Skip to main content

Help us improve the Digital Marketplace - send your feedback

TRM LABS UK LTD

TRM Triage

Act on crypto identifiers found during investigations without needing to be a crypto expert. Investigators can assess seizure potential, generate investigative leads such as links to VASPs or illicit activity, and escalate to a specialist if needed. Receive virtual, on-demand training on how to identify and act on crypto evidence.

Features

  • Rapidly triage blockchain artifacts from mobile devices
  • Search and investigate wallets from a desktop computer
  • Perform bulk searches and see full search history
  • Receive realtime alerts on fund movements for crypto wallets
  • Collaborate using shared notes, addresses and more
  • Accelerate investigations with largest database scam, fraud victim reports
  • Courses and certifications on crypto fundamentals and search and discovery

Benefits

  • Ensure non-specialists can recognize and understand crypto evidence they find
  • Know and take the preliminary steps to handle evidence effectively
  • Assess seizure potential and find links to potential criminal activity
  • Identify who owns or controls the wallet
  • Find links to exchanges who may provide attribution information
  • See links between wallets and victim reports
  • Refer evidence to crypto specialists for seizure or further analysis
  • Upskill your organization to triage crypto evidence successfully

Pricing

£2,495 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at uk-gov-gcloud@trmlabs.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 7 4 7 2 5 6 7 7 4 3 8 7 9 8

Contact

TRM LABS UK LTD Philip Lear
Telephone: 07988500371
Email: uk-gov-gcloud@trmlabs.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None.
System requirements
  • Desktop, laptop with 8GB RAM and GPU of 16GM RAM.
  • Mobile

User support

Email or online ticketing support
Email or online ticketing
Support response times
<1 hour maximum response time is expected to be 5-30 minutes on average.
● Available 24/7

In the event and/or problem that has a significant, severe impact on the Services, we can offer SLAs of response within 2 hours.

Live chat functionality is available 24/7 and has maintained an average response time of under two minutes to customer requests.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We have not done personal testing. However, Slack and Messenger have done independent testing.
Onsite support
No
Support levels
Customer and platform support is included as part of annual recurring software charges. TRM Labs does not currently tier our support structures and offers differently priced support packages. Support does include the services of a technical account manager and a cloud support engineer.
Support available to third parties
No

Onboarding and offboarding

Getting started
Your Customer Success Manager will assist with setting up the platform, user provisioning, basic training, service requests and escalations, product feature requests, and customized training requests. An SE will be assigned for troubleshooting and platform integration assistance. Our Compliance Advisory team will help with advice and guidance on setting up your crypto compliance and AML program and teams and insights on industry best practices. This resource brings deep experience working within compliance departments for both fiat and crypto from other financial institutions.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
There is no "takeout" capability to download a user's data. However, users can export any graphs created from within the tool. TRM Users can export via CSV, SVG, PNG, or TRM formats.
End-of-contract process
TRM offers our customers at no extra charge as part of their licensing subscription A dedicated customer success team comprised of a Deployment Strategist (customer success representative), sales engineer, and account manager. Product training, API configuration, and troubleshooting from your customer success team during initial onboarding and throughout your lifecycle as a customer Access to TRM Academy online courses Access to our Global Investigations team Access to our Compliance Advisory team

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
TRM has designed its platform and user interface to be intuitive and easy to use. Users can search addresses, entity names, transaction hashes, or events with a Google-like search bar. Every feature, from navigating between TRM modules to plotting transactions on a graph, is point-and-click functionality. No coding or technical training is necessary. Many pages and links automatically open in new tabs as users navigate, preserving current work and allowing users to work on multiple tasks simultaneously, pivoting between granular transactional details and broader entity insights. TRM also offers chatbox functionality for live support and a searchable library of resources.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
We've conducted interface testing with assistive technology users to ensure accessibility. This involved collaborating with individuals who use screen readers, voice recognition software, and alternative input devices. We gathered feedback on navigation, screen reader compatibility, and keyboard accessibility to improve our user interface.
API
Yes
What users can and can't do using the API
We've conducted interface testing with assistive technology users to ensure accessibility. This involved collaborating with individuals who use screen readers, voice recognition software, and alternative input devices. We gathered feedback on navigation, screen reader compatibility, and keyboard accessibility to improve our interface for all users.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
TRM recognizes the importance of customization and flexibility for our customers to take full advantage of our data. Modules include adjustable parameters and filters for better analysis of our data. For example, TRM provides a customizable risk engine to enable and adjust the severity of risks. TRM Know-Your-VASP includes various filters to view data by a specific time, type of blockchain, risk indicator, risk severity, instances of exposure, direct and indirect exposure to risks, exposure to entity name and entity type, exposure to the type of risks, amounts, and others. Real-time supervision enables FIUs and regulators (e.g., Central Banks with supervisory functions) to identify the most prevalent types of risks among VASPs in a jurisdiction, identify VASPs with anomalous exposure (ownership, counterparty) to certain types of risks (e.g., investment fraud) to inform risk assessments and targeted supervision. TRM Forensics also includes dozens of filters to trace funds through the blockchain effectively. This consists of the date, time, transaction hash, counterparty name, USD value, asset value, direction (in/out), direct and indirect exposure, risk type, portfolio asset type, and more.

Scaling

Independence of resources
Our infrastructure is designed to scale dynamically based on demand. We continuously monitor resource utilization and allocate additional resources to maintain optimal performance and responsiveness. Load Balancing: We distribute incoming user requests across multiple servers or instances to distribute the workload evenly. This prevents any single server from becoming overloaded and ensures consistent user performance. Performance Monitoring: We closely monitor the performance of our service in real-time to identify bottlenecks or performance issues. Capacity Planning: We regularly assess our infrastructure capacity and performance trends to anticipate future demand and scale our resources accordingly.

Analytics

Service usage metrics
Yes
Metrics types
Our service metrics include Uptime, the percentage of time our platform is available and accessible to users. Response time: The speed at which our platform responds to user requests. Scalability: We track the platform's ability to handle increasing workloads and user traffic without compromising performance. Error rates: We monitor and analyze the frequency of errors or disruptions users experience while interacting with our platform. Customer support response time: We measure the time it takes for our support team to respond to customer inquiries or issues. Some reports are internal.

Reporting types

Real-time dashboards
Regular reports
Reports on request
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
TRM Users can export via CSV file, SVG file, PNG file, or TRM format. TRM format allows a customer to export and share a graph with another TRM customer by downloading from your segregated environment to share for upload to another segregated customer's environment
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
TRM provides SLAs to guarantee excellent service. According to TRM’s standard SLA, TRM guarantees 99.5% uptime per calendar month and has historically maintained 99.99% uptime on an annual basis for its API endpoints.
If TRM fails to meet the guaranteed uptime, any affected Customers will be eligible to receive a credit to their account. The formal SLA will be included in the Customer Agreement.
Approach to resilience
TRM runs on a highly available public cloud architecture. As a result, we can quickly failover to alternative availability zones or elastically expand our server infrastructure if needed. Our data layer includes blue/green deployments, warm standbys, and continuous backups for high availability and quick recovery.
Outage reporting
We have a real-time status at TRM Trust Site for reporting outages. If disruptive maintenance is scheduled, customers will be notified in advance via email

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access in management interfaces and support channels is restricted using Role-based Access Control (RBAC), enforcing Multi-factor Authentication (MFA), and Privileged Access Management (PAM). RBAC assigns roles and permissions based on responsibilities, limiting access. MFA adds security layers, requiring multiple verification factors. PAM tightly controls privileged access and monitors activities. Access attempts are logged and monitored for suspicious behavior. Regular access reviews ensure permissions align with current needs.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
SOC 2 Type ll

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC 2 Type II
Information security policies and processes
We have information security policies that govern sensitive data handling, storage, and transmission. These policies are regularly reviewed and updated for alignment with industry best practices and compliance requirements. Access Control: We implement access controls to restrict access to sensitive information based on the principle of least privilege. Access rights are granted only to authorized individuals and are regularly reviewed and revoked as necessary. Data Encryption: We employ encryption technologies to secure data both in transit and at rest. This includes encrypting communication channels, databases, and storage devices to prevent unauthorized access or interception. Incident Response Plan: We have an incident response plan to address security incidents. This includes procedures for detecting, analyzing, mitigating, and notifying of security breaches, Employee Training and Awareness: We provide regular training and awareness programs to educate employees about information security best practices and their roles and responsibilities in safeguarding company data. Compliance and Auditing: We undergo regular internal and external audits to assess compliance with relevant regulatory requirements and industry standards. This includes compliance with GDPR and any other applicable regulations. We continuously monitor and evaluate our information security posture to for improvement and implement proactive measures to enhance our security controls and processes.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
TRM employs a traditional Software Development Life Cycle (SDLC) to assemble its SaaS solution, ensuring timely updates. Changes are communicated through verbal, email, and ticketing systems, tracked via Jira. Each stage, from identifying needs to deployment, is managed meticulously. Updates undergo iterative testing in development and testing environments before deployment to production. A robust change management process also assesses potential security impacts, ensuring compliance with policies and regulations. This comprehensive approach guarantees the reliability, security, and integrity of TRM's services throughout their lifecycle.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
At TRM Labs, we employ a comprehensive vulnerability management process to standardize the identification, assessment, and remediation of vulnerabilities and security misconfigurations throughout our software development lifecycle, combining automated scanning and manual review at various stages, including proactive code security checks, continuous scans for cloud environment vulnerabilities, and annual third-party penetration testing. Our security team then evaluates and contextualizes these findings, adjusting risk assessments as needed, and tracks and manages the remediation process meticulously through a specialized Jira project and a dedicated vulnerability management dashboard.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our protective monitoring processes swiftly identify potential compromises through advanced tools and continuous system monitoring. Upon detection, our security team initiates incident response procedures, isolating affected systems and collecting forensic data. We collaborate with stakeholders and escalate as necessary. Our goal is to acknowledge and address incidents within minutes, aiming for resolution within hours, depending on severity.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our incident management processes at TRM are comprehensive and transparent. We maintain pre-defined processes for common events, supported by a robust logging and alerting system tethered to an on-call system for core platform engineering teams. Users can report incidents through various channels, including in-app notifications for service disruptions. Upon notification, our dedicated response team swiftly investigates incidents, ensuring regulatory compliance while mitigating their impact. We provide detailed incident reports outlining the nature of the event, actions taken, and preventive measures implemented.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As a SaaS company, we are deeply committed to combating climate change through a range of impactful initiatives: Carbon footprint reduction: We prioritize energy-efficient infrastructure and data centers, optimizing resource usage to minimize carbon emissions. Our carbon footprint is rigorously measured by external resources, ensuring accountability and progress tracking. Remote-first approach: Embracing a remote-first culture reduces commuting, significantly lowering carbon emissions. Virtual collaboration tools empower our team to work efficiently from anywhere, further reducing our environmental impact. Renewable energy advocacy: We encourage our employees to power their homes with renewable energy sources like solar or wind power, promoting sustainability beyond our operations. Green partnerships: Collaborating with eco-conscious suppliers and service providers amplifies our commitment to sustainability, fostering a greener supply chain. Carbon offset initiatives: We invest in projects that neutralize our remaining carbon footprint, supporting endeavors such as reforestation, renewable energy development, and community-based sustainability projects.

Covid-19 recovery

We demonstrate our support for COVID-19 recovery through various initiatives: Community assistance: We provide financial support or resources to communities affected by the pandemic, helping them rebuild and recover. Employee support: We offer flexible work arrangements, mental health resources, and financial assistance to employees impacted by COVID-19, ensuring their well-being and stability during recovery. Healthcare partnerships: We collaborate with healthcare organizations or initiatives to support vaccination efforts, provide medical supplies, or offer technology solutions to enhance healthcare delivery during recovery. Educational support: We invest in educational programs or initiatives to address learning loss, support educators, and ensure students have access to quality education as part of the recovery process.

Tackling economic inequality

We address economic inequality through various initiatives to level the playing field and empower underserved communities: Skills development programs: We provide training programs, workshops, or educational resources to equip individuals from marginalized communities with the skills and knowledge needed to thrive in the workforce. Community partnerships: We collaborate with local organizations, non-profits, or government agencies to support economic development initiatives, job training programs, or entrepreneurship opportunities in underserved areas. Diversity and inclusion initiatives: We prioritize diversity and inclusion within our organization and industry, advocating for equal opportunities and fair representation for all individuals, regardless of background or identity. Impact investing: We allocate resources towards impact investing or social responsibility initiatives that address economic disparities and create positive change in disadvantaged communities.

Equal opportunity

Equal opportunity

We demonstrate our commitment to equal opportunity through concrete actions and initiatives: Recruitment and hiring practices: We employ fair and unbiased recruitment processes, ensuring that job opportunities are accessible to individuals from diverse backgrounds. We actively seek to attract candidates from underrepresented groups and provide equal consideration for all applicants. Diversity and inclusion initiatives: We foster a culture of diversity and inclusion within our organization, promoting awareness, understanding, and acceptance of differences. We provide training and resources to employees to cultivate an inclusive work environment where everyone feels valued and respected. Equal pay policies: We maintain transparent and equitable compensation practices, ensuring that all employees receive fair and equal pay for equal work. We regularly review and adjust salary structures to address any disparities and promote wage parity across genders and demographic groups. Professional development opportunities: We provide access to training, mentorship, and career advancement programs to support the growth and development of all employees, regardless of background or identity. We prioritize promoting from within and provide opportunities for skill-building and career progression. Community engagement: We engage with local communities and organizations to support initiatives that promote equal opportunity, such as job training programs, educational outreach, and mentorship initiatives for underrepresented groups.

Wellbeing

To address employee well-being, we prioritize several key initiatives: Mental health support: We offer resources such as counseling services, mental health workshops, and employee assistance programs to support the emotional well-being of our team. Work-life balance: We promote flexible work arrangements, encourage time off, and provide tools for time management to help employees maintain a healthy balance between work and personal life. Physical health initiatives: We offer wellness programs, fitness challenges, and access to gym facilities or virtual fitness classes to support employees in maintaining their physical health. Social connection: We foster a supportive and inclusive workplace culture through team-building activities, social events, and opportunities for collaboration and connection among colleagues. Recognition and appreciation: We celebrate achievements, recognize hard work, and provide opportunities for feedback and growth to foster a positive work environment where employees feel valued and appreciated.

Pricing

Price
£2,495 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Two weeks trial access to TRM Triage for appropriately accredited UK clients.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at uk-gov-gcloud@trmlabs.com. Tell them what format you need. It will help if you say what assistive technology you use.