Fraud & Integrity Risk Surveillance

Create a vendor selection project & run comparison reports
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.

Overview

Fraud & Integrity Risk Surveillance

The Fraud & Integrity Risk Surveillance module covers event monitoring, with the more diffuse scope of identifying fraud & integrity risk scenario's or ‘methods of operation’. This requires more complex and a variety of monitoring routines. We have included the work flow and case definitions to provide for specific follow-up of fraud alerts and for fraud investigations, including the commissioning of the relevant risk remediation measures to the appropriate authorities. Robotics and machine learning are more difficult to apply, as fraudster tend to cover their tracks, which leads to corrupted data. Machine learning has a problem in dealing with this kind of data.

Key Features

Combining Rules

  • Integration of rule, feature, scenario, and profile-based monitoring
  • Signals and context from multiple monitoring tools are combined
  • Audit trail and testing on rules maintenance

Monitoring and Interventions

  • Real-time monitoring, rules adjustments, assessments, and interventions
  • Hold/stop-release routines based on fraud markers for processing instant, real-time payments
  • Integration with all relevant internal and external data sources

Combined Analysis and Investigations

  • Actionable intelligence for rapid alert shaping, handling, and analysis
  • Link analysis for integration of all investigation processes, from all modules
  • Network analysis and behavioral patterns for situational awareness

Key Benefits

  • Fully integrated with the KYC/CDD, Special Investigations, and AML & Sanctions Surveillance modules
  • Covers the end-to-end fraud and integrity risk surveillance processes
  • One central application and standard workflows for all processes and departments
  • Network analysis and behavioral patterns are combined for situational awareness and actionable intelligence
  • Real-time surveillance with flexible and adaptable monitoring configuration