Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Detection (7)
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Response (4)
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Analysis (3)
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (10)
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
Prevents previous committers of fraud from future transactions.
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Integration (4)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Workforce Authentication
Integrates with identity and access management (IAM) solutions to manage workforce authentication.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Fraud Detection (5)
Name Matching
The solution uses intelligent algorithms like fuzzy matching to identify potential risks.
Watch List
Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity).
Scoring
Score persons and organizations based on their history and risk potential.
E-filing
Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms.
Workflows and Alerts
Standard workflows to assign workload and to alert users based on predefined triggers.
Compliance (3)
Due Dilligence
Manage due dilligence processes such as Customer Due Diligence and Know Your Customer.
Regulations and Jurisdictions
Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA.
Internal Policies
Compliance with fraud and risk management policies created by the company using the solution.
Monitoring (5)
Models
Create behavior models that can be used to detect suspicious behavior.
Simuation
Simulate and validate scenarios to address multiple types of risks.
Transaction Monitoring
Real-time transaction screening to immediately identify potential risks.
Segmentation
Allows users to segment and manage lists of suspicious persons and organizations.
QA
Evaluate the quality and performance of the anti-money laundering activities.
Reporting (3)
Compliance Reports
Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT.
Suspicious Activity
Display suspicious activity by period, risk type, person or organization.
Real-Time Dashboards
Dashboards to provide real-time data on suspicious transactions, persons, or organizations.
Generative AI - Anti Money Laundering (2)
Risk Scoring
Has integreated AI features to assess and assign risk scores to transactions and customer profiles, enabling prioritized investigations based on potential threat levels.
Pattern Recognition
Uses AI algorithms to identify complex patterns and anomalies in transaction data that may indicate money laundering.
Agentic AI - Anti Money Laundering (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.