Compliance Catalyst
Compliance Catalyst is a powerful, data-driven platform designed to streamline KYC, AML, and ABAC processes. It integrates with the Orbis entity database and Grid risk database, offering scalable, customizable risk management solutions that enhance onboarding and customer due diligence efficiency.
Features
- Automated risk assessments to quickly assess associated risks in onboarding
- Integrated risk flags to identify over 57 types of risk
- Identify beneficial owners through extensive corporate structures
- Identify direct and indirect ownership paths to screen for control
- Monitor client portfolio for changes across multiple data points
- Integrated PEP, sanction and adverse media screening
- Customizable information section and reporting including audit trail
- E-forms / questionnaires capability to collect external information
- Access to 20mln+ curated risk profiles for companies and individuals
- Include Financial, ESG and Cyber risk metrics where needed
Benefits
- Supports automated KYC, KYB, and AML activities
- Helps in fraud prevention and sanctions compliance
- Be more effective in your client onboarding and monitoring
- Aids in managing third-party risk effectively
- Enhances alerts with AI to reduce false positives
- Utilizes machine learning for improved user experience
- Identify corporate ownership and risk flags in one place
- Allows customization of company reports and workflows
- Offers advanced name matching and risk profiling
- Provides dashboards for better data visualization and analytics
Pricing
£4,500 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 6 7 3 5 9 2 2 9 1 8 5 1 0 4
Contact
MOODY'S ANALYTICS UK LIMITED
UK Marketing Team
Telephone: 02077725454
Email: clientservices@moodys.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Orbis and GRID. Compliance Catalyst brings together company information from Orbis with GRID's risk events database.
- Cloud deployment model
- Public cloud
- Service constraints
- Not applicable
- System requirements
-
- Internet Explorer 9 or higher
- Google Chrome version 50 or above
- Firefox and Safari supported
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Emails are monitored Monday to Friday during business hours. We aim to respond to all enquiries within 24 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- All clients are assigned a dedicated Account Manager, and will be given direct contact details for them. Product training is included (both onsite and remote) as part of all our subscriptions. Helpdesk support is provided to all customers without additional cost. Our helpdesk team is available by phone and email to help with any questions relating to data, software tools and integration. The Bureau van Dijk helpdesk team is highly regarded, and has been the recipient of customer service awards presented at the International Information Industry Awards.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Initially training is done onsite with subsequent onsite training done when required (normally a couple of times a year or when new joiners start). We also can do training over Skype/WebEx if preferred. Finally we have user documentation including video tutorials built within Orbis.
- Service documentation
- No
- End-of-contract data extraction
- Access to the service is switched off at the end of contract. Users can export content in line with the contract up until this point
- End-of-contract process
- Access to the product is terminated.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- SOAP Web Services. The majority of UI functionality is replicable using the Web Service. Functions include entity identification, data population/master data management and monitoring. Access to our Web Service is on a request by request basis. Trial credentials and support are available upon request
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Individual company reports can be formatted very simply. Each user can have their own dashboard view in Compliance Catalyst. Alerting and monitoring is also individually tailored. It is possible to set up admin rights to share views across multiple users or groups and again this type of group control can be controlled by a designated person within the organisation. Part of the training and set up introduction will cover the customization process.
Scaling
- Independence of resources
- Client services are logically separated. Pre-emptive monitoring of services ensure spikes in usage between clients do not impact the service as a whole.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide you access to your own Admin Site that can give you detailed real-time metrics on data usage, user, and product type. Training can be provided to set this up. There is no additional cost for this service.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Company reports and lists can be exported in Excel, Word, or PDF
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xlsx
- Data import formats
-
- CSV
- Other
- Other data import formats
- Xlsx
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
- Data within corporate network is not encrypted however compensating controls are in pace.
Availability and resilience
- Guaranteed availability
- The Services will be operational and fully functional in all material respects (i.e. capable of displaying information and conducting transactions as contemplated in the ordinary course of business) 99% of the time during any 30 day period. The parties shall mutually agree upon a regularly scheduled maintenance downtime period, which shall not exceed two hours in length per day and shall occur during “off-peak hours”. Any breach of service will be refunded with an extended time on the agreed subscription based on a 10x factor of downtime.
- Approach to resilience
- Available on request
- Outage reporting
- Notification dashboard available to clients for the ongoing monitoring of services provided. Email alerts or directly from your account manager
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Moody's support and management staff have limited access to client reporting and configuration. Access is restricted to small teams of named individuals who are responsible for the ongoing support of a client. A level of anonymous use is available upon request.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC 2 Type 2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our Information Security organization is headed by the Chief Information Security Officer (CISO), who reports to the Chief Information Officer (CIO). Also, we have dedicated departments that collectively contribute to the information security program, including:
» Identity and Access Management
» Application Security
» Network and Cloud Security
» Threat and Vulnerability Management
» Monitoring and Incident Response
» Cybersecurity Architecture and Engineering
» Cyber Risk Management
» Cyber Risk Analytics
» Third-Party Risk Management
» Cyber Program Management
» Cyber Forensics
» Moody’s 24/7 Security Operations Center (SOC) - Information security policies and processes
- We have established comprehensive information security policies, standards, procedures, and guidelines that address physical, technical, and administrative requirements to protect customer business data. We review these documents, update them annually, and share them with applicable parties, including employees and third parties required to comply with these policies. The list of key information security policies, standards, procedures, and guidelines include: » IT (Acceptable) Use Policy » Physical Security Policy » Network Security Standard » User Access and Management Standards » Patch Management Standard » IT Asset Management Standard » System Hardening Standard » Vulnerability Assessment Standard » Log Management Standard » Information Security Incident Response Plan
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We follow defined IT change management and software development processes to ensure that changes to the IT systems are appropriately managed and controlled. This includes guidance for testing, validating, and documenting changes through a formal approval and verification process before implementing changes
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We define and maintain standards for vulnerability and patch management, designed to ensure that software on any of our assets is regularly updated to mitigate security gaps, including addressing the following: » Periodic vulnerability scans use vulnerability assessment tools on all Moody’s Analytics systems that host, access, or otherwise process business data » Identification of software that will be updated, including all software components (that is, client, server and database) where appropriate » Identification of authorized sources for the software updates » Maintaining a process for authorizing and tracking software patching exceptions
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Continual monitoring of infrastructure. Trying to look for holes in security concepts is carried out on a daily basis. This is completed on both production environment and local BvD networks.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Moody’s Analytics maintains an Incident Response Plan to ensure that potential incidents and breaches are monitored, logged, investigated, and remediated, and that roles and responsibilities throughout the incident management process are clearly defined
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Moody's is committed to effective stewardship of the environment and has taken significant steps towards reducing its environmental impact. The company has set a goal to achieve net-zero emissions across its operations and value chain by 2040. This commitment is demonstrated through its decarbonization plan, which outlines tangible strategies for realizing its climate ambitions, including the procurement of 100% renewable electricity in the Company's office spaces and optimizing efficiencies in its operations through its hybrid work program. In addition, Moody's offers products and services that help other organizations and the investor community better understand the links between sustainability considerations and the global markets. For instance, the ESG Score Predictor provides estimates of environmental, social, governance, carbon emissions footprint, transition and physical risk management scores for any company. This helps organizations to achieve full portfolio risk assessment and supports them in their journey towards environmental sustainability. Furthermore, Moody's influences its staff, suppliers, customers, and communities to support environmental protection and improvement. The company advances its commitment to sustainability by considering ESG factors in its operations, value chain, products, and services. Moody's efforts to promote sustainability-related thought leadership, assessments, and data to market participants involve adhering to globally recognized standards including the GRI, SASB, and TCFD recommendations. Through these efforts, Moody's is not only working towards its own environmental goals but also helping other organizations to understand and manage their environmental impact, thereby contributing to the broader fight against climate change.Covid-19 recovery
Moody's has been proactive in supporting communities, businesses, and individuals in managing and recovering from the impacts of COVID-19. We have adapted our lending solutions to help lenders make sense of government assistance programs such as the Main Street Lending Program, the Paycheck Protection Program, and Loan Forgiveness so they can effectively provide capital to small businesses while mitigating risk. This has helped create employment and return-to-work opportunities, particularly in high-growth sectors. We have also provided banks with a secure way to invite and receive digital documents for loan forgiveness, for small business owners who have been hard hit by the pandemic. This supports people and communities, especially those worst affected or shielding, to manage and recover from the impacts of COVID-19. In terms of supporting organizations and businesses, Moody's Analytics RiskCalc Small Business score helps lenders and credit analysts improve the credit risk assessment of their small business portfolio 1. This supports businesses in managing and recovering from the impacts of COVID-19, including where new ways of working are needed to deliver services. Regarding the support of physical and mental health of people affected by COVID-19, while the research does not provide specific initiatives, Moody's commitment to employee well-being and its robust talent management framework suggests a supportive environment for its employees. Finally, in improving workplace conditions that support the COVID-19 recovery effort, Moody's has approved the 2022 - 2023 Geolocation Restructuring Program, which includes the rationalization and exit of certain leased office spaces and a reduction in staff, including the relocation of certain job functions. This supports effective social distancing, remote working, and sustainable travel solutions.Tackling economic inequality
Moody's is committed to addressing economic inequality and fostering growth. The company provides tools that help customers manage risk and comply with global laws, supporting entrepreneurship and business growth. Moody's robust talent management framework creates employment opportunities and provides training, particularly in high-growth sectors and industries with skills shortages. The company supports educational attainment relevant to its contracts, viewing learning and development as an investment in its people. Moody's strives to foster an inclusive culture across its people and communities, embedding responsible, sustainable decision-making into its operations. The company believes diversity and equity are essential to building a workplace where inclusion thrives. Moody's is committed to increasing supply chain resilience and capacity, striving to create a diverse supply chain that includes new businesses, entrepreneurs, start-ups, SMEs, VCSEs, and mutuals. The company supports innovation and disruptive technologies throughout its supply chain to deliver lower cost and/or higher quality goods and services. Moody's supports the development of scalable, future-proofed methods to modernize delivery and increase productivity. The company demonstrates collaboration throughout its supply chain and takes a fair and responsible approach to working with its supply chain partners. Moody's also takes action to identify and manage cybersecurity risks in the delivery of the contract, including in the supply chain. The company contracts with third parties to conduct annual external assessments of its cybersecurity program and has an Information Security Policy and Information Security Standards. Finally, Moody's aims to influence its staff, suppliers, customers, and communities through the delivery of the contract to support resilience and capacity in the supply chain.Equal opportunity
Moody's is dedicated to fostering an inclusive and diverse workforce, including disabled individuals. We believe that diversity strengthens our opinions, innovates our products, and creates a welcoming workplace. Our strategy to increase disabled representation includes a broader perspective on diversity and the significant contributions of our Business Resource Groups (BRGs). These BRGs foster unity and community, encouraging employees to be their authentic selves at work. We support disabled people in developing new skills through our robust talent management framework, which includes learning and development, talent acquisition, performance management, total rewards, succession planning, and leadership development. We offer various training programs, viewing learning as an investment in our people that aligns their professional goals with the company's success. We aim to influence our staff, suppliers, customers, and communities to support disabled people. We strive to embed responsible, sustainable decision-making into our operations and value chain, fostering a nurturing and inclusive culture. We believe diversity and equity are essential to build a workplace where inclusion thrives. Moody's is committed to addressing inequality in employment, skills, and pay. We champion inclusion, provide market-competitive compensation, benefits, and wellness programs, and advance employee engagement. We are committed to paying all employees equitably and fairly and providing extensive and inclusive benefits programs. We emphasize attracting and developing women in our workforce globally and invest in initiatives to understand what attracts, engages, and retains employees from diverse backgrounds. Regarding modern slavery, Moody's has a Modern Slavery Act Transparency Statement, demonstrating our commitment to identifying and managing the risks of modern slavery in our contracts, including in our supply chain.Wellbeing
Moody's is dedicated to the health and wellbeing of its workforce, including mental health. The company's compensation programs are designed to maintain a strong, capable, and motivated global workforce. Moody's aligns compensation to local market standards to attract and retain highly-skilled talent. The company views benefits as an investment in its people and provides competitive benefits programs for all employees and their families. These programs offer resources for physical and mental health, promoting preventive care, awareness, and a healthy lifestyle. Beyond health, welfare, retirement benefits, and paid leave, Moody's offers additional benefits like parental leave and educational support. The company promotes flexible work arrangements to create a work atmosphere where people feel valued and inspired. Moody's is committed to fostering a nurturing and inclusive culture across its people and communities. The company believes diversity and equity are essential to build a workplace where inclusion thrives. This strategy guides Moody's in ensuring equal opportunities in all aspects of employment. Moody's is also committed to improving community integration through collaboration with users and communities in the co-design and delivery of contracts. The company has Business Resource Groups (BRGs) that foster a sense of unity and community, contributing to the co-design and delivery of services. Through these efforts, Moody's aims to support strong, integrated communities, demonstrating its commitment to improving community integration.
Pricing
- Price
- £4,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full access to the products without download functionality is available for limited periods upon request.