After months of research, categorisation, and analysis, we’re proud to present a market map featuring over 100 RegTechs in the financial crime space offering solutions in AML, KYC, KYB, Transaction Monitoring, Risk Management, End to End DD and client onboarding.
Creating this map wasn’t as simple as listing names. We first built a full taxonomy, mapping companies by:
- Functionality type (e.g., KYC Aggregator, Risk Management, End-to-End Due Diligence)
- Target market (Enterprise, Mid-Market, SMEs) (Banks, Payment, Legal, Accounting etc)
- Headquarters, features, integrations, and other key attributes such as funding.
This project culminates in the RegTech Lab, Aventine Lab’s proprietary directory providing in-depth data, insights, and analysis on each solution. You can explore it all there.
Functionalities and Definitions
Functionality type | Definition |
---|---|
Client Onboarding | Technology that streamlines the onboarding verifications such as KYC, AML, KYB, alongside having features such as risk assessment, and account setup, automations, risk scores, e-sig and more. |
End-to-End Due Diligence | Full-spectrum tools covering the entire customer or business verification lifecycle, more focused on verifications than end to end onboarding and monitoring. |
KYB Aggregator | Platforms that pull and unify business verification data (KYB) from multiple sources to streamline compliance checks. |
KYC Aggregator | Platforms that collect and unify individual verification data (KYC) from multiple sources to improve onboarding efficiency. Some of these tools also have AML screening & ongoing monitoring. |
Practice Management Software | Solutions tailored for professional service firms (like law or accounting) to manage client relationships, billing, compliance, and workflows. These tools often have comprehensive onboarding suites. |
Risk Management | Tools to identify, assess, monitor, and mitigate financial, regulatory, or reputational risks. These tools combine and integrate various platforms to provide a complete image of what’s happening across the business. |
Screening Aggregator | Systems that consolidate screening for sanctions, PEPs, and adverse media from multiple databases into one unified search. |
Transaction Monitoring | Real-time or batch monitoring of financial transactions to detect suspicious activities, fraud, or regulatory breaches. |
Market Map:
We’ve organised the landscape by functionality across the top and target market down the side, to give you a structured overview of where key players sit.

Full list of 100 RegTechs:
KYB | Screening | KYC | Transaction Monitoring | Risk Management | End to End DD | Onboarding/PMS |
---|---|---|---|---|---|---|
Moody (Orbis + Kompany) | LSEG (WorldCheck, Refinitiv) | GBG | Lucinity | AML RightSource | Shfuti Pro | Credas |
D&B | LexisNexis (Accuity) | Onfido | FlagRight | Fenergo | Trulioo | First AML |
CreditSafe | ComplyAdvantage | Ondato | Hawk AI | Atfinity | RedFlag Alert | Amiqus |
Kompany | Acuris | SumSub | Facctum | D&D | NorthRow | Platforma 365 |
AsiaVerify | KYC6 | FrankieOne | Napier AI | Full Circle | Strise | ComplyTek |
Detected | Eastnets | Jumio | Actio | CUBE | KYCAid | iDenfy |
Kyckr | Xapien | Sigincat | AMLYZE | KYC-Portal | Uqudo | Legl |
Know Your Customer | Persona | Veriff | Trapets | Resistant AI | Vespia | Verify 365 |
North Data | SanctionsScanner | ID/Verse | Alessa | Landmark | KYC360 | Zygos |
Diligencia | Threat Digital | Checkin.com | Unit21 | KYCMatic | Simur | Binderr |
Middesk | Neterium | Regula | ComplyTek* | Convier | Minerva | |
Enigma | Namescan + MemberCheck | Veriphy | Platforma 365* | Symphony AI | InfoTrack | |
Orbis | Know Your Country | Toggle | Salv | Armalytix | Validient | |
Finscan | AMLCC | Checkboard | ||||
APLYiD | SmartKYC | Firmcheck | ||||
ComplyCube | Arctic Intelligence | Xama | ||||
Truuth | Go Proposal Sage | AML HQ | ||||
Trust ID | 4Risk AI | Synaps IO | ||||
Cleardil | Inscope | |||||
Quantexa | ||||||
Datavisor | ||||||
Hummingbird |
Lists of features identified
Feature Name | Description |
---|---|
Adversarial Robustness | The resilience of AI/ML systems against manipulation or spoofing by bad actors. Applied in AI-powered RegTech tools like fraud detection and KYC. |
Adverse Media | Screening public information sources for negative media about a customer. Assesses reputational and compliance risks. |
AI Co-Pilot | Embedded AI assistant that supports users during compliance tasks. Helps draft reports, flag risks, or explain regulatory requirements. |
AI Generated Reports | Automatically produced summaries, insights, or compliance checks using AI or machine learning. Used during onboarding, audit or internal reviews. |
Anomaly Detection | AI-driven identification of unusual patterns in financial or user data beyond standard behavior profiling. |
Audit Reporting | Systematic tracking and documentation of compliance activities, user actions, and regulatory adherence. Provides audit trails, logs, and compliance reports. |
Automatic Follow-Up | Pre-scheduled reminders and notifications triggered by user inactivity or pending actions. Used in onboarding and ongoing compliance checks. |
Behavior Profiling | Tracking and analysing user behavior to detect anomalies. Supports early warning systems and ongoing monitoring. |
Blockchain Verification | Verifying, tracking and analysing blockchain wallets or transactions for compliance and fraud prevention (e.g., crypto tracing). |
Bulk Actions | The ability to perform compliance tasks across multiple records or entities. Used for onboarding large client batches, periodic reviews, or mass screenings. |
Case Management | Managing and organising compliance or risk-related cases. Provides structure to investigations or regulatory reviews. |
Compliance Map | Visualisation tool for mapping regulatory obligations across jurisdictions or entities. Used by legal, risk, and compliance teams. |
Consent Management | Tracking and managing user consent for data usage, ensuring compliance with privacy laws. |
Content Repository | A digital library to store and manage compliance documents, training, and policies. Used for knowledge management, training, and audits. |
Counterparty Check | Assessing the risk and compliance status of third-party partners or vendors. |
Credit Checks | Evaluating the creditworthiness of an individual or business. Widely used across transactions and risk assessments. |
Digital Wallet | A digital tool to store and manage financial data or credentials. Facilitates streamlined customer onboarding and verification. |
Direct API | Point-to-point API integrations with specific systems or databases. Enables fast data exchange with other internal or external systems. |
Document Verification | The process of validating the authenticity and accuracy of identity or compliance-related documents. Used during onboarding. |
e-Signatures | Digital signatures for legally binding agreements. Streamlines document approvals and workflows. |
Entity Administration | Tools to manage legal entities, their structures, ownership, and compliance statuses. |
Expired ID Detection | Identifying and flagging documents that are no longer valid. Ensures up-to-date customer verification. |
Facial Recognition | Biometric verification of identities using facial recognition for KYC and fraud prevention. |
Financial Data | Access to a company’s financial records, credit history, balance sheets, and KPIs. |
Financial Spreading | Automated extraction and analysis of financial statements for risk analysis. Used in credit risk and underwriting. |
Forms | Customisable digital forms used to collect structured data from individuals or businesses. Used during onboarding. |
Fraud Detection | Identifying potentially fraudulent behavior through pattern recognition, rules, and AI. Used in transaction monitoring and onboarding. |
Insolvency Checks | Identification of bankruptcy or financial instability. Used in financial and compliance checks. |
KYB | Verification of business entities to ensure legitimacy and compliance, focusing on UBOs and PSCs. |
KYC | Verifying the identity of customers, involving name, DOB, address and often liveness checks. |
Litigation Management | Tools to track, manage, and document legal disputes, regulatory actions, and enforcement cases. |
Liveness Detection | Verifying the live presence of a person during identity checks to prevent spoofing. |
Managed Service | Outsourced compliance operations handled by specialists to manage regulatory tasks. |
Matter Management | Centralised system for tracking legal matters, including case files, tasks, and deadlines. |
Multi-User Access | Managing and auditing user permissions to ensure compliance with data security regulations. |
NFC Chip | Near Field Communication technology for secure data exchange. Enhances physical ID verification. |
Ongoing Monitoring | Continuous refresh of Screening checks (PEP, Sanctions, Adverse Media) on all clients. |
Open API | Publicly documented APIs allowing flexible integration with third-party services and workflows. |
Payment Screening | Verifying transactions against sanctions lists and risk parameters for compliance. |
Policy Management | Centralised creation, distribution, and enforcement of compliance policies within an organisation. |
Project Management | Planning, tracking, and managing compliance or operational projects. |
Property Checks | Verification processes related to property ownership, land registry, valuation, and risk. |
Questionnaires | Customisable forms to collect detailed information during onboarding or risk assessments. |
Regulatory Change Management | Workflow to track, assess, and implement changes in regulations. Keeps teams up to date. |
Regulatory Research | Access to curated regulatory information, updates, and interpretations. |
Reputation | Monitoring and managing public perceptions of individuals or entities to assess reputational risk. |
Right to Work | Verifying employment eligibility based on legal documentation. Ensures compliance with labour laws. |
Risk Assessments | Evaluating risks associated with customers, transactions, or business processes. |
Risk Scoring | Numerical representations of risk levels based on data analysis. |
Screening | Verifying individuals or entities against predefined databases for PEP, Sanctions, and Adverse Media. |
Source of Funds | Verification of the origin of a customer’s funds. Vital for transparency and AML compliance. |
Source of Wealth | Verification of the origin of a customer’s total accumulated wealth. |
Task Management | Tools to organise, assign, and track tasks within compliance workflows. |
Third-Party Risk Management | Monitoring and managing compliance risks associated with third-party vendors or partners. |
Time Tracking | Monitoring and recording time spent on compliance or operational tasks, often billable. |
Training | Ongoing education and certification programs for compliance standards and regulatory updates. |
Transaction Monitoring | Observing and analysing financial transactions to detect suspicious activity. |
Voice Biometrics | Verifying identities through voice patterns for secure authentication. |
Watchlist Filtering | Real-time screening of transactions and entities against global AML watchlists (OFAC, FATF, etc.). |
White Label | Customising RegTech platforms to reflect the branding of the client business. |
Workflow Automation | Streamlining compliance workflows with automated task assignment and tracking. |
Dive Deeper With RegTech Lab
To see detailed profiles, functionality breakdowns, and advanced comparisons, visit RegTech Lab.
Stay tuned, more deep dives, maps, and insights are coming soon!