ComplyCube Features
Intelligence (4)
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Detection (7)
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Response (4)
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Analysis (3)
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (6)
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
Prevents previous committers of fraud from future transactions.
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Management (2)
Scheduled Data Checks
Schedule periodic (weekly, monthly, etc.) checks on existing address data to verify correctness and formatting.
Reporting
Produce reports and data visualization regarding address verification actions.
Functionality (4)
Address Verification
Checks address data against an authoritative address database (usually government).
Automation
Verify addresses automatically on the data source as new entries are added.
Cleansing
Purge or update incorrect data through corrective processes like fuzzy matching.
International Verification
Checks address data against authoritative databases from two more more countries.
Integration (4)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Workforce Authentication
Integrates with identity and access management (IAM) solutions to manage workforce authentication.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Platform Content (3)
Templates
Pre-built or cusomizable referench check templates.
Automated
Automated process for quick response and bulk reference checks.
Reports
Reports with detailed analysis sent to employer.
Platform Basics (3)
Optimization
Optimized for any device for candidates and referees' ease-of-use.
Interoperability
Connects to external systems and applications as needed to complete team workflows.
Performance
Is consistently available (uptime) and allows users to complete tasks reliably.
Platform Additional Functionality (4)
Integrations
Integrates with additional solutions such as background check and ATS.
Identity verification
Verifyies identity of candidates.
Fraud detection
System notifies employers if it detects potentially fraudulent cases.
Custom branding
Customizable with company logo, name, and click-through link, to name a few.
Platform Data (4)
Visualization
Contains tools to visalize data sets or workflows.
Security and Compliance
Adheres to best practice for risk, security, and quality control.
Alerts and Notifications
Sends notifications to users in-app or through email, text message regarding all reference checks.
GDPR Compliant
Platform compliant with all GDPR requirements.
Functionalities (6)
Authentication Methods
Offers age authentication via methods such as document or identification card verification, telephone number checks, matching against consumer records or other similar methods.
Online Age Verification
Is primarily used to verify a person's identity online for e-commerce purposes.
Age Estimation
Offers age estimation functionality.
Integrations and SDKs
Offers integrations or software development kits (SDKs) for websites, applications, mobile apps, point-of-sale (POS) solutions, and kiosks
In-person Age Verification
Is primarily used to verify a person's identity in-person, such as at a bar, restaurant, event venue, or other similar places.
Liveness Check
Has a liveness check using selfies or other photograph technology to ensure the person being verified is real.
Process Automation (4)
Onboarding Flow Management
Orchestrates customer journey via customizable workflows.
E-Signature
Contains e-signature functionality.
Data Capture
Captures customer data through digital forms.
Auto-Capture
Uses OCR to scan customer documents, extract data, and auto-fill forms using the extracted data.
Identity Verification (3)
ID Scanning
Scans and verifies customer identification documents.
KYC
Runs KYC checks on customers using information gathered in the application.
Credit Check
Checks customer credit information.
Fraud Detection (5)
Name Matching
The solution uses intelligent algorithms like fuzzy matching to identify potential risks.
Watch List
Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity).
Scoring
Score persons and organizations based on their history and risk potential.
E-filing
Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms.
Workflows and Alerts
Standard workflows to assign workload and to alert users based on predefined triggers.
Compliance (3)
Due Dilligence
Manage due dilligence processes such as Customer Due Diligence and Know Your Customer.
Regulations and Jurisdictions
Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA.
Internal Policies
Compliance with fraud and risk management policies created by the company using the solution.
Monitoring (5)
Models
Create behavior models that can be used to detect suspicious behavior.
Simuation
Simulate and validate scenarios to address multiple types of risks.
Transaction Monitoring
Real-time transaction screening to immediately identify potential risks.
Segmentation
Allows users to segment and manage lists of suspicious persons and organizations.
QA
Evaluate the quality and performance of the anti-money laundering activities.
Reporting (3)
Compliance Reports
Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT.
Suspicious Activity
Display suspicious activity by period, risk type, person or organization.
Real-Time Dashboards
Dashboards to provide real-time data on suspicious transactions, persons, or organizations.
Generative AI (1)
AI Image-to-Text
Converts images into a textual description, identifying key elements.
Generative AI - Anti Money Laundering (2)
Risk Scoring
Has integreated AI features to assess and assign risk scores to transactions and customer profiles, enabling prioritized investigations based on potential threat levels.
Pattern Recognition
Uses AI algorithms to identify complex patterns and anomalies in transaction data that may indicate money laundering.
Agentic AI - Anti Money Laundering (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Digital Customer Onboarding (1)
Decision Making
Makes informed choices based on available data and objectives
Identity Verification Functions - Identity Verification (5)
Multi-Method Verification
Supports multi-method identity verification including documents, biometrics, and database cross-checks.
AI Document Check
Performs automated document authentication using OCR and AI/ML.
Biometric Face Match
Conducts biometric face matching (selfie-to-ID verification).
Integration Options
Offers identity verification functionality via API, SDK, or hosted interface.
Workflow Orchestration
Provides configurable identity verification workflows and logic-based orchestration.
Risk & Fraud Prevention - Identity Verification (3)
Liveness Detection
Offers liveness detection to prevent spoofing and presentation attacks.
AI Risk Scoring
Generates real-time identity risk scores using AI/ML or rule-based logic.
Document Forensics
Detects fraudulent or tampered documents through forensic analysis.
Compliance & Governance - Identity Verification (3)
Standards Compliance
Supports compliance with NIST Identity Assurance Levels (IAL2, IAL3).
AML/PEP Screening
Integrates AML, PEP, and sanctions list screening into the identity verification process.
Global Coverage
Supports global identity document verification across multiple countries and regions.





