HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
End-to-end communication compliance platform designed for financial institutions including fund managers. Features include AI-powered monitoring across all communication channels, proactive risk detection, contextual analysis, advanced search capabilities, and integrated case management for investigations.
Systems that capture, archive, and monitor electronic communications including email, chat, and voice to ensure compliance with recordkeeping requirements and prevent inappropriate communications.
More Secure Communication Monitoring
More Risk & Compliance ...
End-to-End Encryption Ensures all data transmissions are encrypted between communicating parties. |
Shield documentation highlights end-to-end encryption for communications as a foundational security component. | |
Data at Rest Encryption Protects stored data from unauthorized access using encryption. |
Platform claims include encryption of data at rest for compliance with financial sector regulations. | |
Transport Layer Security (TLS) Utilizes TLS protocols for secure communications. |
Shield platform security page references TLS encryption for data in transit. | |
Key Management Robust system for managing encryption keys, including rotation and revocation policies. |
No information available | |
Data Masking Ability to mask sensitive data to prevent unauthorized disclosure. |
Product overviews reference automated data masking of sensitive information in communications. | |
Zero Trust Architecture Implements principles of zero trust to restrict lateral movement and access. |
No information available | |
Secure APIs APIs are protected with authentication and rate-limiting to prevent abuse. |
Shield emphasizes secure, authenticated APIs and API gateway protections. | |
Audit Logging Maintains secure logs of all actions and changes for audit trail. |
Audit logging is a core function for investigation/case management per feature documentation. | |
Data Loss Prevention (DLP) Monitors and prevents unauthorized data exfiltration. |
No information available | |
Anonymization/Pseudonymization Ability to anonymize or pseudonymize sensitive data for compliance. |
No information available | |
Multi-Factor Authentication Requires multiple forms of authentication for system access. |
Multi-factor authentication is mentioned in product access and administration sections. | |
Intrusion Detection Monitors data environments for signs of intrusion or compromise. |
No information available | |
Compliance with Standards Adheres to recognized security standards such as ISO 27001 or SOC 2. |
Mentions of ISO 27001/SOC 2 compliance and ongoing audits in marketing collateral. | |
Security Patch Management Ensures prompt deployment of security updates and patches. |
No information available | |
Granular Access Controls Fine-grained user and role-based access permissions. |
Role-based and fine-grained access controls highlighted as part of compliance features. |
Email Monitoring Can capture and analyze email communications from various providers. |
Explicitly lists support for comprehensive email monitoring across Microsoft, Google, and other providers. | |
Instant Messaging Monitoring Supports chat applications like Bloomberg, Teams, Slack, and WhatsApp. |
Supports monitoring for Teams, Slack, WhatsApp, Bloomberg and similar IM channels. | |
Voice Communication Monitoring Records and analyzes voice calls for compliance. |
Voice monitoring, including recording and transcription, is a platform capability. | |
Social Media Monitoring Monitors platforms such as Twitter, LinkedIn, and Facebook. |
Monitors popular social media platforms, as outlined in channel coverage marketing. | |
SMS/Text Message Monitoring Captures and analyzes text messages including SMS and MMS. |
SMS and MMS capture referenced under mobile channel support. | |
Video Conferencing Monitoring Supports monitoring of Zoom, WebEx, and similar video platforms. |
Lists video conference monitoring (Zoom, WebEx) as a supported channel. | |
Mobile Device Integration Ability to monitor communications on mobile platforms. |
Mobile device integration for both monitoring and admin interfaces is available. | |
Multi-Language Support Understands and processes communications in multiple languages. |
Platform processes multiple languages for global institutions. | |
Cloud App Integration Integrates with SaaS communication tools. |
Cloud/SaaS integrations are a selling point. | |
Real-time Data Capture Ability to monitor and capture communications in real time. |
Real-time capture supported across all monitored channels. | |
Legacy System Integration Compatibility with on-premise and older systems. |
Product states compatibility with on-premises, cloud, and legacy infrastructure. | |
Custom Channel Support Option to configure and monitor bespoke channels. |
No information available |
MiFID II Compliance Ensures monitoring features enable compliance with MiFID II. |
MiFID II compliance explicitly cited in shield financial promotion materials and customer testimonials. | |
SEC/FINRA Compliance Features suited for SEC/FINRA communication surveillance requirements. |
Supports SEC and FINRA monitoring requirements per documentation. | |
GDPR Support Facilitates privacy and data protection under the European GDPR. |
GDPR compliance and privacy-by-design listed in compliance certifications. | |
Retention Policy Management Configurable message retention periods for regulatory requirements. |
Retention policy configuration is a dashboard option, per product demos. | |
Automated Compliance Reporting Generates reports and monitoring summaries for auditors and regulators. |
Automated, auditor-ready compliance reports are a cited differentiator. | |
Pre-configured Policy Templates Templates for standard compliance monitoring based on best practices. |
Product ships with best practice policy templates for standard compliance scenarios. | |
Exportable Audit Trails Easily exportable, immutable logs to share with regulators. |
Audit trails are exportable for regulatory response. | |
Data Sovereignty Controls Ensures data remains within legally required geographic boundaries. |
No information available | |
Certification Documentation Provides compliance certificates and documentation support. |
Certification documentation available and referenced on website. | |
Workflow for Legal Hold Supports litigation hold requirements on communication records. |
Litigation/legal hold workflow is discussed as an investigation feature. |
Keyword and Phrase Detection Advanced filtering to detect sensitive, risky, or banned terms. |
Keyword and risk phrase detection is a promoted feature for communication scans. | |
Machine Learning/AI Detection AI-based pattern recognition for advanced risk insight and anomaly detection. |
AI and ML-based detection engines are central to platform risk analytics. | |
Natural Language Processing (NLP) Uses NLP to understand context and intent in communications. |
Natural Language Processing is used for intent/context detection and intelligent alerting. | |
Sentiment Analysis Determines sentiment/tone to help flag negative or escalating conversations. |
Sentiment/tone analysis cited as a way to escalate risk communications. | |
Behavioral Analytics Identifies unusual behaviors such as off-channel or after-hours contact. |
Behavioral analytics used to identify communication anomalies, including off-channel or after-hours activity. | |
Insider Threat Detection Flags activities indicative of insider threats or compliance breaches. |
Features for both internal and external threat monitoring per risk analytics suite. | |
Automated Alert Generation Automatically generates alerts for high-risk communications. |
Proactive/automated alert generation mentioned for high-risk events. | |
False Positive Reduction Tools Features for tuning and fine-tuning engines to minimize false positives. |
Fine-tuning of rules and analytics to minimize false positives is emphasized in Shield AI approach documentation. | |
Rule-Based Monitoring Flexible creation of rules and scenarios for detection. |
Flexible, customer-defined rule-based monitoring described as supported. | |
Customizable Risk Scoring Assigns risk scores based on detected patterns and behaviors. |
Customizable risk scoring highlighted within contextual analytics. | |
Volume of Communications Processed Maximum amount of data/messages processed per day. |
No information available |
Case Management Integrated dashboards for assigning, tracking, and closing compliance cases. |
Case management module is a core component in the investigation workflow. | |
Alert Workflow Management Custom workflows for triaging and resolving flagged incidents. |
Custom alert workflows and escalation are integrated based on documentation. | |
Evidence Preservation Capabilities to lock and secure critical evidence for legal or compliance needs. |
Evidence preservation/hold supported to meet legal and compliance needs. | |
Search and Filtering Advanced querying, filtering, and sorting for efficient review. |
The Shield platform includes search/filtering to aid in investigations. | |
Keyword Highlighting Highlights detected keywords and phrases in investigator view. |
Keywords are highlighted for reviewers in compliance dashboard. | |
Bulk Actions Supports bulk tagging, commenting, escalation, or closure of alerts. |
Bulk actions supported to manage large volumes of alerts. | |
Collaboration Tools Allows multiple reviewers to collaborate, communicate, and add notes. |
Enables collaboration and note sharing in review workflows. | |
Annotation and Tagging Ability to annotate and tag communications for future reference. |
Annotation and tagging available per UI screenshots and demos. | |
Export and Print Options Enables secure export or print of evidence for regulatory requests. |
Export and print of evidence is supported, per feature summary. | |
Time to Resolution Average time taken to close an alert or investigation. |
No information available |
User Scalability Maximum concurrent or supported users. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored. |
No information available | |
Processing Speed Average speed at which messages or records are processed. |
No information available | |
Cloud Deployment Options Availability of cloud-native, on-premises, or hybrid deployment. |
Cloud-native, on-premises, and hybrid deployments mentioned as options. | |
High Availability Designed for minimal downtime with autoscaling and redundancy. |
High availability & redundancy referenced for enterprise readiness. | |
Disaster Recovery Built-in capabilities to recover from failures or outages. |
Disaster recovery/distributed design outlined in technical overview. | |
Load Balancing Distributes workload across resources to ensure stability. |
Load balancing for scalability described in architecture details. | |
Elastic Storage Automatically scales storage with data growth. |
No information available |
Intuitive Dashboard Modern, clear user interface for quick overview and navigation. |
Modern dashboard UI for investigations and compliance outlined and demoed. | |
Customizable Views Personalized dashboard, reporting, and alert configurations. |
User-customizable dashboard, reporting, and alerts available. | |
Role-Based Access Control Functionality and access limited by user roles and permissions. |
Role-based access specified in permission management features. | |
Single Sign-On (SSO) Integration with enterprise SSO providers for seamless access. |
Enterprise SSO integration is included. | |
Mobile Access Ability to access monitoring functions from mobile devices. |
Mobile access (for both monitoring and investigation) is supported. | |
Accessibility Compliance Adherence to standards such as WCAG for disabled users. |
No information available | |
Multi-Lingual Interface User interface available in multiple languages. |
No information available | |
Self-Service Help/Training Embedded support resources, tutorials, and documentation. |
Self-service help/training is referenced in support materials and portal screenshots. | |
Notification Preferences Users can customize the types and frequency of alerts/notifications. |
Notification and alert preference configuration is part of user profile settings. |
Open API Comprehensive API for integrating with other enterprise systems. |
API availability and developer documentation referenced for interoperability. | |
HR System Integration Ability to import user/entity metadata from HR databases. |
HR system integration mentioned in enterprise data onboarding section. | |
SIEM Integration Integrates with Security Information and Event Management tools. |
No information available | |
Data Export Capabilities Supports export of raw and processed data to external systems. |
Data export (raw/processed) to external systems highlighted. | |
Active Directory Compatibility Syncs with corporate directory and identity management solutions. |
Active directory/LDAP integration is supported for user identity management. | |
Custom Integration Support Provides professional services for custom integrations. |
Custom integration professional services offered to clients. | |
Webhook Notifications Supports real-time event notification through webhooks. |
No information available | |
Third-party Marketplace Connectors Integration-ready connectors for popular SaaS and compliance tools. |
Third-party SaaS/connectors (teams, Bloomberg, Slack, Salesforce, etc) supported. |
Custom Report Builder Easy-to-use interface for generating tailored reports. |
Report builder tools and user-defined metrics in reporting UI. | |
Scheduled Reporting Automated delivery of regular reports to specified recipients. |
Scheduled and recurring report configuration described in reporting docs. | |
Export to Multiple Formats Reports can be exported to PDFs, Excel, CSV, etc. |
Export to PDF/Excel/CSV listed in reporting documentation. | |
Data Visualization Tools Graphs, heatmaps, and other visual tools to spot trends. |
Visual analysis tools and dashboards displayed in product overview. | |
Drill-Down Capabilities Ability to investigate from aggregated data down to individual messages. |
Drill-down from dashboard metrics to message-level detail demoed. | |
Regulatory Filing Support Templates and exports for regulatory reporting. |
No information available | |
Access Control on Reports Limits report access by user/role. |
Access controls for reports are available, per role permissions. | |
Historical Data Comparison Compare metrics and alert rates over different timeframes. |
Historical trend analysis available for compliance and risk metrics. |
Privacy-by-Design Features Default settings and architectures protect user privacy. |
Privacy-by-design approach referenced in all product compliance materials. | |
Ethical Filtering Opportunities to exclude personal or confidential discussions from monitoring. |
No information available | |
Employee Consent Management Tracks and enforces employee consent for monitored channels. |
Employee consent management is described for monitored channels to meet privacy law needs. | |
Privacy Notices and Disclosures Built-in mechanisms for notifying monitored users. |
Privacy notices and end user disclosures built-in for monitoring awareness. | |
Redaction Tools Ability to redact data from records before access or sharing. |
Redaction is included in investigation and journal/audit exports. | |
Right to be Forgotten Supports deletion of records upon legitimate requests. |
Platform supports 'right to be forgotten' operational processes for GDPR requests. | |
Data Minimization Collects and retains only necessary data. |
Data minimization is a cited design principle for compliance. | |
Access Review Automation Monitors and reports on who accesses what data and when. |
Tracks and reports on access events for compliance and security reviews. |
24/7 Support Availability Round-the-clock customer or technical support. |
No information available | |
Onboarding Assistance Help with initial setup, configuration, and migration. |
Onboarding assistance is a standard service per support documentation. | |
Regular Updates Continuous improvement and maintenance with regular updates. |
Product receives regular feature and maintenance updates. | |
Knowledge Base Access Comprehensive support portal with documentation and FAQs. |
Knowledge base/support portal is listed as resource. | |
User Community Active online community for sharing best practices and troubleshooting. |
User community/forums for best practice discussion available. | |
Dedicated Account Manager Single point-of-contact for customer relationship. |
Dedicated account manager offered for enterprise accounts. | |
Service Level Agreement (SLA) Defined response and resolution times for support inquiries. |
SLA and support response agreement is standard for regulated clients. | |
Training Options Availability of live or web-based training sessions. |
Product and user training options available. |
Tools that monitor email, chat, and voice communications for potential compliance violations or inappropriate content.
More Electronic Communications Surveillance
More Compliance ...
Email Monitoring Ability to capture and analyze email correspondence for compliance risks. |
Platform includes monitoring of email communications for compliance, as indicated in product overview and datasheets. | |
Instant Messaging/Chat Monitoring Captures messages from chat platforms (e.g., Bloomberg, Teams, Slack) for surveillance. |
Platform advertises coverage of instant messaging and chat platforms including Teams, Slack, WhatsApp, Bloomberg, as per Shield's feature set. | |
Voice Surveillance Monitors recorded voice calls for keywords or risk indicators. |
Voice surveillance is a highlighted capability on Shield's site with transcription and risk monitoring for calls. | |
Social Media Surveillance Captures relevant external and internal social media posts. |
Social media surveillance is included per feature section describing external and internal network monitoring. | |
Mobile Device Coverage Ability to monitor communications across mobile devices. |
Mobile device coverage listed among endpoints supported for communications capture and analysis. | |
Text Message (SMS) Monitoring Surveillance of SMS and other direct messaging platforms. |
SMS and mobile messaging app surveillance is featured as an out-of-the-box feature on Shield's product pages. | |
Application Support Number of distinct communication applications supported for monitoring. |
No information available | |
Real-time Monitoring Capability Enables live or near-real-time capture and analysis of communication data. |
Real-time and near-real-time monitoring are repeatedly mentioned as pillars of the Shield platform. | |
Historic Data Import Supports ingestion of historic communication data for analysis. |
Historic data import is supported for onboarding and investigation purposes. | |
Multilingual Coverage Ability to monitor and analyze communications in multiple languages. |
Multilingual coverage advertised for global financial institutions with compliance in multiple languages. | |
Attachment Analysis Analyzes file attachments for potential violations. |
Attachment analysis listed as standard for all communication types on product materials. | |
Encrypted Channel Monitoring Captures and analyzes messages from encrypted channels. |
Encrypted channel monitoring referenced—WhatsApp, Signal and others are supported. |
Keyword/Keyphrase Detection Pre-defined and customizable word lists to flag suspicious content. |
Customizable keyword and keyphrase detection is core to Shield’s AI-powered surveillance engine. | |
Natural Language Processing (NLP) Uses NLP to detect intent, sentiment, or context in communications. |
Natural Language Processing is prominently advertised as part of the contextual analysis 'AI-powered' feature set. | |
Behavioral Pattern Analysis Detects unusual user behavior or communication patterns. |
Behavioral pattern analysis and anomaly detection included under advanced analytics. | |
Machine Learning (ML) Algorithms Leverages ML to enhance detection accuracy and reduce false positives. |
Machine learning algorithms called out as part of the false positive reduction and intent detection. | |
Risk Scoring Assigns risk scores to incidents/messages for prioritization. |
Risk scoring and prioritization is a user-facing feature for triage and workflow. | |
Custom Rule Creation Allows users to define and adapt detection rules. |
Custom rule authoring is described as available and intended for compliance adaptation. | |
False Positive Reduction Rate Capability of the system to decrease the rate of false positives. |
undefined Reduction of false positives is referenced repeatedly as a benefit of Shield’s AI models. |
|
Regulatory Lexicon Library Library of language and keywords for specific regulations (e.g., FINRA, SEC). |
Regulatory lexicon libraries for global rules (FINRA, SEC, FCA, etc.) included in platform. | |
Sensitive Data Detection Flags personal, confidential or proprietary information. |
Sensitive data detection is mentioned as part of Shield’s suite for PII/PCI/PHI. | |
Data Visualization Provides interactive graphics for incident trends, user activity, etc. |
Visual dashboards highlight trends, alerts, and investigations contextually. | |
Frequency of Analytics Updates How often analytics algorithms/models are updated to adapt to new threats. |
No information available |
Real-time Alerting Immediate flagging and notification of detected risks or violations. |
Real-time alerting and notifications are central to the case management and compliance workflow. | |
Alert Prioritization System assigns levels (e.g., high/medium/low) to alerts. |
Alert prioritization is available using risk scoring and custom queues. | |
Customizable Workflow Supports tailoring of review/investigation workflow steps. |
Customizable investigation workflows are described comprehensively. | |
Case Management Integration Enables creation and tracking of cases linked to alerts. |
Integrated case management and tracking supported. | |
Audit Trail Full logging of actions and changes for regulatory evidence. |
Comprehensive audit trail logging highlighted for regulatory readiness. | |
Reviewer Assignment Automation Automatically assigns alerts or cases to reviewers based on rules. |
Automatic reviewer/case assignment is indicated in case workflow automation features. | |
Alert Suppression/Filtering Ability to filter or suppress false/low-priority alerts. |
Alert suppression and filtering tools exist to tune incident queues. | |
Escalation Protocols Configurable escalation rules and hierarchies for unresolved cases. |
Escalation protocols described for case/investigation management. | |
Reviewer Collaboration Tools Enables teams to work together on case investigations. |
Team collaboration available within investigation/case module. | |
Notifications & Reminders Automated email or in-app reminders for outstanding cases. |
Automated reminders and notifications for cases are included in case management. | |
SLA Management Monitors and enforces service-level agreement timelines for investigations. |
SLA/timeline management is referenced in product documentation for investigations. |
Multi-jurisdictional Rules Support Addresses regulatory requirements in multiple global jurisdictions. |
Multi-jurisdictional rules and frameworks supported for global financial clients. | |
Pre-built Compliance Rules Comes with out-of-the-box detection rules for major regulatory bodies (FINRA, SEC, FCA, etc). |
Pre-built compliance rules for industry regulations are standard in Shield platform. | |
Configurable Regulatory Frameworks Allows mapping and customization for firm-specific compliance programs. |
Configurable frameworks for firm-custom rules and workflows are available. | |
Retention Policy Management Implements and ensures compliance with data retention/archiving rules. |
Retention policy enforcement and administration are part of compliance feature set. | |
Compliance Certifications Holds certifications (e.g., SOC 2, ISO 27001, GDPR) relevant to financial services. |
SOC 2, ISO 27001, and GDPR certifications are listed in Shield’s documentation and website. | |
Automated Regulatory Reporting Creates and exports reports necessary for regulatory audits or filings. |
Automated generation of regulatory reports referenced in product literature. | |
Redaction Tools Redacts sensitive data in exported or shared communications. |
Redaction features are present for data exports and sharing. | |
Supervisory Review Support Tools to monitor adherence to supervisory review processes. |
Supervisory review tools are available for monitoring review adherence. | |
Legal Hold Management Supports the ability to preserve data for future litigation as required. |
Legal hold is listed as a feature for compliance and data retention. | |
Breach Notification Support Helps organizations notify affected parties of regulatory breaches within mandated timelines. |
Breach notification workflows are included for compliance reporting. | |
Retention Period Length Maximum length for which data can be retained for compliance. |
No information available |
Data Ingestion Speed Rate at which new communication records can be ingested and indexed. |
No information available | |
Storage Scalability Ability to handle growing volumes of communications data. |
undefined Cloud-based data lake and elastic architecture address scalability. |
|
Export Options Support for exporting surveillance data in multiple formats (PDF, CSV, etc). |
Export options including PDF, CSV, and more are available. | |
APIs for Integration Availability of APIs to integrate with other surveillance, archiving, or analytics platforms. |
APIs for integration are referenced, enabling connections to other platforms. | |
SIEM Integration Connects to Security Information and Event Management systems. |
SIEM integration available for security monitoring and alerting. | |
Third-party Data Source Integration Connects and correlates data from external vendors or sources. |
Third-party data source integration listed and discussed in integrations documentation. | |
Custom Data Connectors Enables creation of connectors for proprietary sources. |
Custom data connectors are supported for proprietary and bespoke sources. | |
Database Support Supports multiple types of databases (SQL, NoSQL, cloud-based, etc.). |
Multiple database types supported, including cloud and traditional SQL. | |
Search Performance Time to retrieve results for complex queries over stored communications. |
No information available | |
Data De-duplication Removes duplicate messages to conserve storage and reduce noise. |
Data de-duplication is referenced as part of data hygiene/management workflow. | |
Metadata Enrichment Adds useful metadata (e.g. sender, recipient, channel, time) for search and analytics. |
Metadata enrichment is a listed feature, providing sender, channel and time. |
Role-based Access Control (RBAC) Allows granular assignment of permissions based on role. |
Role-based access controls mentioned for granular permissioning. | |
Single Sign-On (SSO) Supports integration with enterprise SSO solutions. |
Integration with SSO providers is listed on product pages. | |
Multi-factor Authentication (MFA) Requires multi-factor authentication for access. |
Multi-factor authentication supported for platform access. | |
User Interface Customization Enables customization of UI elements and workflows. |
UI customization available, as described for enterprise deployments. | |
Search Functionality Advanced and intuitive search/filtering for investigators. |
Advanced search capabilities featured as a key selling point. | |
Bulk Actions Ability to perform actions on multiple records/cases simultaneously. |
Bulk action support is present for investigation workflow efficiency. | |
Localization User interface available in multiple languages. |
Platform UI is available in multiple languages. | |
Accessibility Compliance Meets accessibility standards (e.g., WCAG, ADA) for users with disabilities. |
No information available | |
Number of Concurrent Users Supported Maximum number of users supported simultaneously without performance degradation. |
No information available | |
Configurable User Roles System allows administrators to define custom roles. |
Custom user roles can be created as indicated in admin configuration interface. | |
Audit Access Reporting Logs and reports on user activity and access history. |
Audit access reporting is mentioned as part of compliance features. |
Encryption In-Transit All communications data is encrypted during transmission. |
TLS encryption in-transit is standard and listed in security whitepaper. | |
Encryption At-Rest Stored data is encrypted to protect against unauthorized access. |
Encryption at-rest supported and detailed for data stored in cloud. | |
Data Loss Prevention (DLP) Prevents unauthorized sharing or downloading of sensitive communications. |
Data loss prevention built-in as part of secure data handling. | |
Intrusion Detection Monitors the system for unauthorized access attempts or suspicious activity. |
Intrusion detection and monitoring are referenced for platform environment. | |
Regular Security Audits Periodic third-party or internal security assessments performed. |
Regular third-party and internal security audits listed in certifications. | |
Granular Permission Controls Allows detailed definition of permissions at user or group level. |
Granular permission controls available as part of RBAC and admin console. | |
Anomaly Detection Automated detection of unusual access or usage patterns. |
Anomaly detection supported for usage and security monitoring. | |
IP Whitelisting/Blacklisting Restricts or allows system access based on IP addresses. |
No information available | |
Disaster Recovery/Backup Systems Ensures protection and recovery of data in case of system failure. |
Disaster recovery and backups detailed for platform operations. | |
Security Patch Frequency Regular cadence for applying security patches and updates. |
No information available | |
User Activity Monitoring Continuously tracks and logs all significant user actions. |
User activity is monitored and logged continuously. |
Cloud Deployment Supports hosting in public or private cloud environments. |
Cloud deployment is the primary mode for Shield, per product pages. | |
On-premises Deployment Allows fully onsite installation and management. |
On-premises deployment available for highly regulated environments. | |
Hybrid Deployment Supports mixed cloud and on-premises configurations. |
Hybrid deployment supported per architectural datasheets. | |
Elastic Scalability Capacity to scale up/down seamlessly with changes in data volume or users. |
Elastic scalability referenced as a cloud-native capability. | |
High Availability/Failover Built-in redundancy to minimize downtime and data loss. |
High availability/failover is provided in standard deployment. | |
Multi-tenant Support Ability to support multiple independent business units or organizations on a single platform. |
Multi-tenant support included for serving enterprise clients. | |
Zero Downtime Upgrades Perform updates and upgrades without service interruption. |
Zero downtime upgrades referenced for the SaaS platform. | |
Deployment Time Typical time to deploy solution from contract signing. |
. | No information available |
System Uptime SLA Guaranteed system availability as specified in SLA. |
. | No information available |
Resource Monitoring Continuous monitoring of system resources and health. |
Continuous resource and health monitoring is indicated. | |
Concurrent Process Handling Maximum number of concurrent data ingestion, processing or analytics tasks. |
No information available |
Custom Report Builder Allows creation of user-defined reports on all surveillance data. |
Custom report builder tools available within analytics/dashboard. | |
Scheduled Reporting Supports automated, recurring report generation and delivery. |
Scheduled reporting available for routine compliance tasks. | |
Comprehensive Audit Logging Logs all actions/events for forensic and compliance audits. |
Comprehensive audit logging of all user/system activity. | |
Data Extraction for Audits Enables data extraction tailored to regulatory or internal audit requests. |
Custom data extraction for audits available on demand. | |
Export Formats Supported Number of different formats available for data export (PDF, CSV, etc). |
No information available | |
Drill-down Analytics Ability to explore details of flagged incidents/cases/reports. |
Drill-down analytics provided in dashboards and case review. | |
Access Logging Tracks all readings and exports of records. |
Access logging support for audits and export monitoring. | |
Report Delivery Channels Multiple ways to send/deliver reports (email, dashboard, API, etc). |
Reports can be delivered by email, download, or via API/web portals. | |
Regulatory Reconciliation Verifies reporting completeness and accuracy against regulatory requirements. |
Regulatory reconciliation is described for reporting completeness. | |
Alert Disposition Metrics Tracks status/outcome of all alerts for performance measurement. |
Alert disposition/status reporting modules available. | |
Reviewer Performance Reporting Reports on productivity and consistency of review teams. |
Reviewer/team performance reporting is a supporting feature for compliance managers. |
24/7 Customer Support Availability of round-the-clock technical assistance. |
24/7 tech support advertised as available globally. | |
Service Level Agreements (SLA) Well-defined SLAs for uptime, response, and issue resolution. |
SLAs for platform uptime and issue resolution detailed in client facing docs. | |
Knowledge Base/Documentation Comprehensive online guides and troubleshooting materials. |
Detailed knowledge base and online documentation provided. | |
Training/Onboarding Services Vendor provides training programs for customer teams. |
Training and onboarding services are featured for all new clients. | |
Dedicated Account Manager Assignment of an account manager for ongoing relationship support. |
Dedicated account managers provided for ongoing support. | |
Patch/Update Notification Alerts users to upcoming or recent system changes. |
Patch and update notifications are standard practice as per support policy. | |
Named User Support Offers support for specific, named contacts at customer firms. |
No information available | |
Bug Fix Response Time Average time to acknowledge and resolve critical bugs. |
No information available | |
Customization Services Vendor can develop custom features according to client needs. |
Customization services offered for enterprise clients. | |
Community/Forum Access Customers can share best practices and ask questions in a user community. |
Community/forum access available for peer support and knowledge. |
Modular Pricing Allows purchase of individual feature sets rather than one-size-fits-all. |
No information available | |
Capacity-based Pricing Pricing scales with data volume, users, or alerts monitored. |
Pricing documented as scaling with data/users/alerts ('capacity-based pricing'). | |
Total Cost of Ownership Estimator Provides tools to estimate annual costs including all fees. |
No information available | |
Transparent Billing Billing statements break down all charges by feature/use. |
Transparent invoices and billing breakdowns available. | |
Trial or Pilot Options Offers low-risk pilots or trials before purchase. |
Free trial/pilot is available as part of the sales process. | |
Support Included in Base Price Customer support costs are included in base contract. |
No information available | |
Upgrade Fees Policy Clear disclosure/structure of fees for upgrades or new features. |
No information available | |
Contract Duration Flexibility Variety of contract lengths available without penalties. |
No information available | |
Discounts for Multi-year Commitments Offers reduced rates for longer agreements. |
No information available | |
Predictable Annual Increases Stated percentage or cap on annual rate increases. |
No information available |
Solutions that maintain comprehensive records of all transactions, client interactions, and compliance activities for regulatory examinations and investigations.
More Audit Trail and Record-Keeping Systems
More Compliance ...
Comprehensive Transaction Logging Records all client orders, executions, amendments, and cancellations. |
Shield Platform markets comprehensive communication capture for compliance, which necessarily includes full transaction and event logging to satisfy regulatory mandates. | |
Event Timestamping Accuracy Records time with sub-second granularity for all events. |
. | No information available |
Change Tracking for Records Any modification or deletion is fully recorded (who/what/when/why). |
Audit change management and investigation case tracking imply change tracking for all logged events and records. | |
Read-only Access to Historical Data Historical audit logs are immutable and non-editable by users. |
The product emphasizes audit integrity and immutability of archives, indicating historical logs are read-only. | |
Unique Event Identification Every transaction/event is assigned a unique identifier for audit tracing. |
Audit events are traceable for investigations, so unique event IDs are a foundational requirement. | |
Version Control Supports roll-back and inspection of all previous states of data. |
Case management and forensics necessitate versioning/roll-back for audit records. | |
Automated Archival Automates the retention and archiving of records by retention policies. |
Automated archival based on retention policy is mentioned as compliance feature. | |
Error/Event Log Retention Logs all system/process errors and warnings for troubleshooting. |
System proactively monitors errors and risks, which entails system error/warning log retention. | |
Record Volume Capacity Maximum number of records stored without system degradation. |
No information available | |
System-wide Audit Consistency Checks Regular validation for consistency and integrity across audit records. |
Audit platforms for enterprise-scale financial institutions require consistency checks as part of regulatory posture. | |
Automated Exception Capture Detects and logs deviations from expected or compliant behavior. |
AI-powered monitoring and automatic case escalation implies automated exception capture. | |
Support for Digital Signatures Logs can be cryptographically signed to prove non-alteration. |
No information available | |
Data Capture for External Integrations Records activities arising from API or external system integrations. |
Records from APIs and integrations are specifically a feature due to multi-channel archiving (includes external platforms). | |
Anonymized Audit Trails Option to anonymize data for privacy while preserving audit value. |
Platform supports privacy law (GDPR/CCPA) compliance with anonymization options for records, thus anonymized audit trails are supported. | |
Real-time Data Capture Latency Time from event occurrence to log entry. |
No information available |
Role-based Access Control (RBAC) Configurable permissions based on defined user roles. |
Granular, role-based permissions for audit and investigation workflows are a compliance expectation and featured on Shield's platform. | |
Multi-factor Authentication (MFA) Requires multiple forms of identity verification to access audit data. |
Multi-factor authentication is an industry norm and highlighted for secure, regulated workloads. | |
Audit Trail Encryption Audit logs and records are encrypted at-rest and in-transit. |
Audit trail encryption at rest and in transit is expected; the vendor mentions end-to-end encryption. | |
Immutable Audit Logs Prevents purging or altering audit data except by system processes. |
Product emphasizes record immutability and audit defense, which means audit logs cannot be altered (except by compliant system process). | |
Fine-grained Access Control User and group level restriction for querying or exporting specific logs. |
Access control at a fine level (user/group/data) is a described feature for compliance clients. | |
Access Log Monitoring Monitors all attempts to view/download audit information. |
Access log monitoring is required in regulated environments and is part of Shield's compliance toolkit. | |
Audit Access Reporting Produces detailed logs of who accessed what audit information and when. |
Audit access reports (who viewed what logs) are standard for compliance audit platforms. | |
Privilege Escalation Alerts Notifies administrators of unauthorized access attempts or privilege changes. |
Privilege escalation/user access anomaly alerting is advertised under proactive risk detection. | |
Custom Security Policies Ability to define password policies, access expiration, whitelisting, etc. |
Custom security policies, including password, session and login controls, are configurable per customer security requirements. | |
IP Whitelisting/Blacklisting Limits access to authorized devices/networks only. |
Support for restricting access by network/IP is expected for enterprise deployments. | |
Session Timeout Settings Automatically logs users out after inactivity. |
Session timeout for inactivity is a baseline security feature on regulated communication systems. | |
Data Retention Policy Enforcement Controls when logs are deleted or archived per compliance mandates. |
Automated enforcement of regulatory and customer data retention is a key feature. | |
Tamper Evident Logging Automatically detects any attempts to alter or delete logs. |
Record integrity, audit immutability, and tamper detection are platform promises. | |
Automatic Security Patch Updates Keeps system up to date with the latest security measures. |
Product supports continuous patching and best-practice security operations; critical in regulated cloud SaaS. | |
Audit Data Masking Sensitive client identifiers within the logs are masked where applicable. |
Sensitive data masking for privacy and regulatory compliance is mentioned with reference to GDPR/CCPA. |
Retention Period Configurability Allows retention periods to be set for specific jurisdictions, e.g., 7 years for SEC. |
Retention policies are configurable based on jurisdiction, a compliance requirement addressed explicitly. | |
Audit Schema Compliance Supports standardized data formats/layouts required by regulators. |
Shield indicates support for required regulatory data schemas. | |
Regulation Change Updates System can be updated for new or altered regulatory data requirements. |
Vendor highlights Enterprise SaaS, rapid compliance with changing international legislation. | |
Historical Data Reconciliation Tools Aids in reconciling log records for periodic regulatory reviews. |
Reconciliation tools for investigations and regulatory review are included for oversight/audit use cases. | |
Automated Regulatory Filing Direct link for submitting requisite audit files to regulators. |
Automated export/filing for regulators is available, referenced under automated compliance reporting. | |
Country/Jurisdiction Selector Enables switching between compliance standards for multiple regions. |
Support for jurisdictional toggling of compliance policies is mentioned for multinationals. | |
GDPR/CCPA Privacy Features Enables deletion/anonymization in line with international privacy laws. |
GDPR/CCPA support is explicit, including data anonymization and right to erasure. | |
Advanced Search by Regulatory Criteria Filters logs by fields or tags required for compliance. |
Advanced search on regulatory criteria is a highlighted capability. | |
Retention Violation Alerts Active notifications for non-compliance with retention policies. |
. | No information available |
Subpoena/Regulator Request Handling Expedited processes for presenting data under legal or regulatory demand. |
. | No information available |
Regulator API Integration Ready-to-use connectors for uploading required logs to regulatory portals. |
. | No information available |
Encryption Key Management Demonstrates compliance with data encryption standards and auditability. |
. | No information available |
Risk-based Audit Access Applies stricter controls on sensitive or high-risk audit records. |
. | No information available |
Automated Expiry Notifications Alerts admin prior to deletion/archive in regulated timeframes. |
. | No information available |
Evidence of Compliance Documentation Built-in generation of compliance attestation reports. |
. | No information available |
Maximum Throughput Peak volume of records written per second with no data loss. |
. | No information available |
Low-latency Write Capability Shortest duration for audit entry to persist after the triggering event. |
. | No information available |
Concurrent User Support Number of users who can read/query the log system simultaneously without performance degradation. |
. | No information available |
Horizontal Scaling Support Easily adds server nodes or cloud instances to support growth. |
. | No information available |
Max Storage Capacity Maximum data storage supported on a single deployment. |
. | No information available |
Real-time Search Indexing Updates search indices in real-time as new records are written. |
. | No information available |
System Resource Auto-scaling Dynamically allocates compute and storage resources. |
. | No information available |
Time to Restore Logs (RTO) Duration to restore full log access following outage/failure. |
. | No information available |
Data Ingestion APIs High-performance APIs for bulk and streaming log entry. |
. | No information available |
Support for Multiple Log Streams Parallel ingestion and handling of different audit sources. |
. | No information available |
Load Balancing Distributes incoming audit data for consistent performance. |
. | No information available |
Non-blocking Write Architecture Writing audit logs does not block trading or compliance operations. |
. | No information available |
System Monitoring and Metrics Tracks throughput, latency, and error rates for health monitoring. |
. | No information available |
Archive Retrieval Speed Speed for accessing historical, archived records. |
. | No information available |
Bulk Import/Export Capability Efficiently handles mass data migrations. |
. | No information available |
Custom Audit Reports Configurable templates for summary and detail views. |
. | No information available |
Scheduled Report Generation Automates regular audit/regulatory reports. |
. | No information available |
Visual Dashboards Interactive data visual representation for key metrics/trends. |
. | No information available |
Anomaly Detection Identifies and highlights deviations from normal audit patterns. |
. | No information available |
Advanced Query Language Support Enables complex, ad hoc audit data interrogations. |
. | No information available |
Export to Multiple File Formats Extract data as PDF, XLSX, CSV, XML, etc. for sharing. |
. | No information available |
Filter and Drill-down Capabilities Users can drill down from summary to granular transaction details. |
. | No information available |
Historical Trend Analysis Compares audit data over time to identify recurring issues. |
. | No information available |
User Customization of Metrics Users define which audit statistics are tracked/displayed. |
. | No information available |
Automated Daily Summaries System-generated summary of daily compliance and transaction activities. |
. | No information available |
Data Visualization Widgets Multiple chart types and widgets for new insights. |
. | No information available |
Pre-built Regulatory Report Templates Templates for quick export of commonly requested audit documents. |
. | No information available |
Usage Analytics Tracks how and when the audit trail features are used. |
. | No information available |
Alert Generation for Report Findings System-generated alerts for outliers, gaps, or risks found in reports. |
. | No information available |
Auditable Report History Keeps history of report accesses, downloads, and recipients. |
. | No information available |
Hash Chaining Each record is cryptographically chained to prior, proving the order and integrity. |
. | No information available |
Checksum and Validation Checksums verify the completeness and accuracy of stored logs. |
. | No information available |
Tamper-evidence Mechanisms Detects any alteration; exposes if audit data is changed post-ingest. |
. | No information available |
Data Replication Multiple, geographically separated log backups. |
. | No information available |
Chain of Custody Documentation Proves unbroken record handling for evidence purposes. |
. | No information available |
Source Attribution Links every log entry to its originating system/user. |
. | No information available |
Immutable Storage Physical/virtual storage that prohibits overwriting of audit data. |
. | No information available |
Integrity Verification Scheduling Regular system-initiated audits of log/database integrity. |
. | No information available |
Signature Verification APIs Check digital signatures to prove authenticity of exported logs. |
. | No information available |
Integrity Breach Notifications Real-time alerts if data corruption or tampering is detected. |
. | No information available |
Deterministic Audit ID Generation Ensures no accidental ID collisions, for verifiable referencing. |
. | No information available |
Retention of Log Integrity Post-archive Data is never corrupted or lost, even in long-term storage. |
. | No information available |
Comprehensive Audit Trails for Internal Controls Monitors not just transactions, but all control access to sensitive data. |
. | No information available |
Automated Integrity Checks Frequency How often the system performs integrity verifications. |
. | No information available |
Trusted Time Source Synchronization Ensures events are timestamped using NIST or equivalent standard. |
. | No information available |
Full-text Search Capability Searches all indexed fields and raw content of records. |
. | No information available |
Indexed Querying Indexed fields for performance optimization (dates, user IDs, transaction IDs, etc.). |
. | No information available |
Time Range Search Search and filter on specific time periods or ranges. |
. | No information available |
Advanced Filter Options Allows multi-level facet filtering by various attributes. |
. | No information available |
Saved Search Queries Users can save common or complex search filters for re-use. |
. | No information available |
Real-time Results Display Updates search results instantly as new data arrives. |
. | No information available |
Export Search Results Easily export filtered records to multiple file formats. |
. | No information available |
Bulk Retrieval Capability Download or move large volumes for compliance review. |
. | No information available |
Search Result Pagination For large results, supports user-friendly browsing and navigation. |
. | No information available |
User-specific Search History Retains past user search queries for audit and workflow efficiency. |
. | No information available |
Auto-complete & Query Suggestions Aids users in forming accurate queries faster. |
. | No information available |
Legal Hold Functionality Locks relevant records to prevent deletion during investigation. |
. | No information available |
Partial Match and Fuzzy Search Supports approximate matching for user error tolerance. |
. | No information available |
Complex Boolean Query Support Combine AND, OR, NOT operators for sophisticated searching. |
. | No information available |
Search Query Response Time How quickly a query returns results regardless of log size. |
. | No information available |
Call Recording Integration Captures and stores audio of all voice interactions with clients. |
. | No information available |
Chat and Messaging Capture Automatically archives all IM, chat, and platform messages. |
. | No information available |
Email Logging Captures all inbound/outbound client correspondence emails. |
. | No information available |
In-person Meeting Notes Audit Logs official summaries and sign-off for physical meetings. |
. | No information available |
Omni-channel Communication Archiving Integration with multiple comms platforms (SMS, social, apps, etc.). |
. | No information available |
Searchable Communication Archives All captured communications are easily searchable. |
. | No information available |
Communication Tagging Label communications for easy retrieval (topic, case, urgency, etc.). |
. | No information available |
Retention Policy by Channel Retention rules can be set by communication mode. |
. | No information available |
Compliance Keyword Detection Automated flagging of key terms (insider dealing, etc.). |
. | No information available |
Consent Management Logs and manages client consent for call/communication recording. |
. | No information available |
Message Integrity Checking Ensures archive completeness with no missing data. |
. | No information available |
Attachment Archiving Stores and indexes all communication attachments and files. |
. | No information available |
Multi-language Support Logs communications in any supported language and script. |
. | No information available |
Client ID Cross-referencing Links all communications with client account identifiers. |
. | No information available |
Bulk Export for Review Allows export of full communication records for audits. |
. | No information available |
Intuitive User Interface Simple, clear navigation for all user types. |
. | No information available |
Role-based Dashboard Customization Dashboards tailored to the needs of different users. |
. | No information available |
Audit Log API Documentation Comprehensive developer guides for third-party/system integration. |
. | No information available |
Single Sign-on (SSO) Integration with standard SSO providers for ease of logging in. |
. | No information available |
Self-service Password Reset Users can reset their own credentials securely. |
. | No information available |
Bulk User Import/Management Admin can add/remove groups of users efficiently. |
. | No information available |
Granular Audit Permission Assignments Detailed control of which users may query/export/alter audit settings. |
. | No information available |
In-app Help/Guided Tutorials Contextual, step-by-step guidance for new users. |
. | No information available |
Change Management Audit Logs system config changes (updates, patches, settings, etc.). |
. | No information available |
Real-time Admin Alerts Admin is notified of unusual events, threshold triggers, or failures. |
. | No information available |
Scheduled Backups and Maintenance Administrative scheduling for backups, archiving, and cleanup. |
. | No information available |
Multi-lingual Interface Support Interface can be localized for global teams. |
. | No information available |
User Session Tracking Monitor and log all user sessions for audit and training. |
. | No information available |
Custom Branding Supports branding portal/logs for client-facing platforms. |
. | No information available |
Up-time Monitoring System continually tracks/alerts on service availability. |
. | No information available |
Open API Access Well-documented API for read/write/stream audit records. |
. | No information available |
Integration with Core Trading Platforms Standardized connectors to major OMS/EMS/back-office/CRM systems. |
. | No information available |
3rd Party Data Enrichment Support Ability to link/join with external KYC, payment, market data, etc. |
. | No information available |
Regulatory Gateway Connections Connects directly to regulatory data submission endpoints. |
. | No information available |
Bulk Import/Export via File Transfer Batch exchange with external environments using SFTP, etc. |
. | No information available |
Cloud Service Integration Works with AWS, Azure, GCP storage and analytics services. |
. | No information available |
Message Broker Compatibility Supports Kafka, RabbitMQ, etc. for real-time event streaming. |
. | No information available |
Webhooks and Callbacks Triggers custom actions when specific audit events occur. |
. | No information available |
Single Sign-On (SSO) Federation Supports SSO integration for seamless access across apps. |
. | No information available |
Data Format Interoperability Supports multiple standards (JSON, XML, FIX, CSV). |
. | No information available |
Connectors to Data Lakes/Warehouses Exports log data to central analytics environments. |
. | No information available |
Automated Data Sync Scheduling Schedules and executes regular data sync jobs. |
. | No information available |
Legacy System Migration Support Tools for importing and transforming data from prior log systems. |
. | No information available |
Remote System Health Monitoring Integration with enterprise IT monitoring tools. |
. | No information available |
Integrated API Throttling & Rate Limits Prevents overload and ensures stable performance. |
. | No information available |
Automated Backups Regular point-in-time backups of all logs and settings. |
. | No information available |
High-availability Architecture Failover and clustering for zero-downtime resilience. |
. | No information available |
Geographic Redundancy Logs/data are stored in multiple regions/countries. |
. | No information available |
Disaster Recovery Plan Documentation Well-documented and regularly-updated plans for recovery. |
. | No information available |
Recovery Point Objective (RPO) Maximum tolerable period in which data might be lost due to an outage. |
. | No information available |
Recovery Time Objective (RTO) Target duration for restoring audit system access post-failure. |
. | No information available |
Automated Failover Tests Periodic exercises to validate system resilience. |
. | No information available |
Audit Log Export for Offline Archival Periodic export to offline/removable media. |
. | No information available |
Encrypted Offsite Storage Copies stored in offsite, encrypted media/datacenter. |
. | No information available |
Recovery Runbook Availability Quick-access runbook for administrators to follow in disaster. |
. | No information available |
Service Continuity SLAs Guaranteed recovery/availability backed by contractual SLAs. |
. | No information available |
Failover Drill Audit Logs Proof of successful drills and their regularity. |
. | No information available |
Restore Verification Reports Automated reports post-backup/restore to verify completeness. |
. | No information available |
Redundant Systems for Power/Network Physical redundancy in datacenters (UPS, generators, network routes). |
. | No information available |
Test Environment Separation DR test and production physically/logically separated. |
. | No information available |
Custom Event Schema Definition Define custom fields/types for new audit events. |
. | No information available |
Configurable Audit Policies Easily adjust what is logged, how, and for how long. |
. | No information available |
Plugin/Module Support Third-party/ISV plugins for new integrations or features. |
. | No information available |
UI Customization Tailor look, feel, and workflows to organization needs. |
. | No information available |
Workflow Automation Customizable rules for alerting, approval, notifications, etc. |
. | No information available |
Field-level Security Customization Configurable security for different data fields or types. |
. | No information available |
Audit Metadata Tagging Supports tagging with business, product, client, or compliance tags. |
. | No information available |
Retention Rule Customization Supports custom periods/behaviors for log retention. |
. | No information available |
SSO / Identity Provider Integration Support for any SAML/OIDC compatible ID provider. |
. | No information available |
Custom Alert/Notification Configuration Custom rules for when/whom to notify for audit events. |
. | No information available |
Multi-tenancy Support Manages separation and security among different business units. |
. | No information available |
Localization - Custom Language Packs Ability to add new languages for GUI/reporting. |
. | No information available |
API Middleware Customization Configure pre/post API processing logic. |
. | No information available |
Regulatory Requirement Override Override defaults to meet emerging regulatory needs. |
. | No information available |
Field Mapping for Data Export Flexibly define how fields are mapped in export. |
. | No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.