Key Features
Move beyond identity verification - prioritise risk cases and improving screening efficiency
Risk-based approach to transaction monitoring
Flexible rules, segments, blacklists, whitelists and exceptions that can be adjusted to suit an organization's risk policies
Machine learning for anomaly detection
Relational analysis to discover fund structuring
Serves multiple transaction use cases, from remittance to exchanges, to crypto payments
Integration with external data sources, KYC providers as well as internal customer and transaction history