Continuous AML risk monitoring

Issue 3 2025 Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)

AU10TIX, a global company focused on identity verification and fraud prevention, announced the launch of continuous risk monitoring as part of its advanced anti-money laundering (AML) solution. Driven by customer demand, this capability delivers real-time risk insights across the full customer lifecycle – empowering businesses to detect behavioural anomalies and emerging threats as they arise.

While traditional AML solutions screen individuals and businesses only during onboarding or periodic reviews, AU10TIX’s continuous monitoring capability proactively scans top data sources including global sanctions lists, politically exposed person (PEP) databases, and adverse media in real time to detect anomalies as they emerge. The system dynamically adjusts screening intensity based on customer risk profiles and business requirements– supporting Know Your Customer (KYC) and Know Your Business (KYB) processes, while ensuring adherence to evolving global regulations.

The new capability provides:

• Real-time fraud and money laundering alerts.

• Adaptive risk scoring, continuously recalibrated based on real-time data and changing user behaviour.

• Flexible thresholding tailored to customer risk levels.

• Coverage across 240+ countries and 1600 government sites.

• A unified dashboard for identity verification and AML results.

• Seamless KYC + KYB support in a single compliance flow.

“Mitigating risk requires more than just monitoring, it demands real-time intelligence powered by the best data available,” said Yair Tal, CEO of AU10TIX. “By continuously screening against premium data sources, AU10TIX enables businesses to detect emerging threats early and act before they escalate.”

AU10TIX’s AML solution features a proprietary decision-making mechanism, customisable workflows, and a user-friendly dashboard to streamline risk management and due diligence processes. Leveraging real-time, high-quality data from more than 100 global sanctions lists, 1600 government sites, and 30 000 news sources, AU10TIX ensures accuracy and speed, while minimising false positives. Its all-in-one API allows seamless integration of KYC, KYB, and AML checks, helping businesses save time, reduce costs, and enhance compliance efficiency.

Find out more at http://au10tix.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.