SUPERIORAML

Benefits

Reduce Risk Management And Compliance Costs 

Adding a new person to the team significantly increases cost. Increasing capacity for an automated process is simple with ldentityMind’s elastic scaling capabilities.

Increase Risk Management and Compliance Speed & Accuracy

Manual AML processes can be slow with quality varying with team experience and expertise. ldentityMind delivers automated transaction monitoring that is fast and consistent across any volume, and is easily adjustable through rules.

Get More Efficient Access To Data

Data can overwhelm manual systems due to their slow processing speed. ldentityMind’s automated AML processes can capture data across multiple systems and analyze it regardless of volume. And, it produces easier and faster access to report information for regulators.

Simple Setup

The ldentityMind platform is pre-integrated to 20+ services across identity verification, phone verification, device analysis and more. Custom integrations takes less than 24 hours through our rest APls.

Shorten Process Time

ldentityMind provides rules, case management, and alerts to allow you to authorize and reject transactions based on your specific thresholds, to create cases when additional review is required and to alert the team as actions are taken.

Features

  • Global identity creation and validation
  • Real time risk scoring through machine learning
  • Automated, continuous monitoring
  • Customer white list
  • Customer black list
  • Configurable rules
  • Event-driven alerts
  • Escalation, rule-driven cases
  • Queue management
  • Compliance reports
  • 20+ data services, one API
  • Access to ldentityMind network of over 200 million identities

Transaction Monitoring

ldentityMind processes transactions in real time -everything from applications in on boarding processes to purchase transactions

Rules

Sets thresholds for accepted transactions, rejected transactions and transactions that require further evaluation

Case Management

Automatically activates case management for transactions that require further review by your

Alerts

Uses event-driven alerts to notify the team of the need to respond to cases, and of other activity

Trusted Digital Identities

Identity is critical to reducing risk and ensuring compliance in today’s digital financial services. Trusted digital identities help you Identify who is on the other end of the transaction and help you decide whether you should do business with them.

"2017 will be the year of digital identities...there is no identity without trust and vice versa. Further identity and trust impact and influence payment methods and enable or disable currencies. I view digital identities as the corner stone of the future of financial services industry."

Pascal Bouvier

Physical Identities

  • Name
  • Address
  • Device
Basic identity information that is based on physical documents.

Information is limited, static, siloed and, in some cases, easy for a fraudster to acquire.

Digital Identities

  • Name
  • Address
  • Payments
  • DOB
  • SSN
  • Email
  • IP Geo-location
  • Device
  • Ship to Address
  • Payment Behavior
  • Black/White Lists
  • Sanction Lists
  • Document Verification
  • Social Media
  • Carrier/Mobile Data
  • Bill to Address
  • Account Validation
More detailed information that includes digital information such as email, IP address, mobile phone. It may also include verification of provided such as account information.

Information is interconnected and reflects a wide variety of information on top of physical documents.

Trusted Digital Identities

  • Name
  • Address
  • Payments
  • DOB
  • SSN
  • Email
  • IP Geo-location
  • Device
  • Ship to Address
  • Payment Behavior
  • Black/White Lists
  • Sanction Lists
  • Document Verification
  • Social Media
  • Carrier/Mobile Data
  • Bill to Address
  • Account Validation
  • Graph Intelligence
Trusted digital identities are digital identities that are analyzed to verify identity, to identify the most recent information and known associates, and to ultimately risk score the identity. The result is an evaluation based on the most recent picture of the entity in question.


Use this slider to see the advantages granted by our patented Trust Digital Identities.

Further Reading

White Paper: KYC Fundamentals Guide

This guide, based on important takeaways provided by the expert panelists of a KYC webinar we hosted, will provide a high level analysis of the things you need to pay attention to meet regulatory guidelines when performing Know Your Customer analysis on new and current customers, the approach you should follow on your relationships with regulatory agencies and industry peers, and how to stay out of trouble and avoid fines.

Get the Guide

90 Minutes with the SEC on ICOs

90 Minutes with the SEC on ICOs

Last week, the SEC asked to speak with us. The SEC has been very active recently, issuing numerous subpoenas. Interestingly, we are not conducting an ICO, presale or SAFT. Instead, we support companies who are, providing Know Your Customer (KYC) support, sometimes called AML/KYC.

Case Management and the SAR Filing Process

Case Management and the SAR Filing Process

Case Management and SAR (Suspicious Activity Report) filing go hand-in-hand, with an effective case management program significantly bolstering the quality of SAR filing and recordkeeping capabilities. So, what should you look for in a case management and SAR filing...

To find out more about our solutions, simply fill in the form or call us at 650.618.9977.