SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
LexisNexis Bridger Insight
For cost-effective and efficient sanctions
and watch list screening.




                                  LexisNexis Bridger Insight
Bridger Insight scans your customers or third-parties in real time,
ad-hoc or in bulk against the most up to date watch lists available
and ensures you have a robust audit trail to demonstrate compliance.



Complying with the sanctions regime
The focus on screening and monitoring of clients and third-
parties is increasing. In addition to the requirements of the
                                                                      We were really impressed
Money Laundering Regulations 2007, the FSA is demanding               with how fast and simple it
that firms improve their ongoing sanctions screening and              is to use. The fuzzy-name
monitoring process. HM Treasury’s new powers under the
Counter Terrorism Act could mean additional client screening
                                                                      matching algorithm, delivered
is needed in the future.                                              excellent results which were
Bridger Insight also helps companies manage emerging risks            easy to understand.
around bribery and corruption under the Bribery Act 2010 by           Gary Stephenson, MLRO Prudential UK
enabling users to screen their third party agents, suppliers or
employees against watch lists.
With LexisNexis Bridger Insight, compliance is easy, efficient
and cost-effective, even as the regulatory mountain grows.
Screen and monitor high volumes of clients or third-parties
in one transaction and future proof your organisation against
changes in regulations.

Cost-effective sanctions and watch list
screening with LexisNexis Bridger Insight
•	 Streamline client or third party onboarding and increase
  efficiency while protecting your company and its reputation.
•	 Bridger Insight’s fuzzy-name matching algorithm reduces
  false positives, saving you time and money. The ability to add
  any irrelevant results to an ‘Accept List’ reduces future false
  positives further, increasing the time saved.
•	 With minimal IT investment and resource required the cost
  per check is low, so you’ll soon realise the value.
•	 Bridger Insight adapts easily and automatically to new            Key Benefits
  regulatory requirements, so you can be confident of
  staying compliant.                                                  •	 Flexible and easy to use
•	 Bridger Insight makes it faster to bring on and monitor clients   •	 Increased efficiency with better match rates
  or third-parties without the need for extra headcount or
  system maintenance, keeping your business profitable.               •	 Rapid return on investment
                                                                      •	 ‘Future proof’ your compliance
        Over 3,500 customers rely on                                  •	 Cost-effective and efficient compliance
        LexisNexis Bridger Insight for                                •	 Simple implementation process
        fast and accurate sanctions
                                                                      •	 Robust audit trail included
        and watch list screening.
How it works?
From 1,000 to over 100 million names, Bridger Insight             Minimise false positives
checks as many customers or third-parties as you need
                                                                  In addition to naming variations Bridger Insight also factors
against all the necessary watch lists. Perform screening
                                                                  in common causes of false positives, such as missing or
ad-hoc, at point of transaction or via batch processing and
                                                                  initialised first names and common words. These are held
get maximum benefit through Bridger Insight’s advanced
                                                                  in a common words file which is constantly updated and
matching capability.
                                                                  added to by LexisNexis.
Protect your business and your profitability                      To minimise the workload further, you can automatically
With Bridger Insight it’s easy to monitor a large collection      apply a false positive status when a name matches but
of sanctions and watch lists which are regularly updated          a data element such as address, date of birth or phone
by LexisNexis and included as standard. These include HM          number doesn’t.
Treasury, OFAC, FBI Most Wanted and United Nations.               All potential matches are assigned a confidence score
Depending on your risk-based approach you can just                based on the strength of the name match. You can
screen against the UK HM Treasury list or take a broader          configure match options to compare other data elements
approach and include OFAC, United Nations or any other            to increase this score and define what level of match you
list to ensure that no one is missed.                             want to be alerted to.

It is simple to plug in additional content into Bridger Insight   Easy to implement and simple to use
as needed to support your requirements:
                                                                  Use Bridger Insight online or integrate with your own
•	 Third party politically exposed person (PEP) data             systems behind your firewall. Our highly customisable
  providers such as World-Check                                   platform ensures the workflow process can be seamlessly
•	 Your own internal blacklists of unwanted clients or           integrated to fit with your own internal processes. Bridger
  third-parties (such as previous bad debts)                      Insight is easy and fast to install. It is fully scalable to
                                                                  address individual business needs without the need for
•	 UK and international ID verification data                      heavy IT investment.
Superior fuzzy-name matching
                                                                  A robust and consistent due diligence process
Our advanced fuzzy matching algorithm employs
                                                                  After conducting initial screening through Bridger Insight,
sophisticated searching techniques capable of finding
                                                                  ensure you stay compliant. Ongoing monitoring alerts
relevant potential matches, creating a risk-based approach
                                                                  you to issues with any of your clients or third-parties.
that meets your exact requirements.
                                                                  If you need to investigate further, Bridger Insight is
It takes into account many naming considerations, such as:        part of our wider compliance suite and complements
                                                                  Lexis® Diligence, which can be used to research
•	 Abbreviations                •	 Run Together Names             companies and individuals in more depth.
•	 Anglicised Words             •	 Single Initials
•	 Extra Words                  •	 Titles
•	 Foreign Transliteration      •	 Typographical Errors
•	 Missing Double Letters       •	 Word Order
•	 Mis-spellings
•	 Nicknames
Enhanced due diligence and                                       Trust LexisNexis to protect
media monitoring                                                 your business
Our enhanced due diligence solution and media monitoring         LexisNexis has a world-class reputation for providing
tools, along with LexisNexis Bridger Insight, provide the        professional firms with critical business tools. For over 30 years
complete solution for all your customer or third party due       we have been pioneers in risk management and intelligence.
diligence needs.                                                 Our solutions are used internationally by over 75,000
Lexis Diligence                                                  organisations. These include financial services, law
Access the information you need for enhanced customer            enforcement, government, legal and accountancy firms and
due diligence checks on clients and third-parties. Draw on       blue chip multinational companies, including the world’s top
global company data, biographies, sanctions, PEPs, country       5 banks. Our solutions help customers to reduce the cost of
information and legal case history. Perform negative news        compliance, fulfil regulatory requirements, enhance decision
checks to safeguard your organisation’s reputation, accessing    making and protect their businesses.
23,000 news sources from an archive going back up to 35 years.
All as part of a single search.
LexisNexis Analytics
Monitor news across all key media on your high risk customers
                                                                        Our solutions help customers
or third-parties through your own early warning system, set             to reduce the cost of
up by our analysts. Automated monitoring enables you to                 compliance, fulfil regulatory
anticipate and mitigate any financial and reputational risks
to protect your organisation.
                                                                        requirements, enhance
Instant ID International
                                                                        decision making and protect
Confirm the identity of UK, US and international individuals            their businesses.
using the most up to date information available. Sources
include electoral roll and passport data.




Get in touch
To find out more about LexisNexis Bridger Insight and how LexisNexis can help your business:
+44 (0) 20 7400 2984 | risk@lexisnexis.co.uk | www.lexisnexis.co.uk/risk

Más contenido relacionado

La actualidad más candente

Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and MitigationsApril Mardock CISSP
 
New york oracle users group 2013 spring general meeting ulf mattsson
New york oracle users group 2013 spring general meeting   ulf mattssonNew york oracle users group 2013 spring general meeting   ulf mattsson
New york oracle users group 2013 spring general meeting ulf mattssonUlf Mattsson
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesDebbie A. Everson
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
 
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Michael Bunn
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The PasswordPriyanka Aash
 
The Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud OperationsThe Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud OperationsLaurent Pacalin
 
G05.2015 Secure Web Gateways
G05.2015   Secure Web GatewaysG05.2015   Secure Web Gateways
G05.2015 Secure Web GatewaysSatya Harish
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyMazeBolt Technologies
 

La actualidad más candente (19)

Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Data Loss Detection
Data Loss DetectionData Loss Detection
Data Loss Detection
 
New york oracle users group 2013 spring general meeting ulf mattsson
New york oracle users group 2013 spring general meeting   ulf mattssonNew york oracle users group 2013 spring general meeting   ulf mattsson
New york oracle users group 2013 spring general meeting ulf mattsson
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security Framework
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial Services
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The Password
 
The Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud OperationsThe Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud Operations
 
G05.2015 Secure Web Gateways
G05.2015   Secure Web GatewaysG05.2015   Secure Web Gateways
G05.2015 Secure Web Gateways
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 

Similar a Bridger Insight brochure

Lexis Diligence for Anti-bribery and Corruption_brochure
Lexis Diligence for Anti-bribery and Corruption_brochureLexis Diligence for Anti-bribery and Corruption_brochure
Lexis Diligence for Anti-bribery and Corruption_brochureLexisNexisDiligence
 
Lexis Diligence Anti-bribery and Corruption Brochure
Lexis Diligence Anti-bribery and Corruption BrochureLexis Diligence Anti-bribery and Corruption Brochure
Lexis Diligence Anti-bribery and Corruption BrochureLexisNexisRiskUK
 
Seal datasheet | trading derivative
Seal datasheet | trading derivativeSeal datasheet | trading derivative
Seal datasheet | trading derivativesealsoftwaredept
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Lexis Diligence for Anti-money laundering
Lexis Diligence for Anti-money launderingLexis Diligence for Anti-money laundering
Lexis Diligence for Anti-money launderingLexisNexisDiligence
 
Altlaw competitors checklist
Altlaw competitors checklistAltlaw competitors checklist
Altlaw competitors checklistMatthew Altass
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRAbhishek Sood
 
MindTree Considers Leading Enterprise Contract Management Software
MindTree Considers Leading Enterprise Contract Management SoftwareMindTree Considers Leading Enterprise Contract Management Software
MindTree Considers Leading Enterprise Contract Management SoftwareIcertis
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee PresentationTony DeGonia (LION)
 
LoanResolve Brief Presentation
LoanResolve Brief PresentationLoanResolve Brief Presentation
LoanResolve Brief Presentationjimmymac935
 
Lexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O VerviewLexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O VerviewJason Trego
 
Managing Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyManaging Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyAlasdair Kilgour
 

Similar a Bridger Insight brochure (20)

Brochure: Lexis Diligence
Brochure: Lexis Diligence Brochure: Lexis Diligence
Brochure: Lexis Diligence
 
Lexis Diligence for Anti-bribery and Corruption_brochure
Lexis Diligence for Anti-bribery and Corruption_brochureLexis Diligence for Anti-bribery and Corruption_brochure
Lexis Diligence for Anti-bribery and Corruption_brochure
 
Lexis Diligence Anti-bribery and Corruption Brochure
Lexis Diligence Anti-bribery and Corruption BrochureLexis Diligence Anti-bribery and Corruption Brochure
Lexis Diligence Anti-bribery and Corruption Brochure
 
ENTITY EXCHANGE FOR SELL-SIDE FIRMS
ENTITY EXCHANGE FOR SELL-SIDE FIRMSENTITY EXCHANGE FOR SELL-SIDE FIRMS
ENTITY EXCHANGE FOR SELL-SIDE FIRMS
 
Seal datasheet | trading derivative
Seal datasheet | trading derivativeSeal datasheet | trading derivative
Seal datasheet | trading derivative
 
Prudential-casestudy
Prudential-casestudyPrudential-casestudy
Prudential-casestudy
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Compliance Service Management Solution
Compliance Service Management SolutionCompliance Service Management Solution
Compliance Service Management Solution
 
Lexis Diligence for Anti-money laundering
Lexis Diligence for Anti-money launderingLexis Diligence for Anti-money laundering
Lexis Diligence for Anti-money laundering
 
Regulatory Compliance Audit Management Solution
Regulatory Compliance Audit Management SolutionRegulatory Compliance Audit Management Solution
Regulatory Compliance Audit Management Solution
 
13695550
1369555013695550
13695550
 
Altlaw competitors checklist
Altlaw competitors checklistAltlaw competitors checklist
Altlaw competitors checklist
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
MindTree Considers Leading Enterprise Contract Management Software
MindTree Considers Leading Enterprise Contract Management SoftwareMindTree Considers Leading Enterprise Contract Management Software
MindTree Considers Leading Enterprise Contract Management Software
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
LoanResolve Brief Presentation
LoanResolve Brief PresentationLoanResolve Brief Presentation
LoanResolve Brief Presentation
 
Lexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O VerviewLexis Nexis Risk Solutions O Verview
Lexis Nexis Risk Solutions O Verview
 
Managing Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyManaging Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More Effectively
 
World-Check One Brochure
World-Check One BrochureWorld-Check One Brochure
World-Check One Brochure
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Bridger Insight brochure

  • 1. LexisNexis Bridger Insight For cost-effective and efficient sanctions and watch list screening. LexisNexis Bridger Insight
  • 2. Bridger Insight scans your customers or third-parties in real time, ad-hoc or in bulk against the most up to date watch lists available and ensures you have a robust audit trail to demonstrate compliance. Complying with the sanctions regime The focus on screening and monitoring of clients and third- parties is increasing. In addition to the requirements of the We were really impressed Money Laundering Regulations 2007, the FSA is demanding with how fast and simple it that firms improve their ongoing sanctions screening and is to use. The fuzzy-name monitoring process. HM Treasury’s new powers under the Counter Terrorism Act could mean additional client screening matching algorithm, delivered is needed in the future. excellent results which were Bridger Insight also helps companies manage emerging risks easy to understand. around bribery and corruption under the Bribery Act 2010 by Gary Stephenson, MLRO Prudential UK enabling users to screen their third party agents, suppliers or employees against watch lists. With LexisNexis Bridger Insight, compliance is easy, efficient and cost-effective, even as the regulatory mountain grows. Screen and monitor high volumes of clients or third-parties in one transaction and future proof your organisation against changes in regulations. Cost-effective sanctions and watch list screening with LexisNexis Bridger Insight • Streamline client or third party onboarding and increase efficiency while protecting your company and its reputation. • Bridger Insight’s fuzzy-name matching algorithm reduces false positives, saving you time and money. The ability to add any irrelevant results to an ‘Accept List’ reduces future false positives further, increasing the time saved. • With minimal IT investment and resource required the cost per check is low, so you’ll soon realise the value. • Bridger Insight adapts easily and automatically to new Key Benefits regulatory requirements, so you can be confident of staying compliant. • Flexible and easy to use • Bridger Insight makes it faster to bring on and monitor clients • Increased efficiency with better match rates or third-parties without the need for extra headcount or system maintenance, keeping your business profitable. • Rapid return on investment • ‘Future proof’ your compliance Over 3,500 customers rely on • Cost-effective and efficient compliance LexisNexis Bridger Insight for • Simple implementation process fast and accurate sanctions • Robust audit trail included and watch list screening.
  • 3. How it works? From 1,000 to over 100 million names, Bridger Insight Minimise false positives checks as many customers or third-parties as you need In addition to naming variations Bridger Insight also factors against all the necessary watch lists. Perform screening in common causes of false positives, such as missing or ad-hoc, at point of transaction or via batch processing and initialised first names and common words. These are held get maximum benefit through Bridger Insight’s advanced in a common words file which is constantly updated and matching capability. added to by LexisNexis. Protect your business and your profitability To minimise the workload further, you can automatically With Bridger Insight it’s easy to monitor a large collection apply a false positive status when a name matches but of sanctions and watch lists which are regularly updated a data element such as address, date of birth or phone by LexisNexis and included as standard. These include HM number doesn’t. Treasury, OFAC, FBI Most Wanted and United Nations. All potential matches are assigned a confidence score Depending on your risk-based approach you can just based on the strength of the name match. You can screen against the UK HM Treasury list or take a broader configure match options to compare other data elements approach and include OFAC, United Nations or any other to increase this score and define what level of match you list to ensure that no one is missed. want to be alerted to. It is simple to plug in additional content into Bridger Insight Easy to implement and simple to use as needed to support your requirements: Use Bridger Insight online or integrate with your own • Third party politically exposed person (PEP) data systems behind your firewall. Our highly customisable providers such as World-Check platform ensures the workflow process can be seamlessly • Your own internal blacklists of unwanted clients or integrated to fit with your own internal processes. Bridger third-parties (such as previous bad debts) Insight is easy and fast to install. It is fully scalable to address individual business needs without the need for • UK and international ID verification data heavy IT investment. Superior fuzzy-name matching A robust and consistent due diligence process Our advanced fuzzy matching algorithm employs After conducting initial screening through Bridger Insight, sophisticated searching techniques capable of finding ensure you stay compliant. Ongoing monitoring alerts relevant potential matches, creating a risk-based approach you to issues with any of your clients or third-parties. that meets your exact requirements. If you need to investigate further, Bridger Insight is It takes into account many naming considerations, such as: part of our wider compliance suite and complements Lexis® Diligence, which can be used to research • Abbreviations • Run Together Names companies and individuals in more depth. • Anglicised Words • Single Initials • Extra Words • Titles • Foreign Transliteration • Typographical Errors • Missing Double Letters • Word Order • Mis-spellings • Nicknames
  • 4. Enhanced due diligence and Trust LexisNexis to protect media monitoring your business Our enhanced due diligence solution and media monitoring LexisNexis has a world-class reputation for providing tools, along with LexisNexis Bridger Insight, provide the professional firms with critical business tools. For over 30 years complete solution for all your customer or third party due we have been pioneers in risk management and intelligence. diligence needs. Our solutions are used internationally by over 75,000 Lexis Diligence organisations. These include financial services, law Access the information you need for enhanced customer enforcement, government, legal and accountancy firms and due diligence checks on clients and third-parties. Draw on blue chip multinational companies, including the world’s top global company data, biographies, sanctions, PEPs, country 5 banks. Our solutions help customers to reduce the cost of information and legal case history. Perform negative news compliance, fulfil regulatory requirements, enhance decision checks to safeguard your organisation’s reputation, accessing making and protect their businesses. 23,000 news sources from an archive going back up to 35 years. All as part of a single search. LexisNexis Analytics Monitor news across all key media on your high risk customers Our solutions help customers or third-parties through your own early warning system, set to reduce the cost of up by our analysts. Automated monitoring enables you to compliance, fulfil regulatory anticipate and mitigate any financial and reputational risks to protect your organisation. requirements, enhance Instant ID International decision making and protect Confirm the identity of UK, US and international individuals their businesses. using the most up to date information available. Sources include electoral roll and passport data. Get in touch To find out more about LexisNexis Bridger Insight and how LexisNexis can help your business: +44 (0) 20 7400 2984 | risk@lexisnexis.co.uk | www.lexisnexis.co.uk/risk