Categories

Browse through various categories to explore the technologies available for tackling fraud, risk, and compliance challenges.

Popular Categories

All Other Categories

AI Agents

2 Technologies

Utilizing AI agents to automate risk assessment and compliance tasks.

Explore →

AML

39 Technologies

Anti-Money Laundering measures to prevent illicit financial flows.

Explore →

Application Fraud

24 Technologies

Detecting and preventing fraudulent activities during application processes.

Explore →

Card Fraud

11 Technologies

Mitigating risks of credit and debit card-related fraud.

Explore →

Chargeback Fraud

1 Technologies

Detection of customer chargeback fraud.

Explore →

Crypto

13 Technologies

Tech such as blockchain analytics, crypto risk assessment tools, and transaction monitoring systems.

Explore →

Cyber

7 Technologies

Protecting systems and data from cyber threats and vulnerabilities.

Explore →

Data Intelligence

23 Technologies

Leveraging external data for risk assessment and monitoring purposes.

Explore →

Document Verification

10 Technologies

Ensuring document authenticity through advanced verification techniques.

Explore →

eCommerce Fraud

4 Technologies

Platforms to detect deceptive activity conducted during online transactions, e.g. unauthorized access to personal or financial information, with the intent to steal goods, services, or money.

Explore →

Fraud Detection

11 Technologies

Solutions to detect a range of fraud risk across internally or externally

Explore →

Identity Theft

11 Technologies

Mitigating risks related to identity fraud and theft.

Explore →

ID Verification

16 Technologies

Verifying identities to mitigate fraud and enhance security.

Explore →

Insider Threat

3 Technologies

Addressing risks posed by internal actors within organizations.

Explore →

Insurance Fraud

3 Technologies

Explore →

Investigations

5 Technologies

Technologies to enable effective investigations of known issues.

Explore →

KYC

31 Technologies

Streamlining Know Your Customer processes to ensure compliance and mitigate risks.

Explore →

Procurement Fraud

4 Technologies

Mitigating fraud risks within procurement processes and supply chains.

Explore →

Regulatory Compliance

12 Technologies

Navigating compliance with regulatory requirements in risk management.

Explore →

Scam Detection

4 Technologies

Detecting and preventing scams to protect individuals and businesses.

Explore →

Surveillance

2 Technologies

Monitoring and analyzing activities for suspicious or risky behavior.

Explore →

Third Party Risk Management

15 Technologies

Explore →
View Full Technology Listing