Anti-Money Laundering Suites

VendorMatch

Anti money laundering systems and solutions listed on our vendor directory. Use our research platform for AML software evaluation with analysis and comparison of key functionality required by banks and other financial services institutions to support KYC, PEP & FATCA compliance.
  • A uniquely flexible range of intelligent, versatile solutions for banks, large and small, to combat financial crime.
  • Tookitaki’s Anti-Money Laundering Suite (AMLS) is an AI-driven transaction monitoring & name screening platform that drastically reduces the cost…
  • Protect against money laundering withFIS Prime Compliance Suite. The FIS™ Prime® Compliance Suite is a single, comprehensive, integrated solution…
  • Patriot Manager™ provides an intuitive and easy to use suite of solutions that provides insight into your operations, linking disparate data sour…
  • Compliance in Banks Requires Powerful Tools Banks and insurance companies will face the challenge of consistently implementing new rules. In that…
  • iMAL Islamic Banking & Investment platform is a powerful core banking platform specifically built from the ground up to support Sharia banking op…
Search results
No results
Throbber
Show results & filters

EVALUATING AML SOFTWARE SOLUTIONS

AML business requirements are supported as follows:

  • Customer identity management checks clients against various watch lists as part of Know your customer (KYC) requirements.
  • Transaction monitoring systems, focus identifying and alerting managers to suspicious transactions.
  • Investigations management and Suspicious Activity Reports (SARs) or Suspicious Transaction Reports (STRs).
  • Currency Transaction Reporting (CTR) systems, which deal with large cash transaction reporting
  • GRC compliance CRM software to help firms comply holistically with regulation including with AML regs.

Key functional areas covered in the guid:

  • Access CIP and other demographic information
  • Alert ranking
  • Alerts
  • Auto add false positives to white list
  • Automated business rules
  • Behaviour profiling
  • Constrain scenarios by any data attribute
  • Customer risk scoring
  • Detects trend suggesting suspicious behaviour
  • Entity link analysis
  • Factor histories
  • False Positive Reduction
  • Filter tolerance controls to reduce false positives
  • Flexible suppression
  • Investigators work queue
  • Manual override
  • Multiple scenarios / database scan
  • Past trends analysis
  • Peer group analysis
  • Penalties management
  • Predictive modes
  • Rapid access to customer, account and transaction data
  • Recovery and resolution management
  • Review triggering transactions
  • Scenarios and risk factors applied to transactions to detect suspicious activity
  • Schema for preparing data analysis
  • Scores suspicious clients
  • Supports multiple data types
  • Watch list screening
  • Watchlist Data
  • AML Optimization
  • Case management
  • Data management
  • Investigation and alert management
  • Suspicious activity monitoring
Create a vendor selection project & run comparison reports
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.