G-Cloud 11 services are suspended on Digital Marketplace

If you have an ongoing procurement on G-Cloud 11, you must complete it by 18 December 2020. Existing contracts with Contego Fraud Solutions Ltd are still valid.
Contego Fraud Solutions Ltd

NorthRow Company Verification and Monitoring

NorthRow runs real-time, comprehensive checks on people, companies and ID documents, in the UK and internationally, aggregating data from a variety of sources to verify individuals and companies. We help clients with real-time customer onboarding and monitoring solutions, speed up and improve the quality of risk, compliance & anti-fraud decisions.

Features

  • Real-time verification on companies, for AML/KYC
  • Check ownership, directors, financial risk, credit score
  • Check & monitor PEP, Sanctions, financial regulation, Adverse media
  • Monitor for changes in ownership, directors, insolvency etc
  • Combine results with individual identity verification on owners/directors
  • Secure, searchable archive for maintenance of compliance records
  • Available via either API or browser based user interface
  • GDPR compliant
  • End-to-end encryption of all data stored
  • Results delivered in seconds

Benefits

  • System fully configurable to meet exact customer requirements
  • Multiple use cases: AML, London Local Authorities, Risk Management
  • Single API for all compliance requirements: companies and people
  • Results returned within seconds
  • Comprehensive monitoring ensures continued compliance/risk mitigation
  • Quick to set up
  • Secure searchable archive to demonstrate compliance
  • Full audit record
  • Easy to integrate digital transformation

Pricing

£3,000 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at christopher.whitehead@northrow.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 11

Service ID

7 8 5 8 2 4 8 8 7 3 5 3 0 6 3

Contact

Contego Fraud Solutions Ltd Christopher Whitehead
Telephone: 01235 375000
Email: christopher.whitehead@northrow.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
There are no specific constraints
System requirements
  • Internet connectivity
  • Modern Browser (Latest version of Chrome, Internet Explorer, Firefox)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours Monday - Friday 9 - 5 (UK)
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide a standard level of support to all clients within the quoted pricing.
Onsite support is chargeable at our SFIA rates.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide an online demo and introductory call from our support staff to help familiarise users with our service.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
An export of all data will be provided in our standard format free of charge, or may be downloaded by the client as a series of API calls.
If a bespoke export format is required this may be subject to additional charges.
End-of-contract process
Results may be extracted by client using our API, or we will provide an extract in a standard format free of charge.

If clients wish to retain access to the secure archive to view data, or require an extract in a bespoke format, then this would be at additional charge.

All data is then deleted from our systems.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
Yes
What users can and can't do using the API
Users can perform all KYC & AML checks, and retrieve results from the API.

Updates to records are not currently possible.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The type of check and risk score can be configured. This is done in coordination with support staff, it is not a self service option

Scaling

Independence of resources
We use scaling facilities provided by our cloud hosting service to ensure sufficient resource is available. Our service is tested to ensure capacity is appropriate.

Analytics

Service usage metrics
Yes
Metrics types
Usage is available to users given the "admin" role through the management dashboard
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Data aggregator with multiple data sources

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Other
Other data at rest protection approach
Data is encrypted at rest using services provided by our cloud hosting service. A AES-256 key is used to encrypt the data
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
It is possible to retrieve the result of each check via our API. Bulk data export is on request to your account manager and may be subject to additional charge.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF Summary report
  • JSON (via API)
  • XML (via API)
Data import formats
Other
Other data import formats
  • XML (via API)
  • JSON (via API)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
NorthRow warrants that the NorthRow's platform (comprising the NorthRow API and User Interface) will be available at a minimum 99.5% of the time, 24 hours a day, 7 days a week , notwithstanding normal system maintenance.
Approach to resilience
Our data centre is at Amazon Webservices highly resilient, high availability data centre in the Republic of Ireland. We utilise Amazon's back up, replication and scalability services to ensure that our service meets the highest standards of resilience.
Outage reporting
Outages are reported via email to key clients and live messages are published through our GUI

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
All users have unique logins and two factor authentication. The concept of "roles" is used to ensure that users only have access to the functionality that they require to do their job. All actions are logged by user.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Socotec Certification UK
ISO/IEC 27001 accreditation date
11/5/2018
What the ISO/IEC 27001 doesn’t cover
Nothing is out of scope.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our policies & procedures are ISO 27001 and Cyber Essentials Plus certified. We have regular management reporting on current ISO issues and progress to resolve them, an annual audit and three yearly ISO certification. CE Plus is an annual audit and certification process

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We track all changes through Atlassian JIRA. Every change is assessed by the CTO and CSO. If it is determined to have a security impact it is tagged explicitly. All changes are tracked through the build, test and release process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We perform vulnerability scanning before release and on release. All alerts are assessed by the CTO. Any alerts deemed significant are patched immediately. Our threat info comes from multiple sources for CVEs, government alerts and industry sources. We use acunetix for scanning, which collates and updates vulnerability lists.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
A variety of mechanisms are used to monitor access & use of the service. Unusual activity is alerted to key staff. A compromise would result in immediate revocation of compromised credentials or shutdown of the service. Response is immediate, including informing clients.
Incident management type
Supplier-defined controls
Incident management approach
We have predefined processes to prioritise & grade severity. Users report incidents via email or phone. Incident reports and updates are via email

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£3,000 an instance a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at christopher.whitehead@northrow.com. Tell them what format you need. It will help if you say what assistive technology you use.