Denied Party Screening


Do you need more information?


Advanced security and total compliance

See how our visitor management solutions combine the most advanced security technology available with over 30 years of industry and government compliance experience


Name


Email Address


Phone Number


Congratulations. Your message has been sent successfully.
Error, please retry. Your message has not been sent.

slide

Global Leader In Governance, Risk And Compliance Solutions

  • Industry leading expert on compliance, trusted by the public and pricate sector
  • Trusted by US Government agencies for most accurate and timely data Safehand screening lists
  • Real-time transaction screening of multiple names and aliases, address and/or country, in order to cover all possible combinations
  • Screening using batch file uploads, ad-hoc, database, and web API service
 
slide

Reporting Options for Any Audits

  • Extensive set of standard and custom reports
  • Internal reports include case-by-case screening and history
  • Specialized reports on any business partner database including customers and vendors, denied parties lists and more
slide

Denied Party Lists

  • Most comprehensive set of worldwide lists from government and non-government sources for Trade & Financial Sanctions, Embargoes, Anti-Money Laundering, Foreign Corrupt Practices, Law Enforcement, Politically Exposed Parties (PEP), and Medical & Pharmaceutical Exclusions, and more
  • Screening Lists and content are updated daily
slide

Screening Logic & Workflows

  • Notify users of screening status with detailed results and automated workflows
  • Incrementally screen against entire Watch List or specific updates
  • Employ micro-categorization and risk scoring strategies to decrease false positives
  • Supports client customization, special rules, and custom lists (i.e. internal black lists)
slide

Most Advanced Search Algorithims

  • Fuzzy logic support with customizable parameters for different attributes
  • Add Matching on partial and similar names, aka, DBA identification, nicknames, and synonyms
  • Advanced matching analysis for low levels of false positives
slide

Secure Communications

  • Support secure protocols and use authentication to Active Directory using
  • LDAP, SAML2.0 and Single Sign-On(SSO) tools
  • Secure web forms support any secure 256 bit encrypted transmission and storage in a
  • Relational Database Management System(RDBMS),such as, Ms SQL or Oracle

Do you need more information?


Advanced security and total compliance

See how our visitor management solutions combine the most advanced security technology available with over 30 years of industry and government compliance experience


Name


Email Address


Phone Number


Congratulations. Your message has been sent successfully.
Error, please retry. Your message has not been sent.