AML Compliance

Meet compliance requirements efficiently

Anti-Money Laundering Compliance

Overwhelmed by ever-increasing anti-money laundering (AML) regulations and the exorbitant fines for non-compliance? CaseWare AML Compliance puts you ahead of these challenges by providing solutions for each of the crucial components of your AML program (KYC, Transaction Monitoring, Sanctions List Screening, Regulatory Reporting) and engaging the entire organization in compliance efforts—all within a single platform.

How CaseWare AML Compliance Works

CaseWare AML Compliance actively monitors 100% of financial transactions and customer information. When a non-compliant activity is detected, it triggers an alert that is sent to the appropriate stakeholder. Using configurable workflows, the solution assigns responsibility to investigate the alert and logs all activities to create an accurate and comprehensive audit trail of all actions taken.

Attachments, comments and indicators can be added to alerts to assist in root cause analysis or to create cases for investigations. When a regulatory report needs to be filed, the solution can quickly pre-populate the report with information from core systems and the solution’s data analytics platform. Reports can then be reviewed and validated by the compliance team, and sent electronically to regulators. 

Download the brochure



For more information about the CaseWare AML Compliance solution contact us at




Transaction Monitoring

  • Identify transactions by customer(s) exceeding a defined number of withdrawals or deposits over a specified period or across locations
  • Identify all accounts closed with balances and any subsequent activity on those accounts
  • Identify multiple ATM cards issued to the same customer
  • Identify all cash withdrawals or deposits made at the ATM exceeding a defined tolerance
  • Identify multiple cash deposit transactions that aggregate over the internal threshold

Know Your Customer Requirements

  • Identify all customers without address data or with P.O. box addresses only
  • Identify potentially duplicated customers or customers with multiple, invalid or expired identification records
  • Identify all customers with change of name and/or address
  • Identify all accounts for which signing instructions have been amended
  • Identify inactive accounts made active without the customer being made KYC compliant
  • Identify inconsistencies in customer information across entities, et.
  • Identify related customers

Suspicious Activities

  • Identify suspicious activity on accounts previously in a non-transaction state (such as Dormant/Inactive/Frozen)
  • Identify High Risk Customers on new or joint accounts
  • Identify significant informal relationships between customers
  • Identify corporate customers with cash transactions outside the normal course of business
  • Identify sudden loan payments
  • Identify ATM cards created and authorized by the same user
  • Identify products that do not satisfy policy requirements (for example, interest rate, principal, term etc.)

Watchlist Searches

  • Identify customers on Office of Foreign Assets Control (OFAC), Politically Exposed Persons (PEP) or Internal/Custom Lists


  • Identify remittances to and from blacklisted countries
  • Identify instances of remittances to/from multiple recipients and/or senders exceeding a defined threshold
  • Identify recipients consistently receiving money just below the threshold
  • Identify suspicious transactions such as smurfing, flipping, etc.

Fund Transfers

  • Identify customers sending or receiving wires to multiple persons that exceed or are just below the internal threshold
  • Daily report on all incoming and outgoing wire transfers
  • Transfers from specific sources (reference established lists)
  • Provide details of the source of funds information provided by customers

Staff Monitoring

  • Identify transfer of funds from one staff account to another
  • Identify all staff deposits, withdrawals, encashment of checks or fund transfers just within a predefined threshold
  • Identify terminated employees still flagged as staff
  • Identify users with access in violation of SoD