Anti-Money Laundering Suites


Anti money laundering systems and solutions listed on our vendor directory. Use our research platform for AML software evaluation with analysis and comparison of key functionality required by banks and other financial services institutions to support KYC, PEP & FATCA compliance.
  • Know Your Client (KYC) KYC is a labour intensive, time sensitive and quality critical function that is demanding on internal headcount and depart…
  • Clients Direct is a system for investment management firms which links them to their associated Independent Financial Advisors (IFAs) and the the…
  • FundRunner Marathon is an advanced Investor Relationship Management (IRM) & Due Diligence Management (DDM) customer relationship management softw…
  • Cloud investor portal including unit registry, asset registry, fund accounting advisor broker/portal, trustee portal, regulatory portal with work…
  • Klear™ is a customer verification and identity checking tool. It is integrated into AutoRek - our industry leading reconciliation engine - to mon…
  • SpearWatch is the most accurate screening engine in the industry. Highest recall (no false negatives) and precision (fewest false positives). Red…
  • Protect against money laundering withFIS Prime Compliance Suite. The FIS™ Prime® Compliance Suite is a single, comprehensive, integrated solution…
  • Eliminating money laundering however is an overwhelming task because of the large volume of global financial transactions, constantly evolving go…
  • Reduce risk and stay ahead of the regulatory curve Checking for sanctioned entities and high-risk customers is a resource-intensive process that…
  • Automatic transaction monitoring to identify, investigate and rapidly react to suspicious behaviours.  ComplyAdvantage offers a modern, comprehen…
  • D3 Bespoke workflows Over 16,000 available data sources in 200+ countries Create repeatable workflows to match internal processes exactly Buil…
  • wo smart solutions As the rise in terrorist activity and the number of sophisticated criminals increases, so does the complexity in protecting yo…
  • Customized Software and Data Solutions At FIS™, we integrate our databank lists with watchlist filtering tools to create software and data soluti…
  • AMLspotter, our full AML/KYC solution includes following functionality & characteristics: Client AML/CTF risk classification using a Risk Based…
  • Fenergo’s award winning Regulatory Client Onboarding solution takes a unique approach to regulatory onboarding and data management. Built upon th…
Search results
No results
Show results & filters


AML business requirements are supported as follows:

  • Customer identity management checks clients against various watch lists as part of Know your customer (KYC) requirements.
  • Transaction monitoring systems, focus identifying and alerting managers to suspicious transactions.
  • Investigations management and Suspicious Activity Reports (SARs) or Suspicious Transaction Reports (STRs).
  • Currency Transaction Reporting (CTR) systems, which deal with large cash transaction reporting
  • GRC compliance CRM software to help firms comply holistically with regulation including with AML regs.

Key functional areas covered in the guid:

  • Access CIP and other demographic information
  • Alert ranking
  • Alerts
  • Auto add false positives to white list
  • Automated business rules
  • Behaviour profiling
  • Constrain scenarios by any data attribute
  • Customer risk scoring
  • Detects trend suggesting suspicious behaviour
  • Entity link analysis
  • Factor histories
  • False Positive Reduction
  • Filter tolerance controls to reduce false positives
  • Flexible suppression
  • Investigators work queue
  • Manual override
  • Multiple scenarios / database scan
  • Past trends analysis
  • Peer group analysis
  • Penalties management
  • Predictive modes
  • Rapid access to customer, account and transaction data
  • Recovery and resolution management
  • Review triggering transactions
  • Scenarios and risk factors applied to transactions to detect suspicious activity
  • Schema for preparing data analysis
  • Scores suspicious clients
  • Supports multiple data types
  • Watch list screening
  • Watchlist Data
  • AML Optimization
  • Case management
  • Data management
  • Investigation and alert management
  • Suspicious activity monitoring
Create a vendor selection project & run comparison reports
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.