Sign inSubscribe

Complete Feature List

Explore all the features and capabilities that make Complii the comprehensive compliance platform for your business.

Customer Management

Comprehensive customer onboarding, management, and identity resolution capabilities.

Customer Management

Create, update, and manage customer records with support for both individuals and businesses. Includes full CRUD operations, custom fields, and flexible data models.

Custom Fields

Define custom fields per tenant to capture additional customer information specific to your business needs and compliance requirements.

Document Management

Upload, store, and manage customer documents with automatic thumbnail generation. Secure document access with authorized download endpoints and full audit logging.

Duplicate Detection

Automatically detect duplicate customer records using FP2 fingerprinting algorithm. Supports exact matching (ID/email/phone) and fuzzy matching (name/address similarity).

UCID Linking

Non-destructive customer clustering using Universal Customer Identity (UCID). Group related records without deleting customer records, maintaining full audit trail.

Customer Import

Bulk import customers via CSV/Excel or API. Supports custom field mapping and validation with detailed error reporting.

AI-Powered Features

Leverage artificial intelligence to automate compliance workflows and reduce manual effort.

AI Document Analysis

Extract customer data from document images using AI vision technology. Automatically populate fields from passports, ID cards, and other documents with high accuracy.

AI Customer Creation

Create customers instantly from 1-2 document images. Upload photos of IDs or passports and let AI extract all necessary information automatically.

AI Screening Review

Automated review of screening alerts using advanced AI. Reduces analyst workload by 70-80% with binary decisions, automatic case creation, and risk recalculation.

Screening & Watchlists

Advanced screening against sanctions, PEP lists, and custom watchlists with configurable matching algorithms.

Sanctions & PEP Screening

Screen customers against global sanctions lists, PEP databases, and watchlists. Continuous monitoring with automatic updates and change history.

Custom Watchlists

Create and manage your own internal block/allow lists. Add entries manually or via API, with full search and management capabilities.

FP2 Advanced Fingerprinting

Next-generation SimHash and phonetic matching algorithm. Handles misspellings, name order changes, and typo variations with high precision and recall.

Configurable Screening Presets

Choose from Strict, Balanced, or Loose presets, or create custom configurations. Tune precision vs recall to match your risk appetite and operational needs.

Document-Based Matching

Exact matching using government IDs, passports, and tax IDs. Bypasses name-based screening when document numbers match exactly, reducing false positives.

Debug Mode & Explainability

Step-by-step screening trace showing why matches occurred or didn't occur. Includes fingerprint details, similarity scores, and decision logic for analyst review.

Risk Management

Comprehensive risk scoring, assessment, and monitoring across customers, transactions, and countries.

Risk Dashboard

Real-time risk overview with customer, UCID, and transaction risk scores. Visualize risk trends, patterns, and distributions across your portfolio.

Customer Risk Scoring

Calculate customer risk scores based on multiple signals including PEP status, sanctions matches, transaction patterns, and custom risk rules.

UCID-Level Risk Aggregation

Risk calculated across customer clusters (UCID). Consistent risk scoring even when customer data changes or duplicates exist, providing unified risk view.

Country Risk Scoring

Country-level risk assessment (0-100) for all countries. Automatically applied to transaction corridor analysis and geographic risk rules.

Risk Signals Catalog

Comprehensive catalog of risk signals including PEP matches, sanctions matches, high-risk corridors, structuring patterns, and behavioral anomalies.

Configurable Risk Presets

Define risk evaluation rules and thresholds. Configure signal weights, risk calculation methods, and escalation criteria per your compliance policy.

Adverse Media (GDELT)

Ingest global adverse media events and match them to UCIDs with configurable codes, thresholds, and explainable evidence.

Transaction Monitoring

Real-time transaction monitoring with multiple scenario types and automated alert generation.

Multiple Scenario Types

Threshold (rolling sum), Velocity (count-based), Structuring (near-threshold detection), Behavioral (baseline anomaly), and Geographic (corridor-based) scenarios.

Real-Time Alert Generation

Automatic alert creation when scenarios trigger. Alerts include explainable JSON payloads with detailed reasoning for regulatory review and analyst investigation.

Complete Alert Lifecycle

Manage alerts through Open → InCase → Dismissed → Closed → Suppressed workflow. Full audit trail and status tracking for compliance.

UCID-Level Monitoring

Transaction monitoring at Universal Customer Identity level. Aggregates activity across customer clusters for comprehensive pattern detection.

Explainable Alert Payloads

Every alert includes detailed JSON payload explaining why it fired, including scenario config, computed values, evidence transactions, and risk impact.

Network Analytics

Identify money laundering patterns, structuring, and unusual transaction networks with UCID-to-UCID analytics.

Flow Patterns Report

Company-wide UCID→UCID analytics showing 'who sent to whom'. Analyze fan-out and fan-in patterns to detect suspicious networks and money laundering structures.

Risk Corridor Detection

Automatically identify high-risk transaction corridors based on country risk scores. Filter and analyze transactions by origin and destination countries.

Concentration Analysis

Detect unusual concentration patterns with top beneficiary/sender analysis. Identify structuring and layering activities across your transaction network.

Network Visualization

Visual representation of transaction networks showing relationships between UCIDs. Drill down into specific UCIDs to view detailed network snapshots and evidence.

Case Management

Complete case management workflow with evidence linking, audit trails, and compliance documentation.

Case Management

Create and manage compliance cases from alerts. Link multiple alerts, transactions, and evidence to a single case for comprehensive investigation.

Evidence Linking

Link transactions, screening matches, alerts, and documents to cases. Maintain complete audit trail of all evidence and investigation steps.

Case Workflow

Track case status, assign reviewers, add notes, and document decisions. Support for case events, status transitions, and completion workflows.

Case Audit Trail

Complete audit trail for each case including creation, status changes, evidence additions, and reviewer actions. Export-ready for regulatory reviews.

Public API & Integration

RESTful API for programmatic access to all Complii capabilities with comprehensive documentation.

RESTful API

Complete REST API for all Complii operations. Create customers, ingest transactions, run screening, query cases, and manage configurations programmatically.

Customer Creation API

Create customers via API with support for JSON and multipart/form-data. Includes custom fields, document uploads, and AI-powered customer creation endpoints.

Transaction Ingestion API

Ingest transactions via API with automatic screening, risk evaluation, and alert generation. Supports bulk imports and real-time processing.

Idempotency Support

Built-in idempotency support for safe retries. Use external IDs or idempotency keys to prevent duplicates and enable reliable API integrations.

API Key Management

Generate, manage, and revoke API keys per company. Keys are shown only once and support optional expiration dates for enhanced security.

OpenAPI Documentation

Complete OpenAPI/Swagger documentation for all endpoints. Includes request/response schemas, authentication, and example payloads.

Audit & Compliance

Complete audit trail and compliance documentation for regulatory reviews and internal audits.

Complete Audit Trail

Every change to customers, documents, cases, and configurations is logged with timestamp, user, and before/after values for complete traceability.

Before/After Tracking

Capture complete before and after JSON snapshots for all changes. Review exactly what changed, when, and by whom for compliance audits.

User Attribution

Track which user made each change. Supports both authenticated users and system actions with clear attribution for audit purposes.

Correlation IDs

Request tracing with correlation IDs for debugging and audit. Track requests across services and correlate logs for complete request lifecycle visibility.

Security & Access Control

Enterprise-grade security with role-based access control, granular permissions, and secure data storage.

Role-Based Access Control

Define roles and assign permissions granularly. Control who can view, create, update, or delete resources based on their role.

Granular Permissions

Fine-grained permission system covering customers, documents, screening, risk, cases, API keys, and administrative functions. Configure per your security policy.

Secure Document Storage

Documents stored securely on disk with authorized access only. Download endpoints require authentication and proper permissions, with full audit logging.