HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This solution offers a comprehensive KYC and AML monitoring framework, enhancing fraud detection and compliance via automated processes and risk scoring.
Tools for anti-money laundering screening, know-your-customer processes, and sanctions checking to ensure compliance with financial crime prevention regulations.
More AML and KYC Solutions
More Risk & Compliance ...
Digital Document Capture Ability to capture and upload client documents electronically. |
FICO TONBELLER supports electronic capture and upload of client documents as part of its onboarding solution, per solution brochures. | |
Biometric Verification Use of fingerprint, facial recognition, or other biometrics for identity verification. |
Biometric verification (e.g., facial recognition, fingerprint) is stated as an option for enhanced identity verification. | |
E-signature Integration Support for electronic signature workflows for onboarding agreements. |
Product documentation lists e-signature workflows for onboarding agreements as a capability. | |
Real-time ID Verification Immediate validation of government-issued IDs using integrations with official databases. |
Immediate government-issued ID validation via integrations is mentioned in solution summaries. | |
Sanctions and Watchlist Screening Automated screening of new clients against global sanctions and watchlists. |
FICO TONBELLER performs watchlist and sanctions screening as a core function. | |
Automated Risk Scoring System-generated risk scores based on client profile and behavior. |
Automated risk scoring based on customer information and behavior is a highlighted feature. | |
Onboarding Time Average time taken to onboard a new client end-to-end. |
No information available | |
KYC Form Generation Automatic generation and pre-filling of regulatory KYC forms. |
Marketing materials reference automatic generation and pre-filling of KYC forms. | |
Multi-language Support Ability to provide the onboarding experience in multiple languages. |
Supports onboarding in multiple languages, according to global implementation documentation. | |
Mobile Onboarding Support for mobile/web-friendly onboarding processes. |
FICO TONBELLER offers mobile/web-compatible onboarding interfaces. | |
Duplicate Detection Detection of duplicate or suspicious client entries during onboarding. |
Duplicate and suspicious entry detection is explicitly supported in KYC documentation. | |
Automatic PEP Identification Identification of Politically Exposed Persons during onboarding. |
PEP (Politically Exposed Person) identification is a documented capability. | |
Customizable Workflows Ability to adapt onboarding steps for different client types or risk profiles. |
Customizable onboarding workflows for different client types are highlighted. |
Continuous Sanctions Screening Automated, recurring checks against updated sanctions and watchlists. |
Continuous and recurring sanctions screening is mentioned in ongoing monitoring sections. | |
Adverse Media Monitoring Scanning for negative news and media about clients in real-time. |
Adverse media/negative news screening is incorporated as part of the KYC/AML risk assessment. | |
Transaction Monitoring Automated analysis of transactions to detect suspicious or anomalous activity. |
Automated transaction monitoring to detect suspicious activity is a headline use case for FICO TONBELLER. | |
Alert Generation System generation of alerts for potential AML/KYC violations. |
System-generated AML alerting is documented as a core feature. | |
False Positive Rate Proportion of alerts found to require no further investigation. |
No information available | |
Rule-based Alerting Configurable rules to tailor alert logic to business and regulatory needs. |
Rule-based alerting, with configurable rule engines, is detailed in product overviews. | |
Machine Learning-Based Anomaly Detection Advanced analytics using ML algorithms to spot unusual patterns in data. |
Machine learning-based anomaly detection is marketed as enhancing the effectiveness of AML controls. | |
Volume Processed Average number of clients or transactions screened per day. |
No information available | |
Customizable Screening Intervals Ability to configure how frequently clients are re-screened. |
Screening intervals can be customized as noted in user configuration guides. | |
Auto-Remediation Tools Automated workflows for routine remediation and case closure. |
Automatic remediation/case closure workflows are included in the platform's feature list. | |
Escalation Management Tools to escalate high-risk findings to compliance teams. |
Escalation for high-risk cases to compliance teams is supported and configurable. | |
Watchlist Coverage Breadth Number of global and regional lists covered. |
No information available | |
Audit Log Retention Length of time audit logs are retained. |
No information available |
Centralized Case Tracking A unified dashboard and database for managing active and historical compliance cases. |
Unification of active and historical cases into one dashboard is promoted as a product advantage. | |
Automatic Case Creation Automatic opening of investigation cases when alerts are triggered. |
Automatic alert-to-case creation exists for compliance management. | |
Collaborative Workflows Support for multiple team members to work on the same case with proper controls. |
Support for collaborative resolution on cases is stated in solution literature. | |
Task Assignment & Queueing Ability to assign cases and tasks to specific team members. |
Task assignment and queue features are listed in the product's workflow tools. | |
Timeline Auditing Comprehensive timeline logs showing all actions, comments, and decisions. |
No information available | |
Case Closing Time Average time from case opening to closing. |
No information available | |
Evidence Management Central storage and organization for case-related supporting documentation. |
Document management and central storage for case evidence are supported. | |
Case Prioritization Support for automatic or manual prioritization based on risk or urgency. |
Supports both auto- and manual risk-based prioritization of cases. | |
Automated Reporting to Authorities Ability to generate and submit regulatory filings (e.g., Suspicious Activity Reports). |
Automated suspicious activity report (SAR) generation is featured as a regulatory compliance tool. | |
Customizable Templates Editable templates for common investigation procedures and documentation. |
Custom templates for investigation documents, workflow, and reports are enabled. | |
User Access Controls Granular permissions to limit access to sensitive case information. |
Granular user-level access controls for case data are built in. | |
Case Searchability Advanced search and filter capabilities for all case data. |
All case data is fully searchable and filterable via advanced query tools. |
API Access Comprehensive APIs for integrating with CRM, core banking, or investment platforms. |
RESTful API and integration documentation available for external interoperability. | |
Batch Data Uploads Support for bulk import/export of client or transaction data. |
Bulk import/export (batch data uploads) are supported per integration guides. | |
Third-Party Data Integration Integrations with external data providers (e.g., credit bureaus, public records). |
Integration with external/third-party data sources like credit bureaus is part of the offering. | |
Regulatory File Format Support Ability to ingest and export data in required regulatory formats (XML, CSV, etc.). |
Regulatory XML, CSV and other standard file type support is documented. | |
Real-Time Data Sync Ability to send and receive data in real-time with other business systems. |
Real-time data synchronization is available via API/webhook mechanisms. | |
Webhook Support Support for push notifications and real-time updates via webhooks. |
No information available | |
Integration Time Average time required to implement out-of-the-box integrations. |
No information available | |
Standardized APIs (REST/SOAP) Availability of modern REST or SOAP APIs. |
APIs conform to open standards including REST. | |
Single Sign-On (SSO) Support for SSO with enterprise identity providers. |
Single Sign-On (SSO) is advertised as a supported authentication method. | |
Custom Connector Availability Readily available connectors for industry-specific tools and platforms. |
No information available | |
Cloud Platform Compatibility Support for integration with major cloud services (AWS, Azure, GCP). |
Available for AWS, Azure and other cloud stacks per implementation documentation. |
Automatic Regulatory Updates Regular updates reflecting new or amended laws and regulations. |
Product updates are aligned with regulatory changes and delivered regularly. | |
Geographic Regulation Coverage Number of jurisdictions/regulatory regimes supported. |
No information available | |
Configurable Reporting Rules Ability to customize rules to support specific local requirements. |
System rules and reports are customizable for local regulatory requirements. | |
Regulatory Change Alerts System notifications when compliance requirements change. |
Users receive automated system alerts after compliance requirements change. | |
Pre-built Regulatory Reports Templates for common regional reports (e.g., SAR, STR). |
Includes templates for standard regional filing (e.g. SAR). | |
AML Program Template Library Built-in templates for AML policy and procedure documents. |
No information available | |
Support for FATF Recommendations Alignment with Financial Action Task Force best practices. |
Stated alignment with FATF guidance in public materials. | |
Data Residency Configurability Ability to store data in specific jurisdictions to comply with local laws. |
Data can be stored in specified jurisdictions to comply with local data laws. | |
Audit Trail Completeness Coverage and detail level in logs for regulatory audits. |
Comprehensive and audit-traceable logs are standard. | |
Electronic Filing Support Ability to file reports directly with regulatory agencies electronically. |
Direct electronic filing of reports supported for eligible jurisdictions. | |
Regulatory Certification Product holds certifications verifying regulatory compliance (e.g., SOC2, ISO 27001). |
Certified to international standards (e.g. ISO 27001), as listed on vendor site. |
Intuitive Interface Modern, user-friendly dashboard and navigation. |
Modern and intuitive user interface highlighted in marketing materials and user testimonials. | |
Role-based Dashboards Customized UI and data views for different user roles. |
No information available | |
Search and Filter Tools Advanced filtering and search across all compliance data. |
No information available | |
Bulk Actions Perform actions or updates on multiple records simultaneously. |
No information available | |
Customizable Notifications Users can set preferences for system alerts and notifications. |
No information available | |
Accessibility Features Support for users with disabilities (e.g., screen reader compatibility). |
No information available | |
Multi-device Support Usable across desktop, tablet, and mobile devices. |
No information available | |
User Training Materials Built-in guides, tutorials, and help resources. |
No information available | |
Customizable Workspaces Personalized home screens and workflow layouts. |
No information available | |
Localization Settings Support for local time zones, currencies, and date formats. |
No information available | |
Queue Management Efficient prioritization and handling of user tasks and queues. |
No information available |
Custom Report Builder Tool to build custom reports from compliance data. |
No information available | |
Scheduled Reporting Automated routine delivery of compliance and risk reports. |
No information available | |
Export Formats Range of available export formats (PDF, CSV, XLSX, etc.). |
No information available | |
Dashboard Analytics Real-time dashboards for monitoring key AML/KYC metrics. |
No information available | |
Investigative Statistics Aggregate data on investigations, case closures, and alert resolution. |
No information available | |
Alert Volume Analytics Reports quantifying alerts generated over time. |
No information available | |
Regulatory Filing Logs Detailed logs of past regulatory filings and deadlines. |
No information available | |
Dashboard Refresh Rate Frequency with which live dashboards are updated. |
No information available | |
Audit-Ready Reports Reports configured to satisfy audit requirements. |
No information available | |
Case Productivity Metrics KPIs on team performance and case handling speed. |
No information available | |
Data Visualization Tools Built-in graphs, charts, and data visualization capabilities. |
No information available |
End-to-End Encryption All data encrypted at rest and in transit. |
No information available | |
Role-Based Access Control (RBAC) Policy-driven access restrictions based on employee roles. |
No information available | |
Multi-factor Authentication Requirement for multiple methods of identity verification. |
No information available | |
Data Masking Automatic obfuscation of sensitive fields in UI and exports. |
No information available | |
Granular Audit Logs Detailed records of all data access and changes. |
No information available | |
GDPR Compliance Features supporting General Data Protection Regulation requirements. |
No information available | |
Data Deletion and Retention Automated procedures for retention and secure deletion of records. |
No information available | |
Secure Data Export/Import Encrypted transfers of data during bulk export/import. |
No information available | |
Penetration Testing Frequency How often the system undergoes security testing. |
No information available | |
Data Breach Notification Tools Capabilities to identify, report, and manage data breaches. |
No information available | |
Redaction Tools Built-in support for redacting sensitive data upon request. |
No information available |
Concurrent User Support Maximum number of simultaneously active users supported. |
No information available | |
Transaction Processing Speed Average time to process a compliance check on a transaction. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored natively. |
No information available | |
Uptime SLA Guaranteed system availability as a Service Level Agreement. |
No information available | |
Disaster Recovery Time Objective (RTO) Time required to restore systems following an outage. |
No information available | |
Elastic Compute Ability to dynamically allocate computing resources under load. |
No information available | |
Batch Processing Throughput Number of clients/transactions processed per batch. |
No information available | |
Latency Monitoring Tools for measuring and alerting on API/processing latency. |
No information available | |
Geographic Load Distribution Use of data centers in multiple regions for workload balancing. |
No information available | |
Auto-scaling Capabilities Automatic scaling of resources based on user or transaction volume. |
No information available |
24/7 Multichannel Support Availability of technical and compliance support at all hours via multiple channels. |
No information available | |
Dedicated Account Manager Assignment of a named relationship manager for client queries. |
No information available | |
Onboarding & Training Services Provision of user onboarding and comprehensive training. |
No information available | |
SLAs for Issue Resolution Defined escalation paths and timeframes for issue resolution. |
No information available | |
User Community Access Forums, events, and online communities for shared knowledge. |
No information available | |
Comprehensive Documentation Up-to-date documentation, user guides, and FAQs. |
No information available | |
Product Roadmap Transparency Visibility into upcoming features and planned improvements. |
No information available | |
Change Management Support Guidance and tools for deploying updates and system changes. |
No information available | |
SLAs for System Uptime Service guarantees for application and API availability. |
No information available | |
Feature Request Process Formal mechanism for clients to request improvements. |
No information available |
Transparent Pricing Full disclosure of all fees, including setup, support, and maintenance. |
No information available | |
Modular Licensing Ability to license and pay for only required functions. |
No information available | |
Scalable Pricing Tiers Pricing flexibility as business and usage scales. |
No information available | |
Pay-per-use Model Option for consumption-based pricing. |
No information available | |
No Hidden Fees No undisclosed or unanticipated charges outside standard pricing. |
No information available | |
Volume Discounts Discounted pricing for large numbers of users or transactions. |
No information available | |
Contract Flexibility Provisions for short, medium, or long-term contracts and renewal options. |
No information available | |
Free Trial Availability Ability to try the software before committing financially. |
No information available | |
Implementation Fee Upfront costs for implementation and integration. |
No information available | |
Annual Maintenance Fee Yearly fee for updates and ongoing support. |
No information available |
Solutions that monitor transactions, identify suspicious activities, and ensure compliance with anti-money laundering and fraud prevention regulations.
More Anti-Fraud and AML Compliance Systems
More Compliance and Legal ...
Real-Time Monitoring Ability to evaluate transactions in real-time for potential fraud or AML risks. |
Official documentation and solution overview note real-time monitoring for fraud and AML risks. | |
Batch Analysis Supports retrospective analysis of large volumes of historical transactions. |
Marketing materials state support for retrospective, batch analysis as part of AML programs. | |
Rule-Based Detection Customizable rules or scenarios to flag specific types of suspicious activity. |
Rule-based detection is a key operational component as described in solution brochures and case studies. | |
Machine Learning Detection Utilizes machine learning models to identify anomalies and advanced fraud schemes. |
Machine learning for anomaly and advanced fraud detection is explicitly referenced on the vendor’s site. | |
Pattern Recognition Detects complex fraud patterns by analyzing customer and claim behaviors. |
Pattern recognition via behavioral analysis is part of the fraud detection engine described by FICO. | |
Alert Generation Speed How quickly alerts are raised after detection of suspicious activity. |
No information available | |
False Positive Rate Percentage of flagged alerts that turn out to be non-fraudulent. |
No information available | |
Threshold Adjustment Allows dynamic setting of thresholds for alert generation. |
Thresholds and alert sensitivity are configurable per FICO solution guides. | |
High-Risk List Screening Checks transactions against lists like OFAC, PEPs, and internal blacklists. |
High-risk list screening (OFAC, PEP, blacklists) is described in official feature lists. | |
Behavioral Analytics Monitors user and account behavior for changes that may indicate fraud. |
Behavioral analytics are central to fraud detection, as detailed in solution architecture docs. | |
Case Management Integration Links suspicious transactions directly to investigation workflows. |
Case management is integrated with the monitoring and investigation workflow. | |
Customizable Workflows Ability to adapt workflows to the insurer’s unique requirements. |
Customizable workflows cited in product overviews and implementation materials. | |
Geolocation Tracking Monitors transactions and activities for location anomalies. |
Geolocation tracking is included for transaction anomaly detection. | |
API Access Availability of API endpoints for event/transaction data input and results output. |
API access (REST/SOAP) for data input/output is listed in integration documentation. | |
Historical Data Support Handles long-term storage and analysis of transaction records. |
Historical data handling and long-term retention described in compliance features. |
Identity Verification Automated verification of customer identity documents. |
Automated identity verification is included as part of the KYC module. | |
Risk Scoring Assigns risk scores to customers based on profile and transaction history. |
Automated and manual risk scoring described throughout FICO compliance documentation. | |
Sanctions Screening Checks customers against global and domestic sanction lists. |
Sanctions screening (global/domestic) is one of the core KYC/AML functions. | |
Politically Exposed Person (PEP) Screening Identifies and flags politically exposed persons during onboarding and ongoing monitoring. |
PEP screening is specifically referenced in product datasheets as an onboarding and monitoring feature. | |
Adverse Media Checks Regularly screens for negative news or legal actions associated with customers. |
Adverse media checks are part of ongoing due diligence and mentioned in FICO’s KYC offering. | |
Automated Document Extraction Extracts and analyzes data from submitted identification documents. |
Automated document extraction is offered in eKYC onboarding and renewal modules. | |
Ongoing Customer Monitoring Periodically reassesses customers for potential risk changes. |
Ongoing customer monitoring is highlighted as a key benefit in product literature. | |
Enhanced Due Diligence (EDD) Extra checks for high-risk customers, including deeper background checks and monitoring. |
Enhanced due diligence is available for high-risk profiles, as per product details. | |
Custom Risk Rules Create and adapt risk rules for specific products or geographies. |
Custom rules for risk scoring and detection are configurable in the admin interface. | |
Customer Data Storage Duration Duration for which customer due diligence data is retained. |
No information available | |
ID Verification Time Average time required to verify customer identity. |
No information available | |
Blacklist Integration Supports custom and industry blacklists for screening. |
Blacklist integration for external and custom lists is documented in KYC/AML integration. | |
Bulk Processing Capability Ability to verify large volumes of customers simultaneously. |
Bulk processing for KYC verification and screenings is described as a capability. | |
Multi-language Support Availability of customer verification in multiple languages. |
Multi-language support for KYC is mentioned on the FICO website. | |
Investor Suitability Checks Evaluates customer suitability for insurance products based on profile. |
No information available |
Automated Case Creation Automatically opens cases when alerts are triggered. |
The system includes automated case creation from alerts, per case management workflow details. | |
Investigator Assignment Assigns cases to appropriate teams or individuals for review. |
Investigator assignment and routing is a described workflow component. | |
Case Prioritization Automatically prioritizes cases based on severity and risk. |
Case prioritization (risk, severity) is listed in both case management and alerting sections. | |
Evidence Attachment Stores all related documents, proofs, or analytics with a case record. |
Evidence/document attachment to case files is explicitly supported. | |
Case Status Tracking Monitors and updates the progress of the investigation. |
Case status tracking features are present in workflow/process monitoring. | |
Audit Trails Detailed histories and logs of all case actions for compliance. |
Audit trails (case and regulatory) included for end-to-end compliance. | |
Notes and Collaboration Allows multiple investigators to add notes and collaborate on a case. |
Multi-user case collaboration (notes and shared workspaces) available. | |
Automated Escalation Rules Escalate cases based on predefined rules or deadlines. |
Automated escalation rules for investigation and compliance are documented. | |
Role-based Access Control Restricts access to sensitive case data based on roles. |
Role-based access control detailed as a key security feature. | |
Case Resolution Time Average time to resolve an investigation case. |
No information available | |
Case Reassignment Ability to transfer cases between investigators or teams. |
Case reassignment and workflow routing are documented in process management features. | |
Case Linking Links related cases for context in wider investigations. |
Case linking and related-case analysis described in FICO’s case investigation platform. | |
Automated SAR/STR Drafting System assists in creating Suspicious Activity/Transaction Reports. |
SAR/STR drafting automation is explicitly mentioned for regulatory compliance. | |
External Data Integration Link case investigations to third-party or external databases. |
External data integration, such as third-party lists/databases, is supported. | |
Case Analytics Aggregate and analyze case data for trends and improvements. |
Case analytics available for trend and performance monitoring. |
Automated SAR/STR Filing Systematically prepares and submits suspicious activity reports to authorities. |
Automated SAR/STR filing supported via electronic interfaces, per regulatory feature set. | |
Currency Transaction Report Automation Handles volume-based reports (like CTRs) for high-value transactions. |
CTR automation feature referenced for high-value transaction compliance. | |
Regulatory Format Compliance Processes and exports reports in regulator-mandated formats. |
FICO provides regulatory format support/export for SAR, CTR filings, etc. | |
Regulation Library Maintains up-to-date regulatory requirements. |
Solution maintains a regulation library for ongoing compliance. | |
Report Filing Audit Trail Keeps a detailed log of all report generations and submissions. |
Filing audit trails and submission logs are referenced in compliance reporting. | |
Submission Confirmation Receipt Stores official acknowledgments of filed reports. |
Submission confirmation receipts for reports are part of regulatory assurance. | |
Reporting Timeliness Average time from identification to report filing. |
No information available | |
Automated Data Validation Checks completeness and accuracy of reports prior to submission. |
Automated data validation for completeness and correctness before submission. | |
Bulk Reporting Capability Enables batch generation and filing of large numbers of reports. |
Bulk reporting described in system scale and enterprise deployments. | |
Multi-Jurisdiction Support Supports simultaneous compliance with regulations across countries/regions. |
Multi-jurisdiction reporting support cited in FICO's global compliance suite. | |
Automated Filing Scheduling Configurable scheduling for recurring regulatory filings. |
Automated scheduling for regulatory filings referenced in product guides. | |
Template Customization Allows editing of report templates to match specific regulatory needs. |
No information available | |
E-signature Integration Permits digital signing and approval of regulatory reports. |
No information available | |
Alert-to-Reporting Automation Directly escalates flagged alerts to the regulatory reporting workflow. |
No information available | |
XML/XBRL Export Exports reports in structured formats for electronic submission. |
XML/XBRL export for electronic submission is listed in regulatory compliance features. |
Single Sign-On (SSO) Supports enterprise authentication systems for secure user login. |
Single sign-on (SSO) is available using enterprise identity providers. | |
Multi-Factor Authentication (MFA) Adds extra account protection during login. |
Multi-factor authentication is described as an access control option. | |
Role-Based Permissions User access is granted according to job function or responsibility. |
Role-based permissions configurable for user and admin profiles. | |
User Activity Logging Comprehensive logs of all user activity for auditing. |
User activity logging is part of the compliance/security module. | |
Inactive User Timeout System automatically logs out inactive users. |
Automatic logout due to inactivity mentioned in user management settings. | |
Granular Data Access Controls Fine-grained access management for different data and workflows. |
No information available | |
Password Policy Enforcement Ability to enforce password expiry and complexity requirements. |
No information available | |
Encryption of Data at Rest Ensures all stored data is encrypted. |
All stored data is encrypted, fulfilling encryption at rest requirements. | |
Encryption of Data in Transit Secures data exchanged between components and external parties. |
Data in transit is encrypted per regulatory/IT security standards. | |
User Session Monitoring Tracks and manages concurrent user logins and sessions. |
No information available | |
Access Revocation Speed Average time to revoke user access upon termination or suspicion. |
No information available | |
Privileged Access Monitoring Monitors usage of elevated privileges or admin accounts. |
Privileged access usage is monitored and audited. | |
Compliance with Security Standards Conforms with standards like ISO 27001, SOC 2, etc. |
Compliance with ISO 27001, SOC 2, and similar standards cited on FICO compliance information. | |
Integration with IAM Solutions Works with third-party identity and access management systems. |
Integration with IAM solutions (e.g., Active Directory, Okta) is supported. | |
Audit-ready Reporting Ability to generate user access and activity reports for audits. |
Audit-ready reporting for user activity and compliance is available. |
Open API Availability Supports open APIs for inbound and outbound data exchange. |
Open API (REST, SOAP) for connectivity documented in integration/technical docs. | |
Pre-built Connectors Out-of-the-box integrations with industry leading core and claims systems. |
Pre-built connectors for integration with insurance/banking core systems are marketed. | |
Data Import Flexibility Supports diverse file formats (CSV, XML, JSON) for data intake. |
Supports data import in various formats (CSV, XML, JSON, etc.). | |
External Watchlist Integration Ability to import and update external sanctions/PEP watchlists. |
External watchlist imports supported for sanctions and PEP screening. | |
Webhook Support Real-time notifications and event forwarding to external systems. |
Webhooks and event-based notification features present in integration guides. | |
Legacy System Compatibility Facilitates interoperability with older insurance platforms. |
Interoperability with legacy systems cited as an advantage for insurance sector adoption. | |
Data Enrichment Integration Connects to third-party data providers for enrichment and validation. |
Data enrichment via 3rd party data providers is a highlighted function. | |
CRM Integration Direct connection with customer relationship management systems. |
No information available | |
Core Insurance System Integration Time Average time to integrate with main insurance platforms. |
No information available | |
Custom Mapping Tools Tools for mapping data fields and records to internal schemas. |
Custom mapping tools available for integration to client data schemas. | |
Data Export Automation Automated pushing of compliance data to external data warehouses. |
No information available | |
Batch Processing Support Handles large volumes of data during off-peak hours. |
Batch processing supported for large-scale imports and processing. | |
SOAP/REST API Support Compatibility with different web service technologies. |
REST and SOAP support for API integrations are confirmed in technical specifications. | |
Real-time Data Sync Instant synchronization with integrated systems. |
Real-time data sync is a feature for integration scenarios. | |
Customization Services Offers configuration and integration customization. |
Customization services available for configuration and integration. |
Customizable Alert Rules Enables creation and editing of alert rules and escalation paths. |
Alert rules are fully customizable and support complex escalation. | |
Multi-Channel Notification Supports notifications via email, SMS, dashboard, or instant messaging. |
Multi-channel notifications (email, SMS, dashboard, etc.) supported. | |
On-Call Scheduling Assigns alerts to on-duty investigators based on schedule. |
On-call/investigator scheduling referenced for large organizations. | |
Alert Suppression/Grouping Advanced rationalization to avoid duplicate or low-impact alerts. |
Alert grouping and suppression (deduplication) is implemented. | |
Severity Levels Categorizes alerts by threat level or regulatory risk. |
Severity and risk levels are assigned and categorized for alerts. | |
Alert Rate Throttling Controls the frequency of notifications to avoid overload. |
Alert throttling to avoid overload is configurable by system admins. | |
Notification Acknowledgement Requires recipients to confirm receipt of critical alerts. |
Notification acknowledgment workflow is described in product support documentation. | |
Alert Remediation Automation Automatically initiates certain actions based on alert type. |
Automated remediation available for certain alert types (e.g., instant blocking). | |
Escalation Matrix Configurable escalation workflows for unresolved issues. |
Escalation matrix for unresolved alerts/cases can be configured per org workflow. | |
Alert-to-Case Conversion Speed Average time for converting an alert into a case. |
No information available | |
Alert Retention Policy How long alerts are stored for review and audit. |
No information available | |
Visual Alert Dashboard Centralized, real-time alert and incident dashboard. |
Visual alert dashboard is part of the product UI as seen in screenshots and demos. | |
Real-Time Anomaly Notification Immediate notification of flagged anomalies or threats. |
Real-time anomaly alerting is emphasized in both technical and marketing literature. | |
Bulk Alert Management Handles large incident volumes efficiently. |
Bulk alert management capability referenced for FICO’s large enterprise deployments. | |
Integration with Incident Management Automatic logging of alerts in enterprise incident management systems. |
Integration with incident management (ITSM, compliance) systems available. |
Comprehensive Audit Trail Tracks all actions, configurations, and events for compliance validation. |
Comprehensive audit trail and compliance evidence included in product features. | |
Automated Compliance Checklists Guided checklists to ensure procedures are followed. |
Automated checklists for compliance and audit readiness mentioned on vendor site. | |
Regulatory Documentation Repository Centralized storage for all policy and regulatory documents. |
Document repository for regulations, policies, and procedures is a documented feature. | |
Policy Change Logging Tracks and logs every change to compliance policies. |
Every policy change is logged for compliance review. | |
Automated Audit Preparation Prepares documentation and evidence for audits. |
Preparation tools for audit processes and evidence gathering supported. | |
Third-party Auditor Access Grants temporary access to auditors for system review. |
Temporary auditor access is available by design to enable external reviews/audits. | |
Gap Analysis Tools Identifies areas of non-compliance or risk. |
Gap and risk analysis tools referenced on product compliance page. | |
Compliance Dashboard Visual overview of compliance status and activities. |
Compliance dashboard for overview and tracking highlighted in UI overviews. | |
Audit-ready Data Export Exports required audit data on demand. |
Audit-ready export of case/activity data included for compliance audits. | |
Policy Version Control Maintains a version history of all compliance policies. |
Version history maintained for all compliance policies. | |
Automated Reminders Notifies users of upcoming compliance tasks and deadlines. |
Automated reminders for compliance reviews, certifications, and tasks. | |
Control Effectiveness Ratings Tracks effectiveness of implemented compliance controls. |
Tracking of control effectiveness is described in compliance workflow section. | |
Compliance Training Tracking Monitors completion rates for required training modules. |
Compliance training tracking (module completion) referenced for larger enterprise use. | |
Exception Management Manages and documents compliance/AML exceptions. |
Exception handling/logging for compliance exceptions detailed as a core process. | |
Audit Trail Data Retention Duration for which audit trail data is kept. |
No information available |
Data Validation Checks for completeness, accuracy, and correctness upon data entry. |
Automated validation upon data entry described as a central data quality control. | |
Data Cleansing Automated correction and standardization of input data. |
Data cleansing (standardization, correction) is supported for import/entry. | |
Duplicate Detection Identifies duplicate or redundant entries within the data. |
Duplicate detection and management described in technical guides. | |
Data Lineage Tracking Monitors the history and journey of data across the system. |
System tracks data lineage for auditability. | |
Field-level Encryption Protects sensitive fields with granular encryption. |
Field-level encryption supported per security architecture documents. | |
Data Backup Frequency How often backups of critical data are performed. |
No information available | |
Data Restoration Time Average time to restore data from backup. |
No information available | |
Data Retention Policy Compliance Conformance to regulatory or organizational data retention requirements. |
Retention policy customization and compliance cited in regulatory documentation. | |
Metadata Management Captures descriptive information about each data asset. |
Metadata management is included for all data assets in the compliance suite. | |
Audit Logs on Data Changes Maintains logs of changes to any compliance data. |
Data change logs/audit logs maintained for all compliance-relevant records. | |
Automated Data Archiving Moves older data to secure storage locations automatically. |
Automated data archiving of aged data is referenced in platform overviews. | |
Redundancy and Failover Duplicate data and process paths to ensure availability. |
Redundancy/failover detailed for high-availability installations. | |
Data Access Monitoring Monitors and logs every access to sensitive or critical data. |
Data access monitors and logs are available for all access to sensitive records. | |
Data Masking Conceals confidential data when displayed or exported. |
Data masking is available for exports, display, and reporting scenarios. | |
GDPR/CCPA Compliance Meets international privacy and data governance regulations. |
GDPR/CCPA compliance supported, referenced in product compliance claims. |
Custom Dashboard Creation Allows users to create personalized analytics dashboards. |
Custom analytics/dashboard creation cited in reporting capabilities. | |
Pre-built Reports Library of standard reports for compliance and fraud monitoring. |
Pre-built compliance and fraud monitoring reports included. | |
Ad Hoc Query Capability Users can create custom queries and reports on demand. |
Ad-hoc report/query generation supported for power users and analysts. | |
Drill-down Analytics Ability to explore analytics from summary views into detailed views. |
Drill-down from summary to detailed views is supported in reporting UI. | |
Scheduled Reporting Automatic report generation and distribution on a fixed schedule. |
Scheduled reporting and distribution available for compliance/audit teams. | |
Historical Trend Analysis Analyzes changes and patterns over time in compliance activities. |
Historical trend analysis for risk/compliance data is supported. | |
Alert/Case Analytics In-depth analysis of alert and case performance and statistics. |
Alert and case analytics tools included in the platform UI. | |
Export Formats Range of formats (PDF, Excel, CSV, etc.) for exported reports. |
Multiple file export formats (PDF, Excel, CSV, etc.) supported. | |
Interactive Data Visualization Dynamic charts, graphs, and heatmaps for visual analysis. |
Interactive visualizations (charts, graphs) seen in product demos. | |
User Level Analytics Tracks productivity and actions by investigator or reviewer. |
User-level analytics for productivity and review efficiency are available. | |
Regulatory KPI Tracking Monitors compliance with regulatory key performance indicators. |
Regulatory KPI dashboards/tracking are part of the compliance management suite. | |
Report Delivery Time Average time to generate and deliver standard reports. |
No information available | |
Live Data Feeds Real-time streaming of analytics and monitoring metrics. |
Live analytics/monitoring feeds offered for ongoing risk/compliance review. | |
Cohort Analysis Analyze behavior and outcomes for customer/claim segments. |
Cohort analysis supported for segmentation analysis in case/customer reviews. | |
Self-Service Reporting Non-technical users can access and build their own reports. |
Self-service reporting for non-technical users described in reporting framework. |
User Interface Simplicity Easy to use and navigate for all user roles. |
UI is designed for ease of use, with positive feedback from market users. | |
Role-specific Views Improves productivity through customized dashboards for different roles. |
Role-specific dashboards/views discussed in implementation examples. | |
Contextual Help In-app assistance and training resources available. |
Context-sensitive help and training resources built into the interface. | |
Onboarding Support Comprehensive training and onboarding for new teams. |
Comprehensive onboarding training for new users/teams is available. | |
24/7 Technical Support Round-the-clock technical support availability. |
24/7 technical support offered for enterprise clients. | |
Multi-language User Interface Supports multiple languages for global teams. |
Multi-language interface is available for global deployments. | |
User Feedback Mechanism Easy submission of user feedback and product suggestions. |
User feedback can be submitted via in-app forms and support portal. | |
System Uptime Guarantee Percentage of time the system is guaranteed to be operational. |
No information available | |
Release Frequency Average time between major product updates. |
No information available | |
Knowledge Base Access Documentation and FAQs available for self-service help. |
Self-service knowledge base (docs, FAQs) is maintained online. | |
Customizable User Preferences Users can personalize display, notifications, and workflow settings. |
User can personalize notifications, dashboard, and certain workflow preferences. | |
Accessibility Compliance Meets standards for barrier-free access (WCAG, ADA). |
Accessibility compliance (WCAG/ADA) referenced in product claims. | |
Guided Walkthroughs Built-in tutorials and interactive walkthroughs for new features. |
No information available | |
Mobile Compatibility Available on mobile or responsive to mobile browsers. |
Mobile compatibility is cited as part of recent platform updates. | |
Change Management Support Tools and resources to help teams adopt new workflows. |
Change management resources and support available for onboarding/adoption. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.