The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Blogs

ComplyAdvantage Tops Up Series C Funding with Goldman Sachs Investment

ComplyAdvantage, a financial crime compliance specialist, has received new investment from Goldman Sachs Growth Equity. The investment will be used to build on the company’s rapid growth and cement its position as a critical part of the value chain for companies managing evolving risks around anti-money laundering (AML) and know your customer (KYC) processes, as well as broader financial crime.

The investment, terms of which were not disclosed, is an extension of the company’s oversubscribed Series C funding announced in July 2020, and brings the total round to $70 million. Goldman Sachs joins a growing list of investors including the Ontario Teachers’ Pension Plan Board, Index Ventures, and Balderton Capital.

In sync with the investment, ComplyAdvantage released a programme called ComplyLaunch, which provides free access to the company’s AML tools and education for startups, helping them to protect the integrity of their businesses by reducing the threat of financial crime.

“We’ve seen first-hand the benefits that ComplyAdvantage offers across a range of Goldman Sachs Growth portfolio companies,” says James Hayward, managing director for Goldman Sachs Growth Equity. “The company brings clear value to its clients and has grown at an impressive rate. We are excited to support the business as it continues to scale rapidly and help companies at all stages manage critical risks.”

Charles Delingpole, founder and CEO of ComplyAdvantage, adds: “Goldman Sachs is a great partner for ComplyAdvantage because it recognises the power of intelligent AML and risk detection not only to fortify businesses, but also to help them introduce new services to market with greater confidence and integrity.”

ComplyAdvantage offers a hyperscale financial risk insight and AML data solution that uses machine learning and natural language processing (NLP) to help regulated organisations manage risk obligations and prevent financial crime. The company’s proprietary database is derived from millions of data points that provide dynamic, real-time insights across sanctions, watchlists, politically exposed persons, and negative news. It claims that this reduces dependence on manual review processes and legacy databases by up to 80%, and improves how companies screen and monitor clients and transactions.

Related content


Recorded Webinar: Trade surveillance: Deploying monitoring and surveillance capabilities for today’s new normal

Let’s face it: The old ways aren’t coming back. A plethora of challenges brought on by the covid-19 pandemic, coupled with unrelenting market volatility and uncertainty, have pushed financial service firms to look for rigorous monitoring and surveillance solutions to meet the demands of the emerging trading landscape. Working from home (WFH) has increased the...


SteelEye Targets Buy Side with Three-Tiered Surveillance Suite

SteelEye has launched a three-tier suite of communications compliance capabilities aimed at addressing the regulatory obligations of any size of financial institution. SteelEye is hoping this flexibility of approach makes its record-keeping and surveillance platform more appealing to smaller buy-side players that often lack the budget or resource capability to implement extensive platform solutions. SteelEye’s...


RegTech Summit New York City

Now in its 5th year, the RegTech Summit in NYC explores how the North American financial services industry can leverage technology to drive innovation, cut costs and support regulatory change.


Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...