Skip to main content

Help us improve the Digital Marketplace - send your feedback

MOODY'S ANALYTICS UK LIMITED

Moody's Sanctions360

Moody’s Analytics Sanctions360 solution helps companies uncover sanctions related risk in their customers, counterparties, and supply chain more efficiently and effectively. It enables companies to conduct deeper investigative research as part of their enhanced due diligence.

Features

  • Sanctions, PEPs, adverse media linked to companies and their owners
  • Data on directors, board members, staff, and owners
  • Desktop, API and bulk data feeds for over 500m entities
  • Control networks analysis tools with rich graphing interface

Benefits

  • Instantly discover any hidden sanction risk
  • Uncover control networks of sanctioned risk
  • Export information into Excel or PDF
  • Bulk or batch data transfers via S3, SFTP or API
  • API Access for custom development
  • Visualisation tools making it simple to understand data and risks

Pricing

£45,000 to £650,000 an instance

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at clientservices@moodys.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 3 5 4 2 4 4 8 5 4 4 7 2 9 6

Contact

MOODY'S ANALYTICS UK LIMITED UK Marketing Team
Telephone: 02077725454
Email: clientservices@moodys.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
This can be extended to Moody's Orbis solution or Moody's GRID solution.
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Internet connection
  • Computer with compatible web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Clients may contact our Help Desk via email. Emails are acknowledged within 24 hours and resolution times will depend on the complexity of the question.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
All clients are assigned a dedicated Relationship Manager, and will be given direct contact details for them. Product training is included (both onsite and remote) as part of all our subscriptions. Helpdesk support is provided to all customers without additional cost. Our helpdesk team is available by phone and email to help with any questions relating to data, software tools and integration. Moody's team is highly regarded, and has been the recipient of customer service awards presented at the International Information Industry Awards.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online training & user documentation are available upon request.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Access to the service is switched off at the end of contract. Users can export content in line with the contract up until this point.
End-of-contract process
Access to the product is terminated.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
Yes
What users can and can't do using the API
User's can request sanction risk information on entities through the API. Each user will have their own API key which is available in the web application.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
User's can choose which sanctions lists they subscribe to, and what their thresholds are for ownership with sanction risk. We will show risk down to 0.1%, and users can adjust their own risk tolerances accordingly.

Scaling

Independence of resources
Client services are logically separated. Pre-emptive monitoring of services ensure spikes in usage between clients do not impact the service as a whole.

Analytics

Service usage metrics
Yes
Metrics types
User interface lookups for individual entity pages
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
User's can export their portfolio of entities found in the system upon request.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Excel
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Data within corporate network is not encrypted however compensating controls are in pace.

Availability and resilience

Guaranteed availability
The Services will be operational and fully functional in all material respects (i.e. capable of displaying information and conducting transactions as contemplated in the ordinary course of business) 99% of the time during any 30 day period. The parties shall mutually agree upon a regularly scheduled maintenance downtime period, which shall not exceed two hours in length per day and shall occur during “off-peak hours”. Any breach of service will be refunded with an extended time on the agreed subscription based on a 10x factor of downtime.
Approach to resilience
Available upon request.
Outage reporting
Email alerts or directly from your relationship manager.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
User's are limited to their own individual accounts, and will have access to customer support via the web interface.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC2
Information security policies and processes
We have established comprehensive information security policies, standards, procedures, and guidelines that address physical, technical, and administrative requirements to protect customer business data. We review these documents, update them annually, and share them with applicable parties, including employees and third parties required to comply with these policies. The list of key information security policies, standards, procedures, and guidelines include: » IT (Acceptable) Use Policy » Physical Security Policy » Network Security Standard » User Access and Management Standards » Patch Management Standard » IT Asset Management Standard » System Hardening Standard » Vulnerability Assessment Standard » Log Management Standard » Information Security Incident Response Plan

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We follow defined IT change management and software development processes to ensure that changes to the IT systems are appropriately managed and controlled. This includes guidance for testing, validating, and documenting changes through a formal approval and verification process before implementing changes
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We define and maintain standards for vulnerability and patch management, designed to ensure that software on any of our assets is regularly updated to mitigate security gaps, including addressing the following: » Periodic vulnerability scans use vulnerability assessment tools on all Moody’s Analytics systems that host, access, or otherwise process business data » Identification of software that will be updated, including all software components (that is, client, server and database) where appropriate » Identification of authorized sources for the software updates » Maintaining a process for authorizing and tracking software patching exceptions
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Continual monitoring of infrastructure. Trying to look for holes in security concepts is carried out on a daily basis. This is completed on both production environment and local Moody's networks.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Moody’s maintains an Incident Response Plan to ensure that potential incidents and breaches are monitored, logged, investigated, and remediated, and that roles and responsibilities throughout the incident management process are clearly defined

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Sanctions are restrictions placed on entities, individuals, or companies, that do not allow these individuals to participate in the global economy, in an effort to make the world a better place to live for all. Sanctioned entities will hide their ownership or control of a company, and Sanctions360 provides a tool to limit their ability to hide their sanction status.

Pricing

Price
£45,000 to £650,000 an instance
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Limited time period trial available upon request on a case by case basis.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at clientservices@moodys.com. Tell them what format you need. It will help if you say what assistive technology you use.