Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Hawk AI combines AI and traditional rule-based approaches to monitor financial transactions. This ensures financial institutions are in compliance with anti-money laundering regulations. The solution includes classic rule-based models. These are enhanced with auto-closing features that are based on machine-learning models that learn from investigators' decisions through our case manager.
Hawk AI uses Anomaly Detection as a machine learning model that is unsupervised. This allows Hawk AI to identify new patterns in crime using insights from the platform's overarching nature which spans multiple financial institutions. The platform gives full transparency to machine decisions in order to provide the necessary clarity for regulators who require "explainable" AI. It also instills trust in the machine's actions. Hawk AI uses Artificial Intelligence to maximize automation and delivers significant cost savings through a 70% reduction in the required resources.
Description
As identity theft and account takeovers become more prevalent, businesses are finding it increasingly challenging to verify the authenticity of online identities. Jumio addresses this concern with its identity proofing and eKYC solutions, which are built on the Jumio KYX Platform and utilize advanced biometrics, artificial intelligence, and cutting-edge technologies to swiftly and automatically authenticate the digital identities of both new customers and existing users. The process provided by Jumio is not only automated but also user-friendly, allowing completion in under a minute. With broader support for various countries, languages, and document types than any competing solution, Jumio ensures a comprehensive approach to identity verification. Furthermore, it integrates effortlessly into websites and mobile applications for iOS and Android through APIs, SDKs, and webcams, enabling users to transition seamlessly between desktop and mobile experiences. Security is paramount; all data is transmitted and stored using robust AES 256-bit encryption, and Jumio is proud to be PCI DSS Level 1 compliant, underscoring our commitment to data privacy and security. In an ever-evolving digital landscape, businesses can rely on Jumio to provide the verification solutions they need to protect themselves and their customers.
API Access
Has API
API Access
Has API
Integrations
AlphaPoint
Atfinity
Fountain
KYC Portal
Microsoft 365
Moxo
Nok Nok S3 Authentication
OneSpan Identity Verification
RNDpoint
Ridecell
Integrations
AlphaPoint
Atfinity
Fountain
KYC Portal
Microsoft 365
Moxo
Nok Nok S3 Authentication
OneSpan Identity Verification
RNDpoint
Ridecell
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
HAWK:AI
Founded
2018
Country
Germany
Website
hawk.ai
Vendor Details
Company Name
Jumio
Founded
2010
Country
United States
Website
www.jumio.com/products/
Product Features
AML
Behavioral Analytics
Case Management
Compliance Reporting
Identity Verification
Investigation Management
PEP Screening
Risk Assessment
SARs
Transaction Monitoring
Watch List
Financial Risk Management
Compliance Management
Credit Risk Management
For Hedge Funds
Liquidity Analysis
Loan Portfolio Management
Market Risk Management
Operational Risk Management
Portfolio Management
Portfolio Modeling
Risk Analytics Benchmarks
Stress Tests
Value At Risk Calculation
Product Features
AML
Behavioral Analytics
Case Management
Compliance Reporting
Identity Verification
Investigation Management
PEP Screening
Risk Assessment
SARs
Transaction Monitoring
Watch List
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On