Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Introducing a robust decision-making engine driven by data, designed to help you evaluate, monitor, and analyze third-party entities effectively. This solution enhances the efficiency of KYC, AML, and anti-bribery and corruption (ABAC) research, thereby streamlining the onboarding process and customer due diligence (CDD). Powered by the Orbis entity database and GRID, which houses a comprehensive risk database of adverse media, sanctions, watchlists, and politically exposed persons (PEPs), Compliance Catalyst allows you to integrate your own data along with customer information for a more thorough analysis. It serves as a holistic risk management platform that is not only scalable and rapid but also comes with an array of customizable modules to tailor the solution to your specific needs. Once you complete the entity resolution phase—linking your target company to the appropriate entity within Orbis—you'll receive real-time screenings against various watchlists and adverse media, as well as a summary of compliance-related information, all readily available prior to initiating your risk assessment process. This ensures a more informed and efficient approach to managing compliance risks.
Description
Fincom has developed cutting-edge "phonetic fingerprint" technology that allows for the prompt identification of any entity through their name, pronunciation, or "name-sound," all derived from a singular mathematical model. This enhanced "accurate name matching" capability not only significantly reduces operational expenses and mitigates the risk of incurring unnecessary fines but also bolsters trustworthiness and helps maintain your business’s reputation. Employing automated real-time systems powered by AI-ML layers, this technology utilizes over 48 sophisticated mathematical algorithms to ensure precise name matching across 38 languages, accommodating various transliterations and spelling differences. The suite of products offered includes solutions for accurate name matching, seamless onboarding and continuous monitoring automation, transaction screening, and adverse media analysis, along with level 1 and 2 filtering and optimization engines. Additionally, the technology verifies beneficiaries in payments against bank account holders to combat CEO and invoice fraud. By consolidating customer information into a unified view, it allows for the construction of detailed customer risk profiles, enhances understanding of exposure, and facilitates the forecasting of potential risks, ultimately leading to more informed decision-making.
API Access
Has API
API Access
Has API
Integrations
Capgemini Intelligent Automation Platform
Cognizant
Fusion Essence
Microsoft 365
Integrations
Capgemini Intelligent Automation Platform
Cognizant
Fusion Essence
Microsoft 365
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Moody's Corporation
Country
United States
Website
www.moodys.com/web/en/us/kyc/products/compliance-catalyst.html
Vendor Details
Company Name
Fincom.Co
Founded
2016
Country
Israel
Website
fincom.co
Product Features
AML
Behavioral Analytics
Case Management
Compliance Reporting
Identity Verification
Investigation Management
PEP Screening
Risk Assessment
SARs
Transaction Monitoring
Watch List
Product Features
AML
Behavioral Analytics
Case Management
Compliance Reporting
Identity Verification
Investigation Management
PEP Screening
Risk Assessment
SARs
Transaction Monitoring
Watch List
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification