About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

Refinitiv Addresses Money Laundering through Partnership with Napier

Subscribe to our newsletter

With financial crime a key agenda issue at financial institutions, Refinitiv has partnered Napier, a provider of anti-money laundering (AML) and intelligent compliance software, to offer a next-generation transaction monitoring solution designed to help firms tackle money laundering and combat emerging threats of financial crime.

The partnership offers Napier’s analytics, automation and artificial intelligence (AI), backed by Refinitiv’s World-Check Risk Intelligence data, to meet an evolving range of AML compliance requirements. Napier’s AML solution consists of AI-based products to help customers combat evolving threats in financial crime through transaction monitoring, customer and transaction screening. World-Check Risk Intelligence provides users with structured data retrieved from reliable, reputable, public domain sources for risk screening purposes. The information helps firms fulfil due diligence obligations and identify potential financial and related crime, as well as politically exposed persons, sanctioned entities and other areas of concern.

Phil Cotter, managing director of the risk business at Refinitiv. acknowledges the challenges financial services firms face in protecting themselves from money laundering, external and internal fraud, and other financial crime-related activities, and says the partnership of Refinitiv and Napier will bring advances in technology combined with trusted risk intelligence to help organisations monitor transactions and screen for suspicious financial activity.

Using big-data architecture along with AI and machine learning, the Napier solution rapidly ingests and processes hundreds of millions of transactions, client records and all reference data. Users can define scenarios by means of an intuitive user interface without the need for complex coding, and identify high-risk clients and transactions while minimising false positives. The solution also accelerates AML processes and provides an audit trail of all user and system generated actions.

Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: Detecting and preventing market abuse

Market abuse – unlawful disclosure of inside information, insider trading, circular trading, “pump and dump” schemes, etc. – poses significant threats to the integrity of capital markets. In 2024, global trading house Trafigura agreed to pay a $55 million fine to the U.S. Commodity Futures Trading Commission (CFTC) for trading with non-public information, manipulating a...

BLOG

Predictions for 2025: Regulatory Climate to Impact Data Management as KYC Initiatives Evolve

By Cenk Ipeker, General Manager, Product Management, Cloud, NICE Actimize. As we enter 2025, financial institutions are likely to witness a shift toward more efficient, customer-friendly, and compliant Know Your Customer (KYC) practices. These changes will occur as institutions navigate an evolving regulatory landscape and technological advancements, with data management becoming a key focus area...

EVENT

AI in Capital Markets Summit New York

The AI in Capital Markets Summit will explore current and emerging trends in AI, the potential of Generative AI and LLMs and how AI can be applied for efficiencies and business value across a number of use cases, in the front and back office of financial institutions. The agenda will explore the risks and challenges of adopting AI and the foundational technologies and data management capabilities that underpin successful deployment.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...