Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)


Orion is able to provide identification of networks via ‘Risk Entities’ (user defined ‘Red Flag Indicators’). A Risk Entity can be as simple or as complex as desired and is fully defined by the user. Orion provides for manual or fully automated building of networks based on the defined Risk Entity. Any network or risk entity can also be set to ‘Monitor’ which allows the user to continue with their day to day activity safe in the knowledge that any additional exposure to a network or the relevant criteria will be accounted for and included, and users can then be alerted of these events without the need for them to re-query their database each time. This means that Orion is essentially able to build networks ‘on the fly’, rather than having to have the links already established prior to network generation.

Key Features

• Identify and investigate organised fraud networks • Monitor suspect networks to identify new links • Create networks manually or automatically • Full user control of network build parameters, for both manual and automated networks • Ability to queue automated networks for investigation by score • Full user control of the scoring model • Full user control of the network criteria

Key Benefits

• Targeted investigations to pro-actively identify suspicious networks at their inception, or build from known intelligence. • Quickly identify organised attacks. • Create and deploy different strategies to mitigate different modus operandi across both 1st and 3rd party fraud. • Provide your own network risk scores. • Prioritise networks within task queues to ensure highest risk networks are worked first. • Automatically assign specific network referrals to specific teams’ dependant on the network profile. • Automatically monitor for new activity on known suspicious networks. • Identify keystones and prominent parties within a network. • Easily disseminate intelligence or export for use in other areas of your business.