Contego Fraud Solutions Ltd

NorthRow Company Verification and Monitoring

NorthRow runs real-time, comprehensive checks on people, companies and ID documents, in the UK and internationally, aggregating data from a variety of sources to verify individuals and companies. We help clients with real-time customer onboarding and monitoring solutions, speed up and improve the quality of risk, compliance & anti-fraud decisions.

Features

  • Real-time verification on companies, for AML/KYC
  • Check ownership, directors, financial risk, credit score
  • Check & monitor PEP, Sanctions, financial regulation, Adverse media
  • Monitor for changes in ownership, directors, insolvency etc
  • Combine results with individual identity verification on owners/directors
  • Secure, searchable archive for maintenance of compliance records
  • Available via either API or browser based user interface
  • GDPR compliant
  • End-to-end encryption of all data stored
  • Results delivered in seconds

Benefits

  • System fully configurable to meet exact customer requirements
  • Multiple use cases: AML, London Local Authorities, Risk Management
  • Single API for all compliance requirements: companies and people
  • Results returned within seconds
  • Comprehensive monitoring ensures continued compliance/risk mitigation
  • Quick to set up
  • Secure searchable archive to demonstrate compliance
  • Full audit record
  • Easy to integrate digital transformation

Pricing

£3000 per instance per year

Service documents

G-Cloud 11

785824887353063

Contego Fraud Solutions Ltd

Richard Ingles

01235 375000

richard.j.ingles@northrow.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no specific constraints
System requirements
  • Internet connectivity
  • Modern Browser (Latest version of Chrome, Internet Explorer, Firefox)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 4 hours Monday - Friday 9 - 5 (UK)
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide a standard level of support to all clients within the quoted pricing.
Onsite support is chargeable at our SFIA rates.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide an online demo and introductory call from our support staff to help familiarise users with our service.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction An export of all data will be provided in our standard format free of charge, or may be downloaded by the client as a series of API calls.
If a bespoke export format is required this may be subject to additional charges.
End-of-contract process Results may be extracted by client using our API, or we will provide an extract in a standard format free of charge.

If clients wish to retain access to the secure archive to view data, or require an extract in a bespoke format, then this would be at additional charge.

All data is then deleted from our systems.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Opera
Application to install No
Designed for use on mobile devices No
API Yes
What users can and can't do using the API Users can perform all KYC & AML checks, and retrieve results from the API.

Updates to records are not currently possible.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The type of check and risk score can be configured. This is done in coordination with support staff, it is not a self service option

Scaling

Scaling
Independence of resources We use scaling facilities provided by our cloud hosting service to ensure sufficient resource is available. Our service is tested to ensure capacity is appropriate.

Analytics

Analytics
Service usage metrics Yes
Metrics types Usage is available to users given the "admin" role through the management dashboard
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Data aggregator with multiple data sources

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Other
Other data at rest protection approach Data is encrypted at rest using services provided by our cloud hosting service. A AES-256 key is used to encrypt the data
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach It is possible to retrieve the result of each check via our API. Bulk data export is on request to your account manager and may be subject to additional charge.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF Summary report
  • JSON (via API)
  • XML (via API)
Data import formats Other
Other data import formats
  • XML (via API)
  • JSON (via API)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability NorthRow warrants that the NorthRow's platform (comprising the NorthRow API and User Interface) will be available at a minimum 99.5% of the time, 24 hours a day, 7 days a week , notwithstanding normal system maintenance.
Approach to resilience Our data centre is at Amazon Webservices highly resilient, high availability data centre in the Republic of Ireland. We utilise Amazon's back up, replication and scalability services to ensure that our service meets the highest standards of resilience.
Outage reporting Outages are reported via email to key clients and live messages are published through our GUI

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels All users have unique logins and two factor authentication. The concept of "roles" is used to ensure that users only have access to the functionality that they require to do their job. All actions are logged by user.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Socotec Certification UK
ISO/IEC 27001 accreditation date 11/5/2018
What the ISO/IEC 27001 doesn’t cover Nothing is out of scope.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our policies & procedures are ISO 27001 and Cyber Essentials Plus certified. We have regular management reporting on current ISO issues and progress to resolve them, an annual audit and three yearly ISO certification. CE Plus is an annual audit and certification process

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We track all changes through Atlassian JIRA. Every change is assessed by the CTO and CSO. If it is determined to have a security impact it is tagged explicitly. All changes are tracked through the build, test and release process.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We perform vulnerability scanning before release and on release. All alerts are assessed by the CTO. Any alerts deemed significant are patched immediately. Our threat info comes from multiple sources for CVEs, government alerts and industry sources. We use acunetix for scanning, which collates and updates vulnerability lists.
Protective monitoring type Supplier-defined controls
Protective monitoring approach A variety of mechanisms are used to monitor access & use of the service. Unusual activity is alerted to key staff. A compromise would result in immediate revocation of compromised credentials or shutdown of the service. Response is immediate, including informing clients.
Incident management type Supplier-defined controls
Incident management approach We have predefined processes to prioritise & grade severity. Users report incidents via email or phone. Incident reports and updates are via email

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £3000 per instance per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑