
Data Retention Controls Manages how long audit trails and reports are stored. |
Data retention controls and configuration options are described. | |
Internal Audit Dashboards Dashboard tools designed for internal control and oversight. |
Internal audit dashboards and control features available. | |
Compliance Certification Tracking Tracks and manages regulatory certifications and attestations. |
Tracks regulatory certification/attestation statuses. | |
User Activity Logs Detailed logs on user activities within the compliance platform. |
User activity logs collected for audit and compliance monitoring. | |
Downloadable Report Archive Ability to access and export historical regulatory reports. |
Downloadable archive of historical regulatory/compliance reports. | |
Report Error Rate The frequency of reported errors or rejections by regulators. |
No information available |
Case Creation Automation Automatically generates cases when alerts are triggered. |
Cases can be auto-created upon alert generation, supporting workflow automation. | |
Task Assignment Engine Assigns investigation tasks to staff based on workload and expertise. |
Task assignment engine present for assigning case work to users/teams. | |
Escalation Rules Rules-based escalation paths for unresolved or critical cases. |
Rules-based escalation for unresolved/high-risk cases is included. | |
Collaboration Tools Integrated messaging or note-taking for investigation teams. |
Collaboration tools for investigations, including messaging and notes, are available. | |
Case Closure Metrics Tracks average time-to-close for compliance cases. |
No information available | |
Document Attachment for Cases Attach evidence and documents directly to specific cases. |
Document attachment for investigative cases is supported. | |
Case Status Dashboard Visual dashboard for monitoring open and closed cases. |
Visual dashboard for open/closed case monitoring is included. | |
Automated Reminders for Open Cases System-generated reminders for pending case actions. |
Automated reminders sent for open/pending case actions. | |
Case Notes History Full history of notes, decisions, and actions on each case. |
Full note/action/decision histories available for all cases. | |
Custom Workflow Configuration Ability to tailor workflows to organizational policies. |
Custom workflow configuration to match organizational policies is supported. | |
Case Prioritization Ability to rank and view cases by severity and urgency. |
Prioritization and severity ranking of cases included in dashboard and workflow. | |
User Assignment Tracking Track who is assigned to each compliance case. |
User assignment to cases and tracking supported. | |
Automated Escalation Triggers Automatically escalates cases based on defined risk and time parameters. |
Automated escalation triggers are present for overdue or risky cases. | |
Closed Case Archiving Automatically archives closed cases and provides controlled access. |
Automated closed case archiving described in features. | |
Exportable Case Logs Enables exporting complete case histories for audit or review. |
Case log export supported for audit or external review. |
Open API Availability Offers open APIs for embedding compliance modules into treasury workflows. |
Open API available for embedding compliance modules/workflows. | |
Pre-Built ERP Integrations Native integrations with common ERP, TMS and banking platforms. |
Native integrations with Oracle and major ERP/TMS platforms. | |
Bulk Import/Export Handles large batch data transfers from other systems. |
Bulk import/export described as a capability for batching data. | |
Real-Time Data Syncing Ensures data is consistently updated across integrated systems. |
Platform designed for real-time data syncing across modules. | |
Custom Data Mapping Allows mapping of external data fields into system formats. |
Custom data mapping provided for various integration scenarios. | |
Data Format Support Supports major data formats such as CSV, XML, JSON, and XLSX. |
Supports all major data formats for input/output. | |
Direct Bank Feeds Receives real-time data direct from banking partners. |
Direct bank feeds available for select partner banks. | |
Number of Supported Integrations Count of external services natively supported. |
No information available | |
Webhooks Support Triggers or receives webhook-based events for data updates. |
Webhooks are supported for system/data updates. | |
Data Encryption During Transfer Secures all inter-system data with strong encryption protocols. |
Encryption compliant with standards for all in-transit data. | |
Automated Data Cleansing Cleanse and de-duplicate data on import. |
Automated data cleansing on import supported. | |
Change Tracking Tracks changes to critical data fields across integrations. |
Tracks changes to key critical data fields across system integrations. | |
Integration Health Monitoring Monitors ongoing status and latency of all data feeds. |
Integration health monitoring described in documentation. | |
Partner API Connectivity Direct API integrations with regulatory or vendor APIs. |
Direct connectivity with regulator/vendor APIs described. | |
Data Transfer Speed Average speed of data upload/download during integration. |
No information available |
End-to-End Encryption Data is fully encrypted at rest and in transit. |
End-to-end encryption used for all data at rest and in transit. | |
Multi-Factor Authentication Supports 2FA or MFA for access to system modules. |
Multi-factor authentication supported for system modules. | |
Data Masking Masks sensitive fields in interfaces and exports. |
Data masking available for sensitive fields in UIs and exports. | |
Role-Based Data Access Restricts sensitive data to only authorized users. |
Access restricted to sensitive data by role/authorization. | |
Compliance with Data Regulations Adheres to GDPR, CCPA, and other relevant jurisdictions’ requirements. |
Solution claims compliance with GDPR, CCPA, and other data privacy regulations. | |
Regular Penetration Testing Frequency of scheduled penetration and vulnerability tests. |
No information available | |
Security Incident Response Built-in procedures and alerting for possible breaches. |
Systematic security incident response workflow is described. | |
Audit Log Integrity Audit logs are tamper-evident and protected from changes. |
Audit log integrity features (tamper evident) included in Oracle platform. | |
Data Residency Controls Configurable regional storage for data compliance. |
Clients can choose data residency/storage region for compliance. | |
Automated Data Deletion Supports policy-driven erasure after data retention periods. |
Automated data deletion policy can be configured. | |
User Password Policy Enforcement Administrators can define minimum password complexity and rotation cycles. |
Password policies configurable for system users. | |
Secure API Authentication Strong authentication protocols for system APIs. |
API authentication complies with security standards. | |
Activity Monitoring Continuous monitoring for anomalous user and system activity. |
Platform has continuous activity monitoring for user/system behaviour. | |
Data Backup Frequency Automated backup schedule for all data assets. |
No information available | |
Encryption Key Management Management and auditing of encryption keys. |
Encryption key management routines in compliance with industry standards. |
Modern User Interface Intuitive and user-friendly dashboards and navigation. |
Modern and configurable UI featured in product screenshots. | |
Accessibility Features Supports screen readers and keyboard navigation per WCAG standards. |
No information available | |
Mobile Accessibility Responsive design for mobile devices and tablets. |
Mobile responsive and available on tablets as per documentation. | |
Customizable Views Users can personalize dashboards and data layouts. |
Customizable user dashboards and layouts described. | |
Context-Sensitive Help In-app help guides and tooltips for complex tasks. |
Context-sensitive help and inline guides provided. | |
Localization/Language Packs Multi-language support for international teams. |
Localization support for multi-language teams available. | |
Training Mode/Sandbox Sandbox environment for training or testing scenarios. |
No information available | |
Fast Load Time Average system dashboard and page load speed. |
No information available | |
Notification Center Aggregated display of system alerts, messages, and updates. |
Built-in notification center for system alerts and user updates. | |
Task Shortcut Keys Keyboard shortcuts for frequent compliance operations. |
No information available | |
User Custom Reports End-users can design and save custom report layouts. |
Custom/user-built reports are enabled via report designer tools. | |
Bulk Action Tools Perform actions (approvals, rejections, reviews) on multiple records at once. |
Bulk action tools described for efficient workflow (e.g., approvals, reviews). | |
Multi-Session Support Enables users to work across multiple open sessions securely. |
No information available | |
Notification Frequency Settings Users can customize frequency of system updates and notifications. |
No information available | |
Single Sign-On (SSO) Supports authentication via SSO providers for corporate access. |
Single sign-on (SSO) supported via corporate identity providers. |
Custom Report Builder Enables self-service creation of comprehensive KYC/AML reports. |
Self-service custom report builder module available. | |
Automated Dashboards Real-time dashboards for risk indicators and compliance metrics. |
Automated, real-time dashboards available for risk/compliance metrics. | |
Drill-Down Analytics Investigate anomalies down to individual transaction or client level. |
Drill-down analytics for alerts/transactions supported. | |
Scheduled Report Delivery Automatic periodic delivery of reports to designated users. |
Scheduled and periodic report delivery described. | |
Ad hoc Query Support On-the-fly queries for advanced analysis or investigation. |
Ad hoc queries for reports and analysis are available. | |
Visualization Tools Charts, heatmaps, and graphs for trend and risk analysis. |
Visualization tools (charts, graphs, dashboards) are included. | |
Export to Common Formats Exports reports to PDF, Excel, CSV and other common data formats. |
Export of reports to PDF, Excel, CSV is available. | |
Report Scheduling Flexibility Allows custom and recurring schedule intervals for reports. |
Flexible scheduling for reports (custom intervals) supported. | |
Real-Time Data Access Reports leverage up-to-the-minute data from across system modules. |
Real-time data access for compliance analytics and reporting. | |
Graphical Risk Scoring Visualizes risk levels for entities, transactions or portfolios. |
Graphical risk scoring and visualization included. | |
Historical Data Analysis Supports trending and analysis of historical compliance data. |
Historical compliance data analysis supported. | |
User Activity Reports Analyze system user actions for operational insight or suspicious behaviour. |
User activity reporting and analytics available. | |
Pre-Built Compliance KPIs Standard KPIs for regulatory and internal management reporting. |
Product provides pre-built compliance KPI library for regulatory analysis. | |
Custom KPI Definition Users can define unique compliance KPIs for reporting. |
Custom KPI definitions are allowed in reporting module. | |
Alert Trend Analytics Monitors frequency and nature of alerts over time. |
Alert trend analytics provided (frequency/nature over time). |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.