Last updated

KYC Protect: Your Competitive Edge in Customer and Supplier Due Diligence

KYC Protect is an end-to-end due diligence platform that unifies KYC, AML Screening, and Monitoring into one comprehensive solution. Seamlessly integrated with Creditsafe's global business reports, KYC Protect enables users to go from a company search to a final decision in just a few clicks, ensuring they work with trustworthy customers and suppliers.


Why Choose KYC Protect?

  1. Streamlined Workflow:
    KYC Protect eliminates the need to work across multiple systems when assessing customer or supplier risk. With upfront pricing, no hidden charges, and no restrictions on the number of users, it’s designed to simplify your compliance process.

  2. Identify and Verify Key Stakeholders in Seconds:
    Establish who the directors, shareholders, and UBOs (Ultimate Beneficial Owners) are in a business. Automatically create profiles using data from Creditsafe’s 430 million company reports across 200+ countries and territories.

  3. Focus on Genuine Risks:
    With an average of 50% fewer false positives, KYC Protect allows users to allocate time and resources to identifying and mitigating actual threats to their business.

  4. Make Clear-Cut Decisions:
    Gain a clear overview of profiles to highlight high-priority, incomplete, and in-review workloads. Track case status and collaborate with colleagues to ensure a smooth transition from search to decision in just a few clicks.

  5. Comprehensive Risk Screening:
    Screen against the following risk categories:

    • Sanctions
    • Enforcement
    • Politically Exposed Persons (PEP)
    • Adverse Media
    • State-Owned Enterprises
    • Profiles of Interest
    • Disqualified Directors (UK Only)
    • Insolvency Register (UK Only)

Integration Options

The KYC API offers three main integration options to suit your compliance needs:

  1. Single Search Function:
    Perform a one-time KYC search for a business or individual to verify their identity and assess potential risks.

  2. Basic Integration:
    Integrate the KYC product with essential functionalities to meet standard compliance requirements, such as identity verification and risk assessment.

  3. Full Integration:
    Fully integrate the KYC product into your application for comprehensive KYC services, including ongoing monitoring and advanced risk analysis.


Endpoint Overview

The KYC Protect API provides a comprehensive suite of endpoints to support your due diligence and compliance workflows. These endpoints enable you to:

  1. Manage Profiles:
    Create, update, and manage profiles for businesses and individuals, including adding notes, attachments, and key details such as addresses and key parties.

  2. Perform Searches:
    Conduct searches for businesses and individuals to verify their identity and assess potential risks. This includes retrieving search results, reviewing hits, and downloading detailed reports.

  3. Bulk Operations:
    Perform bulk actions such as importing profiles, assigning profiles, or conducting bulk searches for businesses and individuals.

  4. Monitor and Track Alerts:
    Set up and manage ongoing monitoring for profiles, including receiving alerts for changes or risks such as sanctions, adverse media, or politically exposed persons (PEPs).

  5. Risk Screening and Reporting:
    Screen profiles against various risk categories and generate detailed reports to support your compliance decisions.

  6. Lookup and Reference Data:
    Access reference data such as country codes, currency codes, and document types to ensure accurate and consistent data handling.

  7. Audit and Track Activity:
    Retrieve audit logs and track activity related to profiles, searches, and monitoring to maintain a clear record of compliance actions.

  8. Batch Processing:
    Upload and process batch files for profiles or searches, including retrying failed uploads and downloading error reports for troubleshooting.

These endpoints work together to provide a seamless and efficient solution for managing your KYC, AML screening, and monitoring requirements.


Resources

The Product Documentation tab includes the following key resources:

  1. Process Flow Charts:
    A collection of detailed process flows to guide you through integrating and using the KYC Protect API:
    • Single Search Process Flow: Step-by-step instructions for performing a one-time KYC search for a business or individual.
    • Basic Integration Process Flow: A structured guide for integrating essential KYC functionalities, such as identity verification and risk assessment through AML and KYC monitoring and alerts.
    • Advanced Integration Process Flow: Comprehensive instructions for fully integrating KYC Protect, including ongoing monitoring and advanced risk analysis including key parties.

API Documentation

The API Documentation tab provides the OpenAPI specification for this product. It includes:

  • Detailed endpoint definitions.
  • Code snippets for various programming languages.
  • Example requests and responses to help you integrate the API seamlessly.