Company and partnership
We’ve been protecting businesses and their customers from financial crime since 2012. That’s over a decade of refining our technology, building deep regulatory expertise, and partnering with financial institutions across Australia, New Zealand and the UK. We’re backed by the strength of Jade Software, established in 1978 with more than 45 years of experience delivering mission-critical technology.
Absolutely. We've published real stories from financial institutions who've transformed their financial crime prevention with ThirdEye. Visit jadethirdeye.com/customer-stories to see how organisations like yours are detecting threats faster, reducing false positives, and protecting their customers more effectively. You'll find specific examples of challenges faced, solutions implemented, and measurable results achieved.
Yes, we do. Fighting financial crime takes a team effort, which is why we partner with proven organisations worldwide to provide the strongest detection, reporting and prevention tools available. Visit jadethirdeye.com/partners to see our current partners and learn how to join our network. Because stopping financial crime requires the best technology and expertise working together.
We’re not just another tech vendor. We’re your partner in fighting financial crime, combining powerful technology with genuine human understanding of what compliance teams face every day. Unlike one-size-fits-all solutions, our platform adapts to your specific risk appetite, systems and regulatory needs. We’ve built deep expertise across Australian, New Zealand and UK markets, with local teams who understand your compliance landscape inside out. When you need support, you’ll speak with named experts who respond in hours, not weeks. Most importantly, we know compliance isn’t just about ticking boxes. It’s about protecting real people from real harm. That’s why our mission- driven team works alongside yours, providing both the technology you need and the partnership you deserve.
Security and compliance
All data is encrypted at rest and in transit. Each client gets dedicated database instances with unique encryption keys. We maintain strict network segmentation and access controls to enforce clear trust boundaries. Our security systems continuously monitor for threats across the entire infrastructure.
We host your data in your region. Australian and UK customers use AWS in Sydney and London respectively. New Zealand customers use local NZ data centres for core services, with some features hosted on AWS Sydney.
We're ISO 27001 certified and hold Cyber Essentials Plus (UK). These certifications demonstrate our commitment to information security management and protection against common cyber threats.
Yes. We integrate with Microsoft Entra ID.
Integration and compatibility
We integrate directly with your core banking system via API or secure FTP. For PEP and sanctions screening, we connect to Dow Jones and LSEG World-Check. We also link to NZ FIU and AUSTRAC for regulatory reporting, and we’re adding CIFAS integration for our UK customers.
Yes. Our APIs cover data ingestion, real-time screening, and transaction monitoring. View the full documentation here.
Yes. ThirdEye’s integration points are largely tech-stack-agnostic. So long as your tech stack can consume a REST API or produce CSV files, you can work with ThirdEye.
No, ThirdEye is cloud only. Though, for added security, we can provide your own dedicated cloud environment with complete data isolation.
You can load data two ways: via our REST API using JSON, or via secure FTP for CSV files. Both handle customer, account, and transaction data.
Implementation and onboarding
We start immediately. Once you sign, we'll schedule a kick-off meeting to map out your timeline and implementation milestones.
Yes. You'll have a dedicated project manager and technical support team from kick-off through to go-live.
We train your team throughout implementation. Our help centre, accessible from within ThirdEye, provides ongoing resources.
Yes. Draft mode is built into ThirdEye, so you can create and test rules on live data before going live. No separate test environment or data synchronisation required.
Support and service
Log your requests through our support portal. For urgent issues, we're available 24/7 by phone.
Our teams across NZ, Australia, and the UK provide extended coverage through overlapping time zones. For urgent issues, we're available 24/7.
Yes. Your dedicated account manager ensures you get maximum value from ThirdEye, coordinates ongoing support, and acts as your escalation point for any issues.
Customer screening
Choose the watchlist that works best for your business, Dow Jones Risk and Compliance or LSEG World-Check. Both give you PEP, other categories and sanctions lists to screen against, ensuring you meet all your regulatory requirements.
Screen customers at every critical moment with six comprehensive touchpoints: During your applicant onboarding process New customer onboarding and initial upload into ThirdEye. When customer data changes, that may affect screening outcome. During daily screening against updated watchlists. Periodically defined by you. Whenever you need answers – on demand.
ThirdEye integrates seamlessly with your onboarding process to protect your business from the start. When a new customer applies, your system sends their details to ThirdEye for immediate screening against global watchlists. You'll either receive an all-clear or an alert if there's a potential match. If an alert is raised, your analysts can quickly review it to determine whether it's a genuine risk or false positive – all while maintaining a smooth customer experience. The entire process happens in real time, so legitimate customers aren't delayed while you stay protected from financial crime risks.
Our scoring system significantly reduces the alerts your team needs to review. ThirdEye uses sophisticated fuzzy name matching alongside other data points to score each potential watchlist match, giving you precise control over what triggers an alert. You set the minimum score threshold that works for your risk appetite. This means you catch real threats without drowning your team in false positives.
Customer risk profiles enhance your transaction monitoring. When screening identifies a PEP or other high-risk customer, that intelligence flows directly into your monitoring rules, ensuring you apply the right level of scrutiny to the right customers.
Transaction monitoring
Start with proven rules, then make them your own. Our rules library draws from years of experience across all sectors, giving you expert- tested detection right out of the box. Modify any rule or add your own. ThirdEye offers complete flexibility to match your unique risk profile.
You have complete rule control with ThirdEye. Create, update or delete any rule, then test your changes safely before going live, so you get exactly the detection you need without risking your operations.
Perfect your detection rules before they go live. Our sandbox environment lets you test new rules against your actual transaction data, showing exactly what alerts would be triggered, without affecting your live operations. Fine-tune your logic and thresholds through iterative testing until you achieve the perfect balance: catching the suspicious activity you need to detect while minimising false positives. This means when you deploy a rule, you're confident it will work exactly as intended. No surprises, no alert storms – just effective detection from day one.
Absolutely. Our financial crime specialists work with you to translate your risk assessment into effective detection rules. We bring deep expertise in what works across Australian, New Zealand and UK markets, helping you create rules that address your specific risks while maintaining regulatory compliance. If you need help developing your initial risk assessment, we can connect you with trusted advisors. Once you have that foundation, we're hands-on partners in building, testing and refining rules that protect your business.
New rules can be implemented instantly. You control the rules engine, so when new financial crime methods appear, you can create and deploy detection scenarios immediately. No waiting for vendor updates, no delays. Skipton Building Society created and deployed a new detection rule the same day they identified suspicious activity – preventing further fraud and helping return funds to victims. Read their full story.
Case management
Create cases two ways: from an alert when you need deeper investigation, or directly for any customer at any time.
Attach any file type to your cases: documents, emails, audio, and video recordings.
ThirdEye captures every user action automatically. View audit trails from within each case, or run system-wide reports across all activity.
Your entire team can access the same case notes, evidence, and history in one place. No hunting through emails or shared drives, and everything's automatically audited for compliance.
Managers have full oversight of all open cases, including status and assignments. They can review any investigation and provide guidance to their team.
