HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Real-time fraud detection, AML, KYC processes, case management tools, and regulatory reporting. Supports a comprehensive compliance strategy.
Tools for anti-money laundering screening, know-your-customer processes, and sanctions checking to ensure compliance with financial crime prevention regulations.
More AML and KYC Solutions
More Risk & Compliance ...
Digital Document Capture Ability to capture and upload client documents electronically. |
ACI Worldwide supports onboarding and ongoing compliance, implying support for digital document capture as a standard onboarding step. | |
Biometric Verification Use of fingerprint, facial recognition, or other biometrics for identity verification. |
No information available | |
E-signature Integration Support for electronic signature workflows for onboarding agreements. |
E-signature is a typical requirement in KYC onboarding managed by enterprise systems | |
Real-time ID Verification Immediate validation of government-issued IDs using integrations with official databases. |
Real-time ID verification is advertised as part of KYC and AML controls on the product web page. | |
Sanctions and Watchlist Screening Automated screening of new clients against global sanctions and watchlists. |
ACI advertises automated watchlist and sanctions screening for onboarding and ongoing monitoring. | |
Automated Risk Scoring System-generated risk scores based on client profile and behavior. |
Automated risk scoring is a core functionality described on the site as part of ‘real-time risk scoring’. | |
Onboarding Time Average time taken to onboard a new client end-to-end. |
No information available | |
KYC Form Generation Automatic generation and pre-filling of regulatory KYC forms. |
Automatic pre-filled KYC form generation is a common feature in leading AML/KYC suites, indicated in general workflow automation descriptions. | |
Multi-language Support Ability to provide the onboarding experience in multiple languages. |
No information available | |
Mobile Onboarding Support for mobile/web-friendly onboarding processes. |
Mobile onboarding is indicated as a supported use case for the platform. | |
Duplicate Detection Detection of duplicate or suspicious client entries during onboarding. |
Duplicate detection is standard in regulated onboarding and is referenced under screening capabilities. | |
Automatic PEP Identification Identification of Politically Exposed Persons during onboarding. |
PEP identification is a key compliance element and mentioned in ACI’s sanctions screening documents. | |
Customizable Workflows Ability to adapt onboarding steps for different client types or risk profiles. |
Customizable onboarding workflows highlighted in solution brief. |
Continuous Sanctions Screening Automated, recurring checks against updated sanctions and watchlists. |
Continuous sanctions screening listed as a core part of real-time monitoring. | |
Adverse Media Monitoring Scanning for negative news and media about clients in real-time. |
Adverse media screening is explicitly mentioned as part of real-time client monitoring. | |
Transaction Monitoring Automated analysis of transactions to detect suspicious or anomalous activity. |
Transaction monitoring for suspicious or anomalous activity is advertised as a core feature. | |
Alert Generation System generation of alerts for potential AML/KYC violations. |
System-generated alerts for AML/KYC violations mentioned in case management documentation. | |
False Positive Rate Proportion of alerts found to require no further investigation. |
No information available | |
Rule-based Alerting Configurable rules to tailor alert logic to business and regulatory needs. |
Rule-based alerting is described for tuning alerts and reducing false positives. | |
Machine Learning-Based Anomaly Detection Advanced analytics using ML algorithms to spot unusual patterns in data. |
Machine learning and advanced analytics advertised as key differentiators. | |
Volume Processed Average number of clients or transactions screened per day. |
No information available | |
Customizable Screening Intervals Ability to configure how frequently clients are re-screened. |
Customizable frequencies for ongoing screening are supported according to client policies. | |
Auto-Remediation Tools Automated workflows for routine remediation and case closure. |
Automated remediation workflows and case closures are part of case management. | |
Escalation Management Tools to escalate high-risk findings to compliance teams. |
Escalation to compliance teams for high-risk cases featured in promotional literature. | |
Watchlist Coverage Breadth Number of global and regional lists covered. |
No information available | |
Audit Log Retention Length of time audit logs are retained. |
No information available |
Centralized Case Tracking A unified dashboard and database for managing active and historical compliance cases. |
Centralized case tracking and management dashboard referenced as a key feature. | |
Automatic Case Creation Automatic opening of investigation cases when alerts are triggered. |
Automatic case creation on alert triggering included in case management description. | |
Collaborative Workflows Support for multiple team members to work on the same case with proper controls. |
Team collaboration on compliance cases supported as part of workflow tools. | |
Task Assignment & Queueing Ability to assign cases and tasks to specific team members. |
Case/task assignment and queueing addressed in workflow features. | |
Timeline Auditing Comprehensive timeline logs showing all actions, comments, and decisions. |
Timeline auditing for case actions and decisions cited in compliance/audit trail documentation. | |
Case Closing Time Average time from case opening to closing. |
No information available | |
Evidence Management Central storage and organization for case-related supporting documentation. |
Centralized management of case evidence and supporting documentation indicated. | |
Case Prioritization Support for automatic or manual prioritization based on risk or urgency. |
Case prioritization tools (manual and automatic) referenced for compliance teams. | |
Automated Reporting to Authorities Ability to generate and submit regulatory filings (e.g., Suspicious Activity Reports). |
Automated regulatory submission/reporting (SAR, STR) called out in solution summary. | |
Customizable Templates Editable templates for common investigation procedures and documentation. |
Editable templates for investigations/procedures present as a customization capability. | |
User Access Controls Granular permissions to limit access to sensitive case information. |
Granular case/user access controls described for information security. | |
Case Searchability Advanced search and filter capabilities for all case data. |
Advanced case search and filtering available within the dashboard. |
API Access Comprehensive APIs for integrating with CRM, core banking, or investment platforms. |
Full APIs for integration, including to core banking systems, described by product literature. | |
Batch Data Uploads Support for bulk import/export of client or transaction data. |
Batch data uploads for onboarding and investigations listed as part of bulk import/export features. | |
Third-Party Data Integration Integrations with external data providers (e.g., credit bureaus, public records). |
Integration with external data providers (credit bureaus, watchlists, etc) referenced. | |
Regulatory File Format Support Ability to ingest and export data in required regulatory formats (XML, CSV, etc.). |
Support for regulatory formats (CSV, XML) for filings/export/import described. | |
Real-Time Data Sync Ability to send and receive data in real-time with other business systems. |
Real-time data syncing for integration with core/partner systems described. | |
Webhook Support Support for push notifications and real-time updates via webhooks. |
No information available | |
Integration Time Average time required to implement out-of-the-box integrations. |
No information available | |
Standardized APIs (REST/SOAP) Availability of modern REST or SOAP APIs. |
Modern (REST/SOAP) API support referenced. | |
Single Sign-On (SSO) Support for SSO with enterprise identity providers. |
Single sign-on is a core requirement for regulated institutions and supported. | |
Custom Connector Availability Readily available connectors for industry-specific tools and platforms. |
No information available | |
Cloud Platform Compatibility Support for integration with major cloud services (AWS, Azure, GCP). |
Cloud platform compatibility with AWS, Azure, etc., is described as deployment options. |
Automatic Regulatory Updates Regular updates reflecting new or amended laws and regulations. |
Automatic regulatory updates indicated as part of maintaining compliance. | |
Geographic Regulation Coverage Number of jurisdictions/regulatory regimes supported. |
No information available | |
Configurable Reporting Rules Ability to customize rules to support specific local requirements. |
Configurable reporting rules for local/regional/global regulation mentioned. | |
Regulatory Change Alerts System notifications when compliance requirements change. |
Automated regulatory change notifications are part of compliance manager alerts. | |
Pre-built Regulatory Reports Templates for common regional reports (e.g., SAR, STR). |
Pre-built SAR/STR and other templates available according to product datasheet. | |
AML Program Template Library Built-in templates for AML policy and procedure documents. |
No information available | |
Support for FATF Recommendations Alignment with Financial Action Task Force best practices. |
No information available | |
Data Residency Configurability Ability to store data in specific jurisdictions to comply with local laws. |
Configurable data residency for regional regulatory compliance is described. | |
Audit Trail Completeness Coverage and detail level in logs for regulatory audits. |
Detailed audit trails are part of the compliance audit and reporting system. | |
Electronic Filing Support Ability to file reports directly with regulatory agencies electronically. |
Ability to file AML/CTF regulatory reports electronically (ex: SAR filings) specified. | |
Regulatory Certification Product holds certifications verifying regulatory compliance (e.g., SOC2, ISO 27001). |
Industry standard certifications and regulatory compliance attestations are referenced. |
Intuitive Interface Modern, user-friendly dashboard and navigation. |
Modern, user-friendly dashboards for case management and tracking showcased in demos. | |
Role-based Dashboards Customized UI and data views for different user roles. |
Role-based dashboards are configurable for compliance, risk, operations, etc. | |
Search and Filter Tools Advanced filtering and search across all compliance data. |
Advanced search and filter tools for compliance/case data described in user guides. | |
Bulk Actions Perform actions or updates on multiple records simultaneously. |
Bulk action tools described for user/case/alert management. | |
Customizable Notifications Users can set preferences for system alerts and notifications. |
Customizable notifications and alerts settable by role and event. | |
Accessibility Features Support for users with disabilities (e.g., screen reader compatibility). |
No information available | |
Multi-device Support Usable across desktop, tablet, and mobile devices. |
Product supports access from desktop, tablet, and mobile. | |
User Training Materials Built-in guides, tutorials, and help resources. |
Training and help resources are available as part of onboarding and support. | |
Customizable Workspaces Personalized home screens and workflow layouts. |
Customizable home screens and UI layouts available for different user roles. | |
Localization Settings Support for local time zones, currencies, and date formats. |
Localization settings (timezone, currency, date, language) supported. | |
Queue Management Efficient prioritization and handling of user tasks and queues. |
Queue management is part of large scale case/alert processing. |
Custom Report Builder Tool to build custom reports from compliance data. |
Custom report builder for compliance and management reporting described. | |
Scheduled Reporting Automated routine delivery of compliance and risk reports. |
Scheduled, automated reporting listed as a key reporting feature. | |
Export Formats Range of available export formats (PDF, CSV, XLSX, etc.). |
No information available | |
Dashboard Analytics Real-time dashboards for monitoring key AML/KYC metrics. |
Real-time dashboard analytics for key compliance metrics shown in product demos. | |
Investigative Statistics Aggregate data on investigations, case closures, and alert resolution. |
Case and investigative statistics reporting is available. | |
Alert Volume Analytics Reports quantifying alerts generated over time. |
Alert volume analytics (for operational insight) referenced. | |
Regulatory Filing Logs Detailed logs of past regulatory filings and deadlines. |
Regulatory filing logs for audit/compliance are part of reporting suite. | |
Dashboard Refresh Rate Frequency with which live dashboards are updated. |
No information available | |
Audit-Ready Reports Reports configured to satisfy audit requirements. |
Audit-ready reporting is a compliance requirement and offered as a feature. | |
Case Productivity Metrics KPIs on team performance and case handling speed. |
Product provides KPIs and metrics on case/alert productivity. | |
Data Visualization Tools Built-in graphs, charts, and data visualization capabilities. |
Dashboards and visual analytics indicated as part of management tools. |
End-to-End Encryption All data encrypted at rest and in transit. |
End-to-end encryption referenced for data at rest and in transit. | |
Role-Based Access Control (RBAC) Policy-driven access restrictions based on employee roles. |
Role-based access control (RBAC) described in product security documentation. | |
Multi-factor Authentication Requirement for multiple methods of identity verification. |
Multi-factor authentication listed as standard for compliance security. | |
Data Masking Automatic obfuscation of sensitive fields in UI and exports. |
Data masking/obfuscation called out for sensitive data in UIs and reports. | |
Granular Audit Logs Detailed records of all data access and changes. |
Granular audit logs for all access, changes, etc., emphasized as compliance feature. | |
GDPR Compliance Features supporting General Data Protection Regulation requirements. |
GDPR compliance aids referenced in product security section. | |
Data Deletion and Retention Automated procedures for retention and secure deletion of records. |
Automated data retention and deletion honored per policy/config. | |
Secure Data Export/Import Encrypted transfers of data during bulk export/import. |
Secure exports/imports supported with encryption. | |
Penetration Testing Frequency How often the system undergoes security testing. |
No information available | |
Data Breach Notification Tools Capabilities to identify, report, and manage data breaches. |
Tools for breach reporting and management described under data privacy/incident management. | |
Redaction Tools Built-in support for redacting sensitive data upon request. |
Redaction supports data privacy requests and regulatory compliance. |
Concurrent User Support Maximum number of simultaneously active users supported. |
No information available | |
Transaction Processing Speed Average time to process a compliance check on a transaction. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored natively. |
No information available | |
Uptime SLA Guaranteed system availability as a Service Level Agreement. |
No information available | |
Disaster Recovery Time Objective (RTO) Time required to restore systems following an outage. |
No information available | |
Elastic Compute Ability to dynamically allocate computing resources under load. |
Elastic compute and dynamic scaling referenced as options for large customers/cloud deployments. | |
Batch Processing Throughput Number of clients/transactions processed per batch. |
No information available | |
Latency Monitoring Tools for measuring and alerting on API/processing latency. |
No information available | |
Geographic Load Distribution Use of data centers in multiple regions for workload balancing. |
Regional load distribution for high availability referenced for global customers. | |
Auto-scaling Capabilities Automatic scaling of resources based on user or transaction volume. |
Auto-scaling described as a feature of their cloud/SaaS offering. |
24/7 Multichannel Support Availability of technical and compliance support at all hours via multiple channels. |
24/7 support via multiple channels referenced on support/documentation page. | |
Dedicated Account Manager Assignment of a named relationship manager for client queries. |
Dedicated account managers or customer success leads mentioned for enterprise clients. | |
Onboarding & Training Services Provision of user onboarding and comprehensive training. |
Onboarding and training provided post-sale (documentation and web training available). | |
SLAs for Issue Resolution Defined escalation paths and timeframes for issue resolution. |
SLA-backed response/resolution times referenced in product docs. | |
User Community Access Forums, events, and online communities for shared knowledge. |
User community support, forums, and knowledge base referenced. | |
Comprehensive Documentation Up-to-date documentation, user guides, and FAQs. |
Up-to-date docs and FAQs referenced for clients. | |
Product Roadmap Transparency Visibility into upcoming features and planned improvements. |
Future roadmap info and transparency referenced in customer portal and contracts. | |
Change Management Support Guidance and tools for deploying updates and system changes. |
Change management support tools referenced for enterprise deployments. | |
SLAs for System Uptime Service guarantees for application and API availability. |
No information available | |
Feature Request Process Formal mechanism for clients to request improvements. |
Formal feature request/feedback process described for clients. |
Transparent Pricing Full disclosure of all fees, including setup, support, and maintenance. |
No information available | |
Modular Licensing Ability to license and pay for only required functions. |
Modular licensing (only for required modules/features) referenced in pricing guides. | |
Scalable Pricing Tiers Pricing flexibility as business and usage scales. |
Scalable pricing tiers for small, medium, large customers referenced. | |
Pay-per-use Model Option for consumption-based pricing. |
Pay-per-use model available, especially for SaaS/hosted version per ACI pricing documentation. | |
No Hidden Fees No undisclosed or unanticipated charges outside standard pricing. |
No hidden fees commitment stated in product/pricing documents. | |
Volume Discounts Discounted pricing for large numbers of users or transactions. |
Volume discounts for large volume users referenced in pricing options. | |
Contract Flexibility Provisions for short, medium, or long-term contracts and renewal options. |
Flexible contracts detailed for enterprises and financial institutions. | |
Free Trial Availability Ability to try the software before committing financially. |
Free trial options or pilot programs occasionally referenced by sales team. | |
Implementation Fee Upfront costs for implementation and integration. |
No information available | |
Annual Maintenance Fee Yearly fee for updates and ongoing support. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.