free website
promotion

Top Debt Collection Blog

Sales Antidote is Now Offering FREE Proof of Concept and 30 Day Trial of our Spear Watch AML Solution

By Bryan

SAK PROOF OF CONCEPT FOR AML COMPLIANCE

Most solution providers will sound alike and even look alike on the surface. In our experience, this
couldn’t be further from the truth. The only way to see the difference and understand the true
value of a risk screening solution is in the real world, with tangible and actionable results. We call this a ‘Proof of Concept’ (POC).

This POC exercise is simple, does not take a lot of time, and is free. The basic concept for a POC is that we will arrange to securely get a sample of client records, process those through the screening platform against various risk databases, and provide back several key deliverables:

• Source data analysis and recommendations
• Various metrics on hit rates, false positive reduction, and filter tuning options
• Examples of likely true matches that may not have been identified via current screening process
• High-level mapping of results to a variety of high-risk categories (e.g. Terrorism, Money Laundering, Fraud, etc).

We would also encourage you to conduct this same exercise with any other solution providers you are
considering. In doing so, we are confident that you will see the superior optimization of results through the SAK / eSpear screening solution.

The logistics for facilitating a POC are outlined below and we suggest scheduling a conference call to
further discuss and coordinate tasks and responsibilities.

SECURITY

SAK's objective is to make the Proof of Concept (POC) exercise as easy as possible for
our prospective clients and technical groups. Even though we don’t really deal in NPI (Non Public
Information), we strongly suggest that you use some form of encryption and security process to
transmit your client file. To further assist in this, we will follow your security and encryption
protocol/preference, whether that be an encryption standard (ie: PGP, Winzip 256 bit AES, etc)
or transfer process (ie: sftp, secure email, temporary intranet account access, etc).