This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

Archer® Blog

Subscribe to the official Archer blog for information about new product features, industry insights, best practices, and more.
  • RSA Link
  • :
  • Products
  • :
  • Archer
  • :
  • Blogs
  • :
  • Streamline AML Rule Tuning and Optimization with A...

Streamline AML Rule Tuning and Optimization with Archer and the Templar Shield AML Rule Management App-Pack

Gloria_Higley
Valued Contributor Gloria_Higley Valued Contributor
Valued Contributor
0 0 89
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
Tuesday

The Evolution of Anti-Money Laundering (AML) Risk Management

In 1970, Congress passed the Currency and Foreign Transactions Reporting Act, also known as the Bank Secrecy Act (BSA), establishing requirements for record keeping and reporting by private individuals, banks, and other financial institutions. In 1986 the Money Laundering (ML) Control Act added to the BSA directing banks and other financial institutions to establish and maintain procedures reasonably designed to ensure and monitor compliance regarding reporting and record keeping. Subsequent acts strengthened sanctions and established Suspicious Activity Report (SAR) requirements, and with the USA PATRIOT Act, criminalized the financing of terrorism, strengthened customer identification procedures; prohibited financial institutions from engaging in business with foreign shell banks; required financial institutions to have due diligence procedures and improved information sharing between financial institutions and the U.S. government.

Increasing Complexity in AML Compliance

Regulators expect financial institutions undertake a holistic, firm-wide approach to AML compliance risk management to encompass sound governance through: 1) AML policies, controls, and procedures; 2) Risk Assessments; 3) Transaction Monitoring Program; 4) Findings Remediation and Exception Tracking; 5) Investigations of Fraud and Suspicious Activity; 6) Training and Awareness; and 7) Regulatory and Compliance Reporting.

The inadequacy or absence of sound AML risk management exposes banks to serious risks, especially reputational, operational, and compliance risks.  Recent developments, including robust enforcement actions taken by regulators and the corresponding direct and indirect costs incurred by banks due to their lack of diligence in applying appropriate risk management policies, procedures and controls, have highlighted those risks. Much of these costs could have been avoided had the banks maintained effective risk-based AML policies and procedures. 

Templar Shield AML Rule Management App-Pack to the Rescue

The Templar Shield Anti-Money Laundering (AML) Rule Management App-Pack provides institutions with the ability to simplify a key AML program element: rules and thresholds. A major pain point at many institutions, the methodology surrounding rule tuning is incredibly complex and manual. Between Rule and Threshold document versioning and the constant stream of emails, it is easy to get behind when it comes to rule and threshold management.

Utilizing three On-Demand Applications in Archer, Templar Shield has created an app-pack to streamline AML rule optimization and tuning by centralizing AML rules, thresholds, and creating an automated rule tuning process.

Additionally, the AML Rule Management App-Pack fits within a larger Templar Shield AML Compliance Program Management solution. With the integrated AML Compliance Program Management solution, organizations can have a comprehensive, up-to-date program that is easier to run, with less staff hours, providing regulatory-ready output to evidence AML preparedness. Templar Shield plans to release another app-pack in an upcoming Archer Exchange release that will address additional AML needs surrounding quality control testing, the Templar Shield AML QCT App-Pack. With this app pack, AML Programs can ensure that the controls and practices in place are of the highest quality and can meet regulatory requirements.

Key Features

  • Establish a central repository for AML rules, thresholds, and rule optimization
  • Establish, monitor, and optimize AML rules and thresholds to identify suspicious behavior
  • Integrate external transaction monitoring systems for comprehensive compliance risk management

Benefits

  • Reduced manual processes and ease of workflow and reporting
  • Ability to report accurately and easily to regulators about AML activities and AML risk
  • Automated rule optimization processes
  • Eased tracking through reporting and dashboarding, enabling better insight into rules, thresholds, and their optimization

Ready to learn more about the Templar Shield AML Rule Management App-Pack?

Register to join us for a Free Friday Tech Huddle on April 9, 2021 where Templar Shield will provide a detailed overview and demo of the app-pack. Free Friday Tech Huddles are only available to Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at rsa.com.

 
To learn more about pricing and licensing for this app-pack, please contact Templar Shield at info@templarshield.com or +1-858-609-9509.

 

About the author(s):

James Cluck
GRC Manager, Templar Shield
James is an experienced Enterprise Governance, Risk, and Compliance (eGRC) Manager within Templar Shield’s eGRC Consulting Practice. He has implemented numerous GRC Technology solutions including Policy Program, Incident, Compliance, Business Continuity, Audit, Issues, Risk and Control Self-Assessments, Vendor/Third Party Risk, Vulnerability Management and custom solutions for Anti-Money Laundering. He’s also advised clients in the creation of strategy roadmaps and process improvement. James has been a leader of numerous technical implementations of all sizes, with a history of delivering complex projects. 

Gloria Higley
Product Manager, Archer Exchange
Gloria Higley is a Product Manager focused on providing useful and relevant product offerings for customers and partners with the Archer Exchange. Offered online through RSA Link, the Archer Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, Tools & Utilities, and Content that complement and enhance out-of-the-box capabilities of Archer use cases. 

Labels
  • Resources
  • Webinars
Tags (9)
  • Tags:
  • aml
  • app pack
  • Archer
  • Archer Exchange
  • banking
  • release
  • release announcement
  • release announcements
  • templarshield vendor
0 Likes
Share

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Latest Articles
  • TCP Port Listener - a PowerShell script to capture...
  • FFTH - Archer Exchange February 2021 Release Highl...
  • FFTH - Archer Exchange February 2021 Release Highl...
  • Streamline AML Rule Tuning and Optimization with A...
  • Offer Your Business Users Real-Time Data Feeds wit...
  • FFTH : All about Archer Job types
  • FFTH - Archer Exchange February 2021 Release Highl...
  • FFTH - Archer Exchange February 2021 Release Highl...
  • FFTH - Archer Exchange February 2021 Release Highl...
  • FFTH - Archer Exchange February 2021 Release Highl...
Labels
  • Analyst Reports 7
  • Announcements 289
  • Features 463
  • Newsletters 3
  • Resources 382
  • Tutorials 149
  • Use Cases 114
  • Videos 304
  • Webinars 57
Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2021 RSA Security LLC or its affiliates.
All rights reserved.