Table of Contents

Share

RegTech 100: Comprehensive Map Of The Market

After months of research, categorisation, and analysis, we’re proud to present a market map featuring over 100 RegTechs in the financial crime space offering solutions in AML, KYC, KYB, Transaction Monitoring, Risk Management, End to End DD and client onboarding.

Creating this map wasn’t as simple as listing names. We first built a full taxonomy, mapping companies by:

  • Functionality type (e.g., KYC Aggregator, Risk Management, End-to-End Due Diligence)
  • Target market (Enterprise, Mid-Market, SMEs) (Banks, Payment, Legal, Accounting etc)
  • Headquarters, features, integrations, and other key attributes such as funding.

This project culminates in the RegTech Lab, Aventine Lab’s proprietary directory providing in-depth data, insights, and analysis on each solution. You can explore it all there.

Functionalities and Definitions

Functionality typeDefinition
Client OnboardingTechnology that streamlines the onboarding verifications such as KYC, AML, KYB, alongside having features such as risk assessment, and account setup, automations, risk scores, e-sig and more.
End-to-End Due DiligenceFull-spectrum tools covering the entire customer or business verification lifecycle, more focused on verifications than end to end onboarding and monitoring.
KYB AggregatorPlatforms that pull and unify business verification data (KYB) from multiple sources to streamline compliance checks.
KYC AggregatorPlatforms that collect and unify individual verification data (KYC) from multiple sources to improve onboarding efficiency. Some of these tools also have AML screening & ongoing monitoring.
Practice Management SoftwareSolutions tailored for professional service firms (like law or accounting) to manage client relationships, billing, compliance, and workflows. These tools often have comprehensive onboarding suites.
Risk ManagementTools to identify, assess, monitor, and mitigate financial, regulatory, or reputational risks. These tools combine and integrate various platforms to provide a complete image of what’s happening across the business.
Screening AggregatorSystems that consolidate screening for sanctions, PEPs, and adverse media from multiple databases into one unified search.
Transaction MonitoringReal-time or batch monitoring of financial transactions to detect suspicious activities, fraud, or regulatory breaches.

Market Map:

We’ve organised the landscape by functionality across the top and target market down the side, to give you a structured overview of where key players sit.

RegTech100
Assorted based on functionality and target market

Full list of 100 RegTechs:

KYBScreeningKYCTransaction MonitoringRisk ManagementEnd to End DDOnboarding/PMS
Moody (Orbis + Kompany)LSEG (WorldCheck, Refinitiv)GBGLucinityAML RightSourceShfuti ProCredas
D&BLexisNexis (Accuity)OnfidoFlagRightFenergoTruliooFirst AML
CreditSafeComplyAdvantageOndatoHawk AIAtfinityRedFlag AlertAmiqus
KompanyAcurisSumSubFacctumD&DNorthRowPlatforma 365
AsiaVerifyKYC6FrankieOneNapier AIFull CircleStriseComplyTek
DetectedEastnetsJumioActioCUBEKYCAidiDenfy
KyckrXapienSigincatAMLYZEKYC-PortalUqudoLegl
Know Your CustomerPersonaVeriffTrapetsResistant AIVespiaVerify 365
North DataSanctionsScannerID/VerseAlessaLandmarkKYC360Zygos
DiligenciaThreat DigitalCheckin.comUnit21KYCMaticSimurBinderr
MiddeskNeteriumRegulaComplyTek*ConvierMinerva
EnigmaNamescan + MemberCheckVeriphyPlatforma 365*Symphony AIInfoTrack
OrbisKnow Your CountryToggleSalvArmalytixValidient
FinscanAMLCCCheckboard
APLYiDSmartKYCFirmcheck
ComplyCubeArctic IntelligenceXama
TruuthGo Proposal SageAML HQ
Trust ID4Risk AISynaps IO
CleardilInscope
Quantexa
Datavisor
Hummingbird

Lists of features identified

Feature NameDescription
Adversarial RobustnessThe resilience of AI/ML systems against manipulation or spoofing by bad actors. Applied in AI-powered RegTech tools like fraud detection and KYC.
Adverse MediaScreening public information sources for negative media about a customer. Assesses reputational and compliance risks.
AI Co-PilotEmbedded AI assistant that supports users during compliance tasks. Helps draft reports, flag risks, or explain regulatory requirements.
AI Generated ReportsAutomatically produced summaries, insights, or compliance checks using AI or machine learning. Used during onboarding, audit or internal reviews.
Anomaly DetectionAI-driven identification of unusual patterns in financial or user data beyond standard behavior profiling.
Audit ReportingSystematic tracking and documentation of compliance activities, user actions, and regulatory adherence. Provides audit trails, logs, and compliance reports.
Automatic Follow-UpPre-scheduled reminders and notifications triggered by user inactivity or pending actions. Used in onboarding and ongoing compliance checks.
Behavior ProfilingTracking and analysing user behavior to detect anomalies. Supports early warning systems and ongoing monitoring.
Blockchain VerificationVerifying, tracking and analysing blockchain wallets or transactions for compliance and fraud prevention (e.g., crypto tracing).
Bulk ActionsThe ability to perform compliance tasks across multiple records or entities. Used for onboarding large client batches, periodic reviews, or mass screenings.
Case ManagementManaging and organising compliance or risk-related cases. Provides structure to investigations or regulatory reviews.
Compliance MapVisualisation tool for mapping regulatory obligations across jurisdictions or entities. Used by legal, risk, and compliance teams.
Consent ManagementTracking and managing user consent for data usage, ensuring compliance with privacy laws.
Content RepositoryA digital library to store and manage compliance documents, training, and policies. Used for knowledge management, training, and audits.
Counterparty CheckAssessing the risk and compliance status of third-party partners or vendors.
Credit ChecksEvaluating the creditworthiness of an individual or business. Widely used across transactions and risk assessments.
Digital WalletA digital tool to store and manage financial data or credentials. Facilitates streamlined customer onboarding and verification.
Direct APIPoint-to-point API integrations with specific systems or databases. Enables fast data exchange with other internal or external systems.
Document VerificationThe process of validating the authenticity and accuracy of identity or compliance-related documents. Used during onboarding.
e-SignaturesDigital signatures for legally binding agreements. Streamlines document approvals and workflows.
Entity AdministrationTools to manage legal entities, their structures, ownership, and compliance statuses.
Expired ID DetectionIdentifying and flagging documents that are no longer valid. Ensures up-to-date customer verification.
Facial RecognitionBiometric verification of identities using facial recognition for KYC and fraud prevention.
Financial DataAccess to a company’s financial records, credit history, balance sheets, and KPIs.
Financial SpreadingAutomated extraction and analysis of financial statements for risk analysis. Used in credit risk and underwriting.
FormsCustomisable digital forms used to collect structured data from individuals or businesses. Used during onboarding.
Fraud DetectionIdentifying potentially fraudulent behavior through pattern recognition, rules, and AI. Used in transaction monitoring and onboarding.
Insolvency ChecksIdentification of bankruptcy or financial instability. Used in financial and compliance checks.
KYBVerification of business entities to ensure legitimacy and compliance, focusing on UBOs and PSCs.
KYCVerifying the identity of customers, involving name, DOB, address and often liveness checks.
Litigation ManagementTools to track, manage, and document legal disputes, regulatory actions, and enforcement cases.
Liveness DetectionVerifying the live presence of a person during identity checks to prevent spoofing.
Managed ServiceOutsourced compliance operations handled by specialists to manage regulatory tasks.
Matter ManagementCentralised system for tracking legal matters, including case files, tasks, and deadlines.
Multi-User AccessManaging and auditing user permissions to ensure compliance with data security regulations.
NFC ChipNear Field Communication technology for secure data exchange. Enhances physical ID verification.
Ongoing MonitoringContinuous refresh of Screening checks (PEP, Sanctions, Adverse Media) on all clients.
Open APIPublicly documented APIs allowing flexible integration with third-party services and workflows.
Payment ScreeningVerifying transactions against sanctions lists and risk parameters for compliance.
Policy ManagementCentralised creation, distribution, and enforcement of compliance policies within an organisation.
Project ManagementPlanning, tracking, and managing compliance or operational projects.
Property ChecksVerification processes related to property ownership, land registry, valuation, and risk.
QuestionnairesCustomisable forms to collect detailed information during onboarding or risk assessments.
Regulatory Change ManagementWorkflow to track, assess, and implement changes in regulations. Keeps teams up to date.
Regulatory ResearchAccess to curated regulatory information, updates, and interpretations.
ReputationMonitoring and managing public perceptions of individuals or entities to assess reputational risk.
Right to WorkVerifying employment eligibility based on legal documentation. Ensures compliance with labour laws.
Risk AssessmentsEvaluating risks associated with customers, transactions, or business processes.
Risk ScoringNumerical representations of risk levels based on data analysis.
ScreeningVerifying individuals or entities against predefined databases for PEP, Sanctions, and Adverse Media.
Source of FundsVerification of the origin of a customer’s funds. Vital for transparency and AML compliance.
Source of WealthVerification of the origin of a customer’s total accumulated wealth.
Task ManagementTools to organise, assign, and track tasks within compliance workflows.
Third-Party Risk ManagementMonitoring and managing compliance risks associated with third-party vendors or partners.
Time TrackingMonitoring and recording time spent on compliance or operational tasks, often billable.
TrainingOngoing education and certification programs for compliance standards and regulatory updates.
Transaction MonitoringObserving and analysing financial transactions to detect suspicious activity.
Voice BiometricsVerifying identities through voice patterns for secure authentication.
Watchlist FilteringReal-time screening of transactions and entities against global AML watchlists (OFAC, FATF, etc.).
White LabelCustomising RegTech platforms to reflect the branding of the client business.
Workflow AutomationStreamlining compliance workflows with automated task assignment and tracking.

Dive Deeper With RegTech Lab

To see detailed profiles, functionality breakdowns, and advanced comparisons, visit RegTech Lab.

Stay tuned, more deep dives, maps, and insights are coming soon!

author avatar
Arsalan Abbasi Founder
LegalTech & RegTech Expert

More Insights

Best AML Tools in Australia
Arsalan Abbasi

29/04/2025

15 regtechs to check out in 2025​
Arsalan Abbasi

29/04/2025

RegTech100
RegTech 100: Comprehensive Map Of The Market
RegTech
Arsalan Abbasi

28/04/2025

RegTech Roundtable
RegTech Roundtable: Go-To-Market Strategy
GTM Strategy, RegTech
Arsalan Abbasi

18/04/2025