NorthRow Company Verification and Monitoring
NorthRow runs real-time, comprehensive checks on people, companies and ID documents, in the UK and internationally, aggregating data from a variety of sources to verify individuals and companies. We help clients with real-time customer onboarding and monitoring solutions, speed up and improve the quality of risk, compliance & anti-fraud decisions.
Features
- Real-time verification on companies, for AML/KYC
- Check ownership, directors, financial risk, credit score
- Check & monitor PEP, Sanctions, financial regulation, Adverse media
- Monitor for changes in ownership, directors, insolvency etc
- Combine results with individual identity verification on owners/directors
- Secure, searchable archive for maintenance of compliance records
- Available via either API or browser based user interface
- GDPR compliant
- End-to-end encryption of all data stored
- Results delivered in seconds
Benefits
- System fully configurable to meet exact customer requirements
- Multiple use cases: AML, London Local Authorities, Risk Management
- Single API for all compliance requirements: companies and people
- Results returned within seconds
- Comprehensive monitoring ensures continued compliance/risk mitigation
- Quick to set up
- Secure searchable archive to demonstrate compliance
- Full audit record
- Easy to integrate digital transformation
Pricing
£3,000 an instance a year
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
7 8 5 8 2 4 8 8 7 3 5 3 0 6 3
Contact
Contego Fraud Solutions Ltd
Christopher Whitehead
Telephone: 01235 375000
Email: christopher.whitehead@northrow.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- There are no specific constraints
- System requirements
-
- Internet connectivity
- Modern Browser (Latest version of Chrome, Internet Explorer, Firefox)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 4 hours Monday - Friday 9 - 5 (UK)
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide a standard level of support to all clients within the quoted pricing.
Onsite support is chargeable at our SFIA rates. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide an online demo and introductory call from our support staff to help familiarise users with our service.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
An export of all data will be provided in our standard format free of charge, or may be downloaded by the client as a series of API calls.
If a bespoke export format is required this may be subject to additional charges. - End-of-contract process
-
Results may be extracted by client using our API, or we will provide an extract in a standard format free of charge.
If clients wish to retain access to the secure archive to view data, or require an extract in a bespoke format, then this would be at additional charge.
All data is then deleted from our systems.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
-
Users can perform all KYC & AML checks, and retrieve results from the API.
Updates to records are not currently possible. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The type of check and risk score can be configured. This is done in coordination with support staff, it is not a self service option
Scaling
- Independence of resources
- We use scaling facilities provided by our cloud hosting service to ensure sufficient resource is available. Our service is tested to ensure capacity is appropriate.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage is available to users given the "admin" role through the management dashboard
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Data aggregator with multiple data sources
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
- Data is encrypted at rest using services provided by our cloud hosting service. A AES-256 key is used to encrypt the data
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- It is possible to retrieve the result of each check via our API. Bulk data export is on request to your account manager and may be subject to additional charge.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PDF Summary report
- JSON (via API)
- XML (via API)
- Data import formats
- Other
- Other data import formats
-
- XML (via API)
- JSON (via API)
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- NorthRow warrants that the NorthRow's platform (comprising the NorthRow API and User Interface) will be available at a minimum 99.5% of the time, 24 hours a day, 7 days a week , notwithstanding normal system maintenance.
- Approach to resilience
- Our data centre is at Amazon Webservices highly resilient, high availability data centre in the Republic of Ireland. We utilise Amazon's back up, replication and scalability services to ensure that our service meets the highest standards of resilience.
- Outage reporting
- Outages are reported via email to key clients and live messages are published through our GUI
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- All users have unique logins and two factor authentication. The concept of "roles" is used to ensure that users only have access to the functionality that they require to do their job. All actions are logged by user.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Socotec Certification UK
- ISO/IEC 27001 accreditation date
- 11/5/2018
- What the ISO/IEC 27001 doesn’t cover
- Nothing is out of scope.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Our policies & procedures are ISO 27001 and Cyber Essentials Plus certified. We have regular management reporting on current ISO issues and progress to resolve them, an annual audit and three yearly ISO certification. CE Plus is an annual audit and certification process
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We track all changes through Atlassian JIRA. Every change is assessed by the CTO and CSO. If it is determined to have a security impact it is tagged explicitly. All changes are tracked through the build, test and release process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We perform vulnerability scanning before release and on release. All alerts are assessed by the CTO. Any alerts deemed significant are patched immediately. Our threat info comes from multiple sources for CVEs, government alerts and industry sources. We use acunetix for scanning, which collates and updates vulnerability lists.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- A variety of mechanisms are used to monitor access & use of the service. Unusual activity is alerted to key staff. A compromise would result in immediate revocation of compromised credentials or shutdown of the service. Response is immediate, including informing clients.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We have predefined processes to prioritise & grade severity. Users report incidents via email or phone. Incident reports and updates are via email
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £3,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- No