Vendors
日本語

Risk Management & Compliance BPM Services

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)

Overview

WNS’ Governance Risk & Compliance services encompasses the landscape of risk and compliance imperatives for financial institutions, corporates and professional services firms, leveraging the power of

  • Domain knowledge through a team of ACAMS, CFEs and professionals with experience and expertise in risk identification, monitoring & reporting across diverse risk categories including credit, market, operational risk and financial crime.
  • Intelligent Automation leveraging cognitive solutions, robotics process automation as well as advanced analytics to strengthen sampling & optimizing transaction volumes
  • API-based Database & AI-based Identity verification leveraging our industry-leading regtech partnerships

Key Features

Our areas of expertise:

Financial Crime Compliance -

Anti-Money Laundering Compliance (AML)

  • Customer due diligence (CDD) and Know-Your-Customer (KYC Checks)
  • Customer risk assessment
  • Continuous KYC monitoring leveraging advanced analytics
  • Enhanced due diligence (EDD)
  • Ultimate beneficial ownership (UBO) detection
  • Politically exposed persons (PEP) & Sanctioned entity check
  • Negative news screening
  • Vulnerable transaction monitoring
  • Transaction investigations
  • Trade Finance Money Laundering Screening
  • Suspicious Activity Report (SAR) filing support

Fraud Monitoring

  • Customer identity fraud detection
  • Vulnerable transaction monitoring
  • Transaction investigations & link analysis
  • Fraud modeling
  • Dispute Management
  • Fraud resolution support

Know Your Vendor (KYV) Compliance/ Third Party Risk Management

  • Vendor identity & background check
  • Ultimate beneficial ownership (UBO) detection
  • Politically exposed persons (PEP) & Sanctioned entity check
  • Negative news screening
  • Vendor onboarding support
  • Vendor monitoring

Capital & Liquidity Management -

Risk Analytics

  • Risk Model building – credit risk, market risk, operational risk & fraud detection
  • Model Validation as a service
  • Model recalibration
  • Model governance

Risk Monitoring & Reporting

  • Basel II – Pillar I risk weighted asset measurement and reporting
  • Basel II – Pillar II capital computation
  • Basel II – Pillar III reporting
  • CCAR – Capital measurement
  • Stress testing

Asset liability Management

  • Liquidity monitoring & reporting
  • Interest rate risk measurement & reporting
  • ALM Modeling & reporting
  • Stress testing

Governance Services -

Enterprise & Operational Risk Management

  • Risk & control library documentation
  • Periodic risk & control assessment
  • Remediation planning & monitoring

Internal Audit Services

  • Audit sampling leveraging advanced analytics
  • Periodic process audits
  • Remediation planning & monitoring

SOX Compliance

  • Process documentation
  • Risk & Control library formation
  • Control design testing
  • Control effectiveness testing
  • Reporting

Information Security Risk Management -

Security Monitoring

  • User activity monitoring
  • Alert services
  • Threat monitoring
  • DLP monitoring

Security Analytics

  • SIEM event correlation & analysis
  • Security intelligence based on suspicious patterns,
  • Network flow analysis

Security management

  • System hardening
  • Identity & Access Management
  • SIEM Management
  • Device Management
  • Threat advisoryand Incident Management

Scanning Services

  • Vulnerability assessment
  • Penetration testing
  • Application security scanning

Assessment Services

  • Security and privacy assessments
  • Sensitive information profiling
  • Source code reviews,
  • Network Security Architecture Review
  • Configuration

All the above services, are powered by a range of in-house & partner transformation solutions including:

  • Intelligent automation solutions for automating routine transactional tasks
  • Analytics solutions for increasing process efficiency & control
  • Machine learning solutions for partially automating judgmental tasks
  • Database solutions for accessing global information to facilitate decision-making

Key Benefits

Some of the benefits delivered are:

  • Enhanced risk management while reducing costs by more than 50% for a leading US bank
  • Reduced false positives by over 20% and still improving through re-building of predictive models for fraud detection & AML transaction monitoring for a leading US bank

Product/Service details

SOLUTION OR SERVICE TYPE