• SpearWatch eSpear LLC SpearWatch is the most accurate screening engine in the industry. Highest recall (no false negatives) and precision (fewest false positives). ...
  • Investigatior / D3 Arachnys D3 - Bespoke workflows - Over 16,000 available data sources in 200+ countries - Create repeatable workflows to match internal processes ...
  • Topaz Trace Top Systems The current fast changing global economy implies a higher degree of risk for every successful business step taken. - While those involved in ...
  • KYC FICO Customer acceptance is crucial for the fight against white-collar crime. It is the first hurdle to overcome enabling criminals to misuse the ...
  • IT-based Anti-Money Laundering FICO Money-laundering introduces illegal assets from drug trafficking, prostitution, illegal gambling, or arms trade into the legal financial and ...
  • Screen Temenos wo smart solutions - As the rise in terrorist activity and the number of sophisticated criminals increases, so does the complexity in ...
  • Watch List Filtering Nice Actimize Increasing sanc​​tions violations in a complex global business environment - It is critical that your firm successfully screen transactions ...
  • Watchlist Filtering FIS Customized Software and Data Solutions - At FIS™, we integrate our databank lists with watchlist filtering tools to create software and data ...
  • Bridger Insight® XG LexisNexis Bridger Insight® XG is designed to conduct due diligence, comply with global regulations and reduce fraud risks via a single platform. - ...
  • FinScan Innovative Systems Businesses today are becoming more global in order to meet shareholder objectives. At the same time, money laundering and terrorist financing ...
  • Watch List Filtering Fiserv Watch List Filtering from Fiserv supports real-time screening of SWIFT payments – Fiserv is a SWIFT certified partner – as well as batch ...
  • NetReveal Sanctions Filtering and Payment Fraud Detection BAE Systems Our NetReveal Sanctions and Politically Exposed Persons (PEP) screening solution helps you to comply with internal, domestic and ...
  • WatchDog CSI Watch List Screening Solutions - With CSI’s regulatory compliance software, WatchDOG® Elite, ensuring compliance with OFAC regulations for ...
  • Compliance Link Accuity An enterprise wide solution to reduce false positives.
  • KYCCube kyc cube KYC Cube Ltd helps regulated companies to minimize the regulatory risks associated with KYC, and to protect their organizations from becoming ...
search results
no results
Throbber
Show results & filters

EVALUATING AML SOFTWARE SOLUTIONS 

AML business requirements are supported as follows:

  • Customer identity management checks clients against various watch lists as part of Know your customer (KYC) requirements. 
  • Transaction monitoring systems, focus identifying and alerting managers to suspicious transactions.
  • Investigations management and Suspicious Activity Reports (SARs) or Suspicious Transaction Reports (STRs). 
  • Currency Transaction Reporting (CTR) systems, which deal with large cash transaction reporting
  • GRC compliance CRM software to help firms comply holistically with regulation including with AML regs.

Key functional areas covered in the guid:

  • Access CIP and other demographic information   
  • Alert ranking   
  • Alerts   
  • Auto add false positives to white list   
  • Automated business rules   
  • Behaviour profiling   
  • Constrain scenarios by any data attribute   
  • Customer risk scoring   
  • Detects trend suggesting suspicious behaviour   
  • Entity link analysis   
  • Factor histories   
  • False Positive Reduction   
  • Filter tolerance controls to reduce false positives   
  • Flexible suppression   
  • Investigators work queue   
  • Manual override   
  • Multiple scenarios / database scan   
  • Past trends analysis   
  • Peer group analysis   
  • Penalties management   
  • Predictive modes   
  • Rapid access to customer, account and transaction data   
  • Recovery and resolution management   
  • Review triggering transactions   
  • Scenarios and risk factors applied to transactions to detect suspicious activity   
  • Schema for preparing data analysis   
  • Scores suspicious clients   
  • Supports multiple data types   
  • Watch list screening   
  • Watchlist Data
  • AML Optimization
  • Case management
  • Data management
  • Investigation and alert management
  • Suspicious activity monitoring