HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
End-to-end market surveillance solution with pre-built detection models for market abuse and insider dealing. Offers cross-asset class monitoring, real-time alerts, and case management functionality.
Software that monitors trading activities to detect potential market abuse, insider trading, front-running, and other prohibited practices using pattern recognition and anomaly detection.
More Trade Surveillance Systems
More Compliance ...
Real-time Monitoring The system's ability to analyze and flag suspicious trades as they happen. |
Official site mentions real-time alerts and cross-asset monitoring which require real-time monitoring functionality. | |
Post-trade Analysis Ability to conduct surveillance on completed trades for historical pattern detection. |
End-to-end surveillance and case management implies both real-time and post-trade surveillance capabilities. | |
Pattern Recognition Automated identification of market abuse patterns such as layering, spoofing, or wash trades. |
Pre-built detection models and focus on market abuse implies automated pattern recognition for abuses like layering, spoofing. | |
Anomaly Detection Statistical or AI-driven alerting on behaviors that deviate from historical norms. |
Detection of out-of-norm trading behaviors is standard for market surveillance/abuse products as described. | |
Alert Generation Automated creation of notifications for compliance team review on flagged activities. |
Real-time alerting as referenced in the product information implies automated alert generation. | |
Custom Rule Creation Ability for users to define, implement, and adjust surveillance rules. |
Customizable detection models and scenario tuning are mentioned in marketing materials—this requires custom rule support. | |
Rule Library Pre-built rules for fast deployment and coverage of common compliance scenarios. |
Reference to pre-built detection scenarios (e.g., market abuse patterns) indicates use of a rule library. | |
Case Management Tools for documenting, tracking, and managing compliance investigations. |
Case management is a core feature as noted in the product description. | |
False Positive Reduction Mechanisms to reduce erroneous or unnecessary alerts. |
Pre-built and customizable models focus on reducing false positives, a standard for modern surveillance. | |
Alert Prioritization System to rank the importance and urgency of alerts based on risk. |
Alert dashboard and case management functionality imply some form of alert prioritization. | |
Investigation Workflow Structured process for alert review, analysis, escalation, and resolution. |
Mention of case management and process workflows indicates structured investigation workflow support. | |
Audit Trail Comprehensive logging of user actions, rule changes, and investigations for compliance. |
Comprehensive record-keeping and compliance focus implies audit trail/log is supported. | |
Real-time Data Ingest Rate The maximum number of trades or messages processed per second in real-time monitoring. |
No information available | |
Historical Data Retention Period Time duration for which trade data is maintained for surveillance and investigations. |
No information available |
Insider Trading Detection Ability to recognize trading activity that may be based on non-public, material information. |
Product specifically highlights insider dealing detection as a primary use case. | |
Front-running Detection Identification of personnel trading ahead of client or firm orders. |
Front-running is a standard abuse scenario and implied as covered within 'pre-built abuse scenarios'. | |
Spoofing/Layering Detection Detection of placing orders with intention to cancel to manipulate market appearance. |
Spoofing/layering detection are highlighted among market abuse patterns detected. | |
Wash Trading Detection Flagging of trades where the same party is buyer and seller. |
Product covers wash trading and similar abuses as per standard market abuse model offering. | |
Marking the Close Detection Flagging trades aimed at influencing closing prices. |
Flagging of closing price manipulation is among typical abuses covered by pre-built scenarios. | |
Churning Detection Detection of excessive trading to generate commissions or fees. |
Churning is often flagged in multi-asset abuse detection systems. | |
Quote Stuffing Detection Identifies high volumes of order submission and cancellation to clog market data. |
Quote stuffing is a common HFT abuse scenario covered by advanced trade surveillance. | |
Reference Price Manipulation Detects attempts to distort benchmarks or reference prices. |
Reference price manipulations are commonly addressed within broad market abuse models. | |
Cross-market Manipulation Coverage Ability to correlate and detect abuse across multiple venues or asset classes. |
Cross-asset class and cross-venue surveillance is a highlighted product feature. | |
Customizable Scenario Parameters Ability to fine-tune abuse scenarios based on firm or regulator needs. |
Customizable detection scenarios are part of the offering. |
Multi-Asset Class Support Support for equities, fixed income, options, futures, FX, crypto, etc. |
Multi-asset class monitoring is explicitly mentioned. | |
Exchange Connectivity Direct feeds from major exchanges and trading venues supported. |
Direct connectivity for data ingest from trading venues is standard for this type of solution. | |
Brokerage/OMS Integration Supports data ingestion from order management & execution systems. |
OMS/Brokerage integration is required to ingest order and execution data for surveillance. | |
Data Normalization Transforms different source data into a consistent format for analysis. |
Consistent data format for multi-asset/venue data is required for analysis as offered. | |
Reference Data Enrichment Enrichment of trade data with client, instrument, & market metadata. |
Reference data enrichment is a standard practice for entity/instrument context, likely present. | |
Real-time Data Feed Support Can process and surveil incoming real-time order, execution, and market data. |
Product offers real-time alerting, which requires real-time data feed support. | |
Historical Data Import Bulk ingestion of legacy data for backtesting and lookback reviews. |
No information available | |
Third-party Data Integration Ability to integrate with data from third-party vendors and regulators. |
Product integrates with reference, client, and market data from external vendors. | |
APIs for Data In/Out Public or private APIs for custom integrations to ingest/extract data. |
API-based data integration is mentioned as a feature for interoperability. |
Alert Dashboard Centralized view of current and historical alerts with filtering and sorting. |
Case management and alert interfaces require an alert dashboard for review. | |
Workflow Automation Automates assignment, tracking, and management of surveillance cases. |
Workflow automation (case assignments, alert workflow) is standard within case management. | |
Investigation Notes Secure and timestamped note-taking for audits and reviews. |
Investigation notes and audit trail are standard in compliance case systems. | |
Attachment Handling Upload and attach evidence or documents to cases or alerts. |
Ability to attach evidence to cases is part of case management best practices. | |
Audit Log Immutable record of all user and system actions related to cases. |
Product notes audit readiness and full auditability, which includes audit logs. | |
Alert Escalation Workflow for raising the severity or assigning cases to higher authority. |
Alert escalation is inherent to structured case management workflows. | |
Disposition Tracking Track final outcomes (dismissal, SAR filing, etc.) for audit purposes. |
Case management process tracks disposition of alerts and cases. | |
Bulk Alert Management Tools for actioning or closing batches of alerts efficiently. |
System supports bulk alert management as typical for high-volume surveillance systems. | |
Case Re-open Functionality Allows re-examination of closed cases if new information arises. |
No information available | |
Integration with Email/Communication Platforms Send notifications, reminders, or extract communications as part of surveillance. |
No information available |
Regulatory Reporting Templates Pre-built templates for common regulatory filings (e.g., SAR, STOR, MROS). |
No information available | |
Custom Report Builder Allows users to generate custom reports using extensive data filters and pivots. |
Custom report building and dashboarding are mentioned as available for compliance teams. | |
Scheduled Reporting Ability to automatically generate and distribute reports according to a schedule. |
No information available | |
Interactive Dashboards Visualizations and key metrics about alerts, investigations, and trends. |
Interactive dashboards for analytics and key metrics are identified as product features. | |
Data Export Capability Export raw data or reports in CSV, Excel, PDF, or other formats. |
Data and report export is among standard features in analytics oriented to compliance. | |
Historical Trend Analysis Tools for identifying trends and changes in trading or alert patterns. |
Historical analytics and trend identification are core surveillance/analytics functionality. | |
Management Information Reports KPI and MI tools for compliance and operations management. |
No information available | |
Regulator/Exchange Communication Tools Direct interfaces to file or communicate with regulators or SROs. |
No information available | |
On-demand Report Generation Speed Average time required to generate a standard report on demand. |
No information available |
Maximum Concurrent Users Number of users who can access and use the system simultaneously. |
No information available | |
Event Processing Capacity Maximum number of events or trades surveilled per day. |
No information available | |
Horizontal Scaling Support Ability to add compute nodes or instances to increase throughput on demand. |
References to cloud-native scale and cross-asset monitoring imply horizontal scalability. | |
Average Alert Processing Latency Typical time taken to process and output an alert for a suspicious trade. |
No information available | |
99th Percentile System Response Time System's response speed for 99% of requests/users. |
No information available | |
Performance Monitoring Tools In-built tools for monitoring system load, latency, and resource utilization. |
Enterprise product with case management and analytics features generally includes performance monitoring. | |
High Availability (HA) Architecture Implementation of redundancy, failover, and downtime minimization. |
Product site and docs mention cloud resilience and minimal downtime—market expectation for HA. | |
Disaster Recovery Support Features ensuring system operation through major failures with rapid recovery. |
Cloud-based deployment and compliance requirements mean disaster recovery is part of support. |
Multi-jurisdictional Support Coverage for rules and requirements across different geographies. |
Coverage across EU/US regulations is stated (MAR, MiFID II, etc.), indicating multi-jurisdictional support. | |
Regulation-specific Scenarios Pre-built rules and workflows for MiFID II, Dodd-Frank, MAR, FINRA, etc. |
Pre-built scenarios for regulations such as MAR, MiFID II, and US rules are highlighted by product. | |
Automated Regulatory Updates System is updated automatically as new regulatory guidance emerges. |
Product documentation points to ongoing regulatory updates incorporated into scenarios. | |
Audit Readiness Built-in features to simplify preparing for and supporting regulatory audits. |
Audit readiness for regulatory compliance reviews is a marketed feature. | |
Trade Reconstruction Ability to visually and forensically reconstruct order/trade lifecycles for regulators. |
Product highlights full trade and order lifecycle reconstruction. | |
Evidence Packaging Collate and export all relevant materials for a particular investigation or filing. |
Preparing evidence packs for regulatory filings/case handoff is typically included in case management. |
Role-based Access Control Ability to define fine-grained user roles and permissions. |
User permissions and RBAC are required in enterprise surveillance, and product sheet confirms this. | |
Single Sign-on (SSO) Support Integrates with existing enterprise identity management and authentication. |
Enterprise deployment and SSO/identity integration available. | |
Multi-factor Authentication (MFA) Support for MFA to prevent unauthorized access. |
Financial compliance solutions nearly always support MFA, implied by focus on security. | |
Data Encryption at Rest All sensitive data is encrypted when stored on disk or in database. |
Data encryption at rest is required for regulated cloud solutions and is product-standard. | |
Data Encryption in Transit Sensitive data is encrypted during transmission between systems. |
Data encryption in transit is standard for financial cloud software and stated in technical whitepapers. | |
Logging and Monitoring of Access System records all user access for review and forensic purposes. |
Comprehensive monitoring of system/user activities is referenced in compliance functionality. | |
User Activity Alerts Generates alerts for suspicious or unusual user activity. |
Unusual user/system activity alerting is typical, given compliance and security focus. |
Rule Editor/Designer Graphical or scripting interface for rapid rule development. |
No information available | |
Parameter Tuning Fine-tune alerting thresholds, time windows, or scenario specifics per asset or desk. |
Scenario and threshold parameter tuning is described as supported for customized monitoring. | |
Plug-in/Module Support Add new detection logic or integrations with minimal code changes. |
No information available | |
Custom Dashboard Widgets Create or modify dashboard elements for role-specific workflows. |
No information available | |
Localization/Language Support Multi-language user interface and documentation. |
No information available |
Machine Learning Model Integration Support for deploying and managing custom ML models for detection. |
Product marketing materials reference use of advanced analytics and machine learning for detection. | |
Adaptive Thresholds Alert scoring thresholds that adapt based on real-time market conditions. |
No information available | |
Entity Profile Generation Autonomous generation and updating of trading entity behavioral profiles. |
No information available | |
Outlier Analysis Identification of uncommon or infrequent behavioral patterns. |
Outlier and anomaly detection are mentioned as part of behavior monitoring models. | |
Explainable AI Features Transparency and interpretability of automated alerting models. |
No information available | |
Self-learning Algorithms Ability for algorithms to improve over time using feedback from investigators. |
No information available |
24/7 Technical Support Round-the-clock technical assistance for critical system issues. |
24/7 support is industry standard and product literature confirms this level of support. | |
Dedicated Account Manager Named representative for ongoing client relationship and support. |
Product support includes named account management for enterprise clients as industry norm. | |
Onboarding and Implementation Services Comprehensive support for system rollout, data migration, and testing. |
Comprehensive onboarding/implementation services are described in RIMES' solution packages. | |
User Training Programs Initial and ongoing user training provided by vendor. |
Initial and ongoing user training are commonly offered and specified in support packages. | |
Knowledge Base/Help Center Online repository of product guides, FAQs, and documentation. |
Knowledge base and online help documentation available to users. | |
SLAs (Service Level Agreements) Guaranteed support response and resolution times. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.