Best Compliance Software - Page 62

Compare the Top Compliance Software as of November 2025 - Page 62

  • 1
    Arctic Intelligence

    Arctic Intelligence

    Arctic Intelligence

    Innovative financial crime risk assessments to protect your business. Risk assessments are the cornerstone of any financial crime compliance program. From money laundering, terrorism financing, bribery and corruption and sanctions, Arctic Intelligence provides an enterprise-wide risk assessment solution to assess your business' vulnerabilities in line with global regulations and FATF guidelines. Our solutions can help address many challenges by providing defendable data-driven results and quickly establishing a program tailored to the organisation. Our technology can calculate and present firm wide risk profiles, identifying and highlighting high risk areas and control gaps or weaknesses. Real-time reporting can aggregate risk outcomes for both an individual business unit and organisation-wide level providing accurate, consistent and dependable results.
  • 2
    ARIADNEXT

    ARIADNEXT

    ARIADNEXT

    Finance is considered as one of the industries most exposed to the direct impact of new technologies. The digital transformation thus created new needs, new opportunities and new stakeholders: Fintech companies. Contraction of finance and technology, the term Fintech has emerged since 2015 to illustrate the arrival of new technologies in the finance sector. Specialists in payment, credit, money transfer, savings management and account aggregation, Fintechs offer their clients ever more innovative platforms and shake up the codes of the financial sector. As fairly young start-ups, they use digital, artificial intelligence, mobile and connected technologies to reach a large number of B to B and B to C consumers. Just like traditional players in the financial sector, Fintechs remain subject to vigilance measures and numerous regulations related to customer knowledge.
  • 3
    AutoRek

    AutoRek

    AutoRek

    AutoRek can ease the task of meeting the regulatory obligation of client money / client asset protection. AutoRek allows you to manage your data seamlessly, putting the power in your hands when it comes to automated systems. AutoRek delivers robust automated reconciliation software that mitigates risk, enhances control and delivers efficiencies. Our industry-leading technology helps you to automate your data management and works with you to process your regulatory reports. AutoRek account reconciliation tools streamline the consolidation of data from disparate systems. With a comprehensive audit trail, our solution provides the transparency and governance required to meet reporting requirements.
  • 4
    Alessa

    Alessa

    Alessa

    Alessa provides all the anti-money laundering (AML) capabilities that banks, money services businesses (MSBs), Fintechs, casinos and other regulated industries need – all within one platform. Alessa includes APIs for integration with onboarding systems to verify identities and search sanctions, politically exposed persons (PEPs), OFAC, and proprietary lists in real time. Use this information to update the risks associated with an entity. Alessa leverages data from various sources to create a risk score. Risk factors, weights, scores, and aggregates are all configurable by the organization to match their risk appetite and tolerance. Periodic reviews are managed by workflows and scores are updated based on the entities’ activities. With Alessa, monitor every financial activity to get a holistic view of customer activities. The solution generates alerts for suspicious activity and sends them to the appropriate personnel for investigation and reporting.
  • 5
    Pega KYC

    Pega KYC

    Pegasystems

    Updated quarterly, Pega sources its regulatory rules from a global team of lawyers, regulatory experts, and policy makers with deep experience across all main regulators including the SEC, OCC, FinCEN, CFTC, FINRA, HKMA, MAS, FCA, and ESMA. Rapidly respond to audit and regulatory findings with “look-back” capabilities, through automated bulk case creation, routing and escalation, as well as auditability of rule changes. Quickly update rules through configuration and rapidly address any findings with a zero code rule management portal. A rules-based approach allows you to onboard clients across jurisdictions, business lines, or products. Apply local regulatory requirements where necessary, collecting only additional information as needed.
  • 6
    Cognitive View

    Cognitive View

    Cognitive View

    Provides a framework to manage conduct related risk in real time, promotes good behaviour and improves organizational culture. Helps in management of customer experience, churn, complaints. Compliance automation & quality management to identify compliance failures and knowledge gap. Cognitive View captures, secures and transcribes voice from all new and legacy communication platforms, providing a structured data set of captured voice conversations. Provide insights if customers are satisfied or frustrated and if agents are polite and sympathetic. Understand emotions by monitoring conversational data to allow customer response at a scale. Monitor customer service and support conversations so you can respond to your customers appropriately and at scale. See if customers are satisfied or frustrated, and if agents are polite and sympathetic.
  • 7
    Interos

    Interos

    Interos

    As disruptions increase, organizations need to modernize assessment and monitoring. What are you doing to prepare? Map and model supply chains deeper and farther, view and know everything, everywhere, about your business relationships, in seconds. Using an arsenal of natural-language AI models, trained on supply-chain data, we’ve built the most highly connected, multi-dimensional network of B2B relationships in existence. We continuously monitor global events providing real-time indicators of supply chain vulnerability and distress, across your business ecosystem, all the way down to the Nth tier. Build resilience into the extended supply chain. Proactively manage cyber threats, ensure regulatory compliance, and source confidently with one solution. Identify connections to restricted and prohibited countries, assess legal and regulatory compliance, and identify financial, cyber, governance, geographic, and operational risk down to any single supplier, anywhere.
  • 8
    NCC Compliance

    NCC Compliance

    NRT Technology

    NCC Compliance is our real-time tracking and reporting tool for markers, front money, safekeeping, check transactions, cash advances, tito tickets, chips, cash, and suspicious activity. NCC Compliance tracks currency transactions, aggregate cash-in and cash-out totals in a Multiple Transaction Log (MTL). The transaction data would include details of transaction type, amount, and patron information. NCC Compliance provides the ability for the casino compliance team to organize patron activities into manageable cases and produce a Currency Transaction Report (CTR), Suspicious Activity Report (SAR), Monetary Instrument Log (MIL), and Negotiable Instrument Log (NIL). The NCC Compliance API interfaces directly with casino systems including slots, player, cage, table games, cash-access, race, sports, and lottery. Users can also record transactions through NCC Compliance’s user friendly interface.
  • 9
    VisibleRisk

    VisibleRisk

    VisibleRisk

    Cyber events have financial consequences. VisibleRisk helps you quantify the financial impact of your cyber risk, so you can make better risk management decisions across the business. Standardize cybersecurity conversations in the boardroom. Focus on business impact and outcomes. Completed a validated cyber risk assessment to optimize your program and better allocate resources. Enable better communication and decision making around regulatory compliance, M&A and cyber insurance underwriting and limits considerations. Quantifying cyber risk in financial terms empowers security professionals to communicate with other key stakeholders more effectively by speaking in a common language. Business leaders rarely allocate financial resources without fully understanding the expected return, or more specifically, cost avoidance. We leverage automation and tools to provide you with a comprehensive understanding of your organization’s exposure to cyber risk, with minimal effort on your end.
  • 10
    Know Your Vendor Solution

    Know Your Vendor Solution

    Know Your Vendor Solution

    Using old-fashioned tools to manage vendors can be tedious and source of mistakes. It’s often non-standardized and not reliable. Know Your Vendor™ solution helps our clients mitigate supply chain risks by providing a consolidated panorama for due diligence on third parties. Due diligence is conducted to insure integrity in the supply chain and prior to making important business decisions in areas such as corporate mergers/acquisitions, or partnership. Due diligence is a deep background check on a prospect, be it a corporation, its principals or a specific individual.
  • 11
    myComplianceManager

    myComplianceManager

    myComplianceManager

    Our Audit Management system is much more than a great tool to optimize your audit life-cycle because we've combined it with our Enterprise Risk Management, Issue Management and IT Systems Inventory applications. It not only enhances the way you perform audits, but it also allows the Audit Committee and senior management to evaluate how your audit results impact the organization's risk profile, and to determine what post-audit actions need to be prioritized. We've also included our Issue Management system, so that process owners have a convenient tool to track and act upon issues or enhancement opportunities identified in your audits. Our Enterprise Risk Management (ERM) system provides a centralized location to assess, monitor and update your company's risk profile at an enterprise, regional and process level. Automated surveys are periodically completed by risk owners to score risks and identify changes in your risk environment.
  • 12
    Supply Wisdom

    Supply Wisdom

    Supply Wisdom

    Today as the risk of disruption arises from a wide array of risk events beyond cyber and financial, Supply Wisdom provides a full-stack of risk coverage across 7 risk domains. The market’s only single source comprehensive solution, our Risk Packages enable businesses to cost effectively and efficiently access a comprehensive view of their third-party and locations risks without having to pull together intelligence from multiple disparate solutions. We understand that for some business functions perhaps only one or two particular risk domains fit their needs, while others want full coverage. The flexibility of our solution enables us to offer individual risk modules to be purchased either as risk intelligence, continuous risk monitoring or combination of risk intelligence and continuous risk monitoring.
  • 13
    Black Kite

    Black Kite

    Black Kite

    The Black Kite RSI follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations. Operationalize with a platform that integrates with questionnaires, vendor management systems and process workflows. Automate adherence to cybersecurity compliance requirements and reduce the risk of a breach with a defense in depth approach. The platform uses Open-Source Intelligence (OSINT) and non-intrusive cyber scans to identify potential security risks, without ever touching the target customer. Vulnerabilities and attack patterns identified using 20 categories and 400+ controls, making the Black Kite platform 3x more comprehensive than competitors’.
  • 14
    TrustElements

    TrustElements

    TrustElements

    TrustElements helps to mitigate risk and prioritize investments. Your cyber resiliency score is defined in a percentage after analyzing all loads of data your company owns. TrustElements maps your results to industry frameworks (NIST, CIS, MITRE) and helps to establish a golden standard of cyber resilience by continuously assessing your organization exposure to risks. The TE platform enhances decision making based on your business context and helps to better allocate financial resources. Communicate cybersecurity strategy to the C-level and Board of Directors to strengthen the decision making in Security, IT, and Risk Management. Whether your challenge is vendor risk management, tight security budgets, overcoming resource obstacles or applying the right level of protection and risk management, we have your back to make your company propel.
  • 15
    Shared Assessments

    Shared Assessments

    Shared Assessments

    We’ve harnessed the collective intelligence of world’s top risk assessment and management experts to create our industry leading SIG Questionnaire and the most recognized third party risk certification, CTPRP. The VRMMM, SIG, SCA and Privacy tools are designed to meet the needs across the vendor risk management lifecycle. Certification classes and exams establish a knowledge base and verify third party risk professionals’ expertise. Studies, papers and our blog are member-driven, industry-informed and forward looking. Premier global, multi-industry event to shed light on the processes, technologies, and efficiencies in TPRM.
  • 16
    Infosys Enterprise Data Privacy Suite
    As the value and volume of data grows exponentially, data protection has arisen as a board-level issue and potential upper hand source—not merely a compliance necessity. Without a thorough and successful data administration program, data protection stays a consistent challenge and a potential reputation time bomb. Organizations face increasing pressure from regulators and the commercial center to improve how they gather, use, store and erase individual data (PI). Furthermore, it’s importance will only increase as technology like the Internet of Things (IoT) and Big Data generate more data and insights. Infosys Enterprise Data Privacy Suite (iEDPS) meets enterprise challenges by helping companies protect their private data and adhere to global regulatory standards such as HIPAA, PIPEDA, GLBA, ITAR, and many more.
  • 17
    BitAML

    BitAML

    BitAML

    BitAML is an advisory firm that offers AML compliance services specifically to cryptocurrency financial institutions facing these challenges. We are comprised of experienced and capable AML compliance experts with a thorough understanding of regulatory nuance at every level of government. While there are many firms in the financial compliance space, BitAML is unique in that it specializes in developing holistic, customized AML compliance regimes specifically for cryptocurrency concerns. We are thorough and leave no regulatory stone unturned. We offer a suite of products and services designed to make it easier for business owners to implement and update AML compliance policies, procedures, and protocols efficiently and accurately as they grow. We serve businesses including bitcoin ATM/kiosk operators, crypto exchanges, individual traders, trading platforms, hedge funds, crypto-cannabis, and others.
  • 18
    KYC-Chain

    KYC-Chain

    KYC-Chain

    An all-in-one workflow solution to verify your customers’ identities, streamline a KYC on-boarding process and manage the entire customer lifecycle. Our partner network allows us to complete fast and accurate Identity Documents Verification from over 240+ countries and territories. Together with our sister company SelfKey, we can support a blockchain approach, allowing users to store their KYC details on-chain. Screen your individual, corporate and institutional clients for associated criminal or prohibited activities in real-time with our global sanctions and watchlists, politically exposed persons and adverse media databases. Customize the solution to your requirements, including GDPR, integrate with your applications through RESTful API, and handle hundreds of thousands of checks per day. Innovative technology allows you to analyze the historical transaction of a crypto wallet and check it against known risk indicators.
  • 19
    Uppsala Security

    Uppsala Security

    Uppsala Security

    Have you fallen victim to a crypto scam or crypto exchange hack? Security experts track your stolen funds in real time. Uppsala Security provides risk management solutions for cryptocurrency AML, regulation compliance, and cybersecurity. Uppsala Security's AML Solution integrated with Samsung Blockchain's wallet, providing a safe user experience for all users. Sentinel Protocol, operated and developed by Uppsala Security, is the world's first crowdsourced Threat Intelligence Platform powered by blockchain technology to protect the cyberspace. Uppsala Security built the first crowdsourced Threat Intelligence Platform known as the Sentinel Protocol, which is powered by blockchain technology. Supporting the framework is a team of security analysts and researchers, who aim to deliver a safely interconnected experience with a suite of solutions that meet the crypto security needs of organizations and the compliance standards of the cybersecurity industry.
  • 20
    Napier

    Napier

    Napier

    Trusted by the world’s leading data providers, our next generation Intelligent Compliance Platform is transforming AML & Trade Compliance. The Napier platform is fast, scalable and easily configurable. It rapidly strengthens your AML defences and compliance capabilities, while meeting your compliance obligations and challenges in any sector. Our tools dramatically reduce both false positives and false negatives, empowering compliance teams to make validated decisions with unprecedented speed and accuracy. Napier’s single unified platform integrates multiple compliance solutions into one master dashboard. Our easily configurable dashboard gives you a view relevant to your tasks, allowing you to spot at a glance where suspicious activity may be occurring. Should you need to deploy on-premise or in the cloud, we work with you closely to deliver the right outcome for your organization.
  • 21
    AnChain.AI

    AnChain.AI

    AnChain.AI

    See how our team leveraged our CISO™ solution to quickly locate and trace these infamous hacked funds for law enforcement. We combine our deep expertise in ransomware with Machine-Learning enabled tools to help protect institutions from regulatory liability. We are at the forefront of enabling developers to secure their DeFi projects, DApps for mainstream adoption. Cryptocurrency Anti-Money Laundering made simple, fast, and preventive. AI-powered, behavior-based intelligence connects cryptocurrency to real-world entities, enabling your business to secure crypto assets, quantify risk, and remain KYC/AML compliant. Interactive graph-based investigation tools augment your analytics efforts to reveal complex entity relationships involving thousands of addresses.
  • 22
    Featurespace

    Featurespace

    Featurespace

    Featurespace’s ARIC Risk Hub for enterprise fraud and financial crime monitors real-time customer data, using our proprietary machine learning inventions, adaptive behavioral analytics and automated deep behavioral networks. ARIC Risk Hub offers multiple solutions for fraud and Anti-Money Laundering analysts to spot suspicious activity and prioritize alerts with explainable anomaly detection. At the same time, ARIC Risk Hub recognizes genuine customers without blocking their activity, reducing friction. Working as a technology partner to the financial services industry, our ARIC Risk Hub is deployed in some of the world's largest banks, payments processors and merchant acquirers. Delve deeper into the full features and functionality of our world-leading, real-time machine learning product for enterprise fraud and financial crime prevention, by requesting access to its blueprint.
  • 23
    SAP Ariba Supplier Risk Management
    With SAP Ariba Supplier Risk, you can help your buyers make smarter, safer decisions before purchase, simply by making risk due diligence a natural part of the procurement process. And when your buyers are well-informed, they’ll make decisions that prevent supply chain disruptions. That helps you avoid damage to your revenue or reputation. Also, you’ll gain a high degree of confidence that your supplier information is correct and up to date. This market-leading supplier risk solution lets you tailor risk views and alerts to your business, to each supplier relationship, and to your role. You can also segment suppliers based on your risk exposure. With a complete view of each supplier, you can make more timely, contextual, and accurate business decisions, and improve collaboration with your trading partners. Easily understand your supply base with data provided by integration with SAP ERP, SAP Ariba Procurement, and Ariba Network.
  • 24
    Quantexa

    Quantexa

    Quantexa

    Uncover hidden risk and reveal new, unexpected opportunities with graph analytics across the customer lifecycle. Standard MDM solutions are not built for high volumes of distributed, disparate data, that is generated by various applications and external sources. Traditional MDM probabilistic matching doesn’t work well with siloed data sources. It misses connections, losing context, leads to decision-making inaccuracy, and leaves business value on the table. An ineffective MDM solution affects everything from customer experience to operational performance. Without on-demand visibility of holistic payment patterns, trends and risk, your team can’t make the right decisions quickly, compliance costs escalate, and you can’t increase coverage fast enough. Your data isn’t connected – so customers suffer fragmented experiences across channels, business lines and geographies. Attempts at personalized engagement fall short as these are based on partial, often outdated data.
  • 25
    kompany

    kompany

    Moody's Analytics

    Our Live Search seamlessly connects you to commercial registers, financial authorities and tax offices from around the world in real-time, providing instant access to primary source information on more than 115 million companies across over 200 jurisdictions. Our global network provides an unparalleled real-time information search experience. With direct connections to government registers, financial authorities and tax offices around the world, official company information is only a click away. Choose between our KYC API and web application KYC workspace to complete real-time business verification, client onboarding and enhanced due diligence tasks with the support of our global register network of audit-proof data. Both offer access to our shareholder identification tool, UBO discovery. KYC onchain supports our API users to provide a secure data trail of requests and responses.
  • 26
    Unisys CloudForte
    We are living in an increasingly digital world as organizations everywhere look to the cloud to be a catalyst for transformation. Now is the time to assess your cloud strategy. Are you using cloud technology to its full potential? What other ways can you benefit from its power? Can you do so while minimizing security risk and upholding compliance? You can, with Unisys Cloud and Infrastructure Solutions. Our 100% vendor-agnostic approach ensures you experience the best capabilities among a broad ecosystem of platforms and providers for a cloud transformation that is cost-effective, secure, and efficient. The cloud delivers agility, scalability, and innovation. But to enjoy these benefits you need the right roadmap and team to execute it. Unisys can help. Our global cloud experience spans 110 countries and dozens of vertical industries, enabling us to apply the right expertise and scale to deliver the outcomes our clients seek.
  • 27
    LeanLinking

    LeanLinking

    LeanLinking

    Streamline the back office and reduce risk across the supply chain by digitizing supplier on-boarding and maintenance. Whether you want to improve your entire supplier pre-qualification process or just part of it, using LeanLinking supplier management software allows you to streamline the back office and reduce risk across the supply chain by digitizing supplier on-boarding and maintenance. With LeanLinking, you get the most seamless and easy-to-setup solution on the market. You can gain more control over supplier compliance and risks, and dramatically reduce on-boarding processing time, integrate the process to your ERP supplier master database, no double typing of supplier master data. Control that only approved suppliers are used. LeanLinking offers a great range of easy to use tools that are integrated and built for procurement professionals. Whether you are dealing with direct or indirect suppliers, the factory can’t run optimally without smooth delivery from suppliers.
  • 28
    Craft

    Craft

    Craft

    Craft provides a robust platform designed to enhance supply chain resilience with real-time intelligence, risk management, and data-driven insights. The platform offers tools for Supplier Intelligence, Supplier Risk Management, and Supply Chain Risk Management, enabling businesses to monitor supplier dependencies, assess risk across multiple domains, and proactively mitigate potential disruptions. By integrating real-time data from over 1,300 data streams, Craft helps organizations navigate financial, regulatory, cybersecurity, and geopolitical risks, ultimately improving decision-making and operational agility across supply chains.
  • 29
    apexanalytix

    apexanalytix

    apexanalytix

    apexanalytix is the world’s leading provider of supplier portal software; trusted supplier data; controls, audit and analytics software; and AP recovery audit services. We protect $9T in spend and prevent or recover over $9B in overpayments annually, and our client portals actively support over 8.5M+ suppliers – more than any other supplier network. Our software and audit services are built on our smartvm® database of 90M+ supplier records with contacts, scored for accuracy and age, based on integration with over 1,000 government, regulatory and authoritative third-party data sources and 10M+ communications with suppliers each year. apexarchimedes™, an advanced cognitive technology and innovation system, supported by IBM Watson®, is integrated into apexanalytix software and services to harness the power of the future through smarter recoveries, controls, analytics, working capital and supplier data.
  • 30
    Sign In Compliance

    Sign In Compliance

    Sign In Solutions

    Sign In Compliance makes it easier to comply with strict security regulations by radically simplifying and automating high volume, data-intensive, and administrative tasks. Drive efficiency throughout your organization with a system tailored to your specific needs. Save time by consolidating your record-keeping, workflow management, and risk mitigation in one place. Real-time analytics arm your security compliance team with the data they need to make smarter decisions. Increase organizational efficiency by using automatic workflows that save time – from the top down. Create your own processes from scratch to perfectly meet your organization's needs. Create white-labeled forms to be signed by employees with legally binding digital signatures. Sign In Compliance takes employees through foreign travel reporting, briefs, and debriefs with automatic reminders and email notifications.