From initial vendor onboarding to full EDD investigations, risk is screened, scored, and monitored continuously.
Efficient · Compliant · Configurable · Defensible
The only third-party risk management software combining live risk intelligence with no-code lifecycle automation. Covers vendor onboarding, third-party risk assessment, sanctions screening, continuous monitoring, and mitigation. Built for compliance teams managing third-party vendor risk across multiple jurisdictions.
Automated · Augmented · Investigative
From self-service AI reports for low-risk entities to full analyst-led enhanced due diligence for PEPs, high-risk jurisdictions, and complex structures. Covers AML compliance, AML screening, adverse media monitoring, transaction monitoring, and OSINT in 30+ languages. Automated where possible. Investigated where it matters.
Automated · Continuous · Consolidated
Automated KYC onboarding, continuous monitoring, and consolidated access to global sanctions screening, PEPs, adverse media, UBO data, and identity verification. Covers customer due diligence (CDD), enhanced due diligence (EDD), and simplified due diligence. One platform. No multiple data licences.
OSINT · Premium Data · AI-Powered · Analyst-Led
Open source intelligence (OSINT) tools and premium data, fused into one investigative platform. Global coverage across 600Bn+ archived web pages, court records, corporate filings, and social media in 30+ languages. Functions as a threat intelligence platform for compliance and risk teams. AI automates collection. Expert analysts handle complex investigations.
Automated · Biometric · Flexible Pricing
Automated pre-employment screening with built-in digital right to work, social media screening, biometric ID verification, automated disclosures, and credit checks. Every pre-employment background check in one platform. Flexible pay-as-you-go pricing for teams of any size.
Join a community of innovative organisations that use Neotas to do more with less – protecting their business, reputation, and bottom line from a single platform.
Mitigate Risk with AI Precision & Human Expertise
Practical guides, case studies, and checklists built by our risk intelligence team. Use them to run your own vendor screening or hand the investigation to our analysts for a full intelligence-grade report.
Uncover the risks others overlook. Combine AI speed with analyst-grade intelligence to make smarter, faster, and safer business decisions.
Everything compliance and risk teams need to know about third-party risk management, enhanced due diligence, and vendor screening.
Neotas combines three capabilities that most TPRM platforms separate: AI screening across 600Bn+ archived web pages and 1.8Bn+ court records; analyst-led Enhanced Due Diligence investigations for high-risk cases; and a no-code configurable lifecycle platform covering onboarding, questionnaires, dynamic risk scoring, and continuous monitoring. Named Chartis FCC50 Market Disruptor 2026 for Know Your Third Party and Supply Chain Excellence. Schedule a call to see the platform.
Schedule a 1:1 call and you’ll be paired with a risk intelligence expert, not a sales rep. Tell us your use case upfront: TPRM, EDD, KYC, or healthcare vendor compliance. We’ll show you the platform working on problems that actually match yours.
Most sessions take 30 minutes. No commitment, no generic deck.
Yes. Every evaluation starts with a personalised demo. You’ll see real platform functionality, not a slideshow. The session is run by someone who understands compliance workflows, not product marketing. Book your session here and tell us what you’re trying to solve. We’ll do the rest.
Third-party risk management, enhanced due diligence, KYC and customer due diligence, employment screening, and TPRM for healthcare.
Financial institutions use it for vendor risk and AML compliance. Private equity firms use it for investment due diligence. Healthcare organisations use it for HIPAA, CQC, and NIS2 vendor compliance.
If your challenge involves screening or monitoring third parties, Neotas is built for it.
TPRM is the process of identifying, assessing, and monitoring the risks that come from working with external vendors, suppliers, contractors, and partners. It covers the full vendor relationship: initial due diligence, onboarding, ongoing monitoring, and eventual offboarding.
Most organisations underestimate how much risk sits in their vendor portfolio until something goes wrong. A structured TPRM programme prevents that.
Healthcare organisations work with hundreds of vendors: IT systems, medical device suppliers, labs, outsourced clinical services. Every one of them is a potential compliance exposure.
Healthcare TPRM means managing those risks systematically across HIPAA, CQC, NIS2, FDA QMSR, and GDPR at the same time. That’s five regulatory frameworks, one vendor portfolio. Neotas automates continuous vendor monitoring for healthcare with audit-ready reporting from a single configurable platform. See how it works.
In the US: HIPAA Business Associate Agreements for any vendor handling protected health information, HITRUST for healthcare data security, and FDA QMSR for medical device manufacturers.
In the UK: CQC supplier oversight standards. Across the EU: NIS2 for essential service operators and GDPR for vendors processing personal data of EU residents.
Neotas configures TPRM workflows to address all of these from one platform. Full healthcare regulatory breakdown here.
Vendor risk management (VRM) is the ongoing process of evaluating and monitoring the risks your suppliers introduce. Cybersecurity posture, financial stability, regulatory compliance, operational resilience: all of it.
Most VRM programmes start with a questionnaire and don’t go much further. The Vendor Risk Assessment Template gives you a structured starting point. A full TPRM platform takes it the rest of the way.
Vendor risk management focuses on suppliers and service vendors specifically. Third-party risk management is broader, covering all external parties including contractors, agents, joint venture partners, and subcontractors. Enterprise TPRM programmes also include supply chain risk, fourth-party risk, and ESG risk dimensions.
The Neotas whitepaper on Navigating Third-Party Risk Management in the United States and the Third-Party Risk Assessment template provides a structured approach to managing all of these dimensions in one programme.
At minimum: information security certifications (ISO 27001, SOC 2), data protection and GDPR compliance, business continuity and disaster recovery plans, subcontractor and fourth-party risk disclosures, ESG policies, and incident response procedures.
The questionnaire should be tiered. High-risk vendors need more depth than low-risk ones. Sending the same 80-question form to every vendor wastes everyone’s time and creates noise. Download the TPRM Questionnaire template for a tiered, ready-to-use version.
NIS2 extends cybersecurity obligations to essential service operators across healthcare, energy, finance, transport, and digital infrastructure in the EU. It explicitly requires organisations to assess vendor cybersecurity practices, not just their own.
That means your vendor risk programme needs to include supply chain security, incident reporting obligations that extend to third-party incidents, and proportionate controls across your supplier tier. The Third-Party Risk Management Framework provides a NIS2-aligned starting point.
Yes. Neotas screens against OFAC sanctions lists and integrates US-specific compliance requirements alongside UK, EU, and global frameworks.
For financial institutions, this covers FFIEC third-party guidance, OCC vendor oversight requirements, and SEC cybersecurity governance obligations. For healthcare, HIPAA and HITRUST. Screening runs across US, UK, and global sources simultaneously, so you’re not managing separate programmes by jurisdiction.
Talk to an expert about your specific US compliance requirements.
Most teams are operational within a few weeks, depending on how complex their vendor onboarding workflows and approval structures are. Because Neotas runs on a no-code configuration model, your compliance team handles the setup without needing developers. Risk tiers, questionnaire logic, screening rules, monitoring alerts: all configurable without IT involvement.
Talk to an expert about your specific timeline.
Manual due diligence doesn’t scale. Spreadsheets miss real-time risk changes. Database-only tools miss what isn’t in a database.
Neotas covers 600Bn+ archived web pages, 1.8Bn+ court records, and 40,000+ media sources across 100 countries and 30+ languages. It combines AI screening with analyst-led investigations and a no-code workflow platform, so you’re not stitching together 3 tools to do one job.
Neotas is named Chartis FCC50 Market Disruptor 2026 for Know Your Third Party and Supply Chain Excellence. See the platform.
Speed and coverage. AI processes data volumes at a scale no analyst team can match: 30+ languages, billions of web pages, real-time monitoring across an entire vendor portfolio simultaneously.
Where Neotas differs from pure-AI tools is that AI handles the data collection and pattern detection, then expert analysts review the findings that need human judgment. You get accuracy and scale. Neither alone is enough for high-stakes compliance decisions. See EDD and TPRM platform detail.
It replaces the spreadsheets, email chains, and one-off database checks that most compliance teams still rely on. A proper TPRM platform handles vendor onboarding, tiered risk questionnaires, dynamic risk scoring, sanctions and PEP screening, adverse media monitoring, and audit reporting in one place.
The Neotas TPRM platform adds continuous monitoring on top of that. Vendor risk doesn’t sit still between annual reviews, and neither should your oversight.
EDD is the deeper investigation you run when standard KYC or CDD isn’t enough. That typically means PEPs, high-risk jurisdictions, complex corporate structures, or unusual transaction patterns.
It covers UBO identification, source of wealth checks, adverse media in multiple languages, sanctions exposure, and reputational risk. EDD is a regulatory requirement under UK MLR 2017, FATF Recommendations, OFAC guidelines, and FinCEN rules.
Download the EDD Checklist for a compliance-ready template.
An EDD report is the structured output of a high-risk due diligence investigation. It covers UBO identification, adverse media findings across multiple sources and languages, sanctions and PEP exposure, source of wealth analysis, litigation history, and ESG risk indicators.
Financial institutions and private equity firms use EDD reports to support high-risk onboarding decisions. Neotas produces them using AI analysis across 600Bn+ web pages combined with expert analyst review. See the Due Diligence Report guide for format and templates.
CDD is your baseline. Identity verified, basic risk assessed, relationship approved.
EDD kicks in when the baseline isn’t enough: a PEP relationship, a counterparty in a FATF high-risk country, an ownership structure that doesn’t look clean. It adds source of funds verification, deeper UBO analysis, and reputational intelligence that CDD doesn’t touch. See the full spectrum from SDD through CDD to EDD explained.
Seven stages: risk identification, due diligence and assessment, risk scoring and approval, vendor onboarding, continuous monitoring, periodic reassessment, and offboarding. Most organisations run the first two reasonably well and underinvest in everything after onboarding.
That’s where the exposure sits. Continuous monitoring and periodic reassessment are where risk changes actually get caught. See the full TPRM Lifecycle guide with best practices at each stage.
It means you’re not relying on last year’s assessment to manage today’s vendor risk. Continuous monitoring tracks adverse media, sanctions list changes, financial distress signals, regulatory actions, and cybersecurity vulnerabilities across your vendor portfolio in real time.
Neotas runs that automatically. When something changes, your team gets alerted. You don’t find out six months later because the annual review came around. See the TPRM platform.
Fourth-party risk is the risk your vendors’ suppliers introduce to you. When a vendor outsources a critical function to a sub-contractor, that sub-contractor becomes a fourth party to your organisation even though you have no direct contract with them.
DORA and NIS2 both require financial institutions and essential service operators to demonstrate visibility into this extended supply chain, not just their direct vendor tier. The Supply Chain Risk Assessment guide covers how to map and manage this exposure.
OSINT (open source intelligence) means using publicly available information to verify and assess risk: web content, court records, corporate filings, social media, archived news, and more.
The difference between OSINT and a standard database check is depth. Databases tell you what’s been formally recorded. OSINT tells you what’s actually out there. Neotas processes 600Bn+ archived web pages across 100+ countries and 30+ languages, surfacing risk signals that database checks miss entirely. See the Investigative Platform.
DORA (Digital Operational Resilience Act) came into force in January 2025. It applies to financial institutions operating in the EU and requires thorough ICT vendor due diligence, a maintained register of third-party arrangements, and documented contractual controls over critical suppliers. Penalties for non-compliance are significant.
If you’re a financial institution still managing ICT vendor risk in spreadsheets, DORA makes that untenable. The TPRM Policy guide covers how to structure vendor governance that meets the requirements.
| Cookie | Duration | Description |
|---|---|---|
| AWSALBTG | 7 days | AWS Application Load Balancer Cookie. Load Balancing Cookie: Used to encode information about the selected target group. |
| AWSALBTGCORS | 7 days | AWS Classic Load Balancer Cookie: Used to map the session to the instance. This cookie is identical to the original ELB cookie except for the attribute &SameSite=None; |
| cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| CookieLawInfoConsent | 1 year | Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie. |
| debug | never | Cookie used to debug code and website issues |
| shown | session | Session cookie to control number of times a pop up is shown. |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
| Cookie | Duration | Description |
|---|---|---|
| __cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
| AnalyticsSyncHistory | 1 month | Used to store information about the time a sync took place with the lms_analytics cookie |
| bcookie | 2 years | LinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser ID. |
| bscookie | 2 years | LinkedIn sets this cookie to store performed actions on the website. |
| lang | session | LinkedIn sets this cookie to remember a user's language setting. |
| lidc | 1 day | LinkedIn sets the lidc cookie to facilitate data center selection. |
| UserMatchHistory | 1 month | LinkedIn sets this cookie for LinkedIn Ads ID syncing. |
| Cookie | Duration | Description |
|---|---|---|
| li_gc | 2 years | Used to store consent of guests regarding the use of cookies for non-essential purposes |
| rl_anonymous_id | 1 year | Generates an unique anonymous Id to identify a user and attach to a subsequent event. |
| rl_user_id | 1 year | to store a unique user ID for the purpose of Marketing/Tracking |
| Cookie | Duration | Description |
|---|---|---|
| _ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
| _gat_gtag_UA_107495977_1 | 1 minute | Set by Google to distinguish users. |
| _gat_UA-107495977-1 | 1 minute | A variation of the _gat cookie set by Google Analytics and Google Tag Manager to allow website owners to track visitor behaviour and measure site performance. The pattern element in the name contains the unique identity number of the account or website it relates to. |
| _gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
| _gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
| attribution_user_id | 1 year | This cookie is set by Typeform for usage statistics and is used in context with the website's pop-up questionnaires and messengering. |
| CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
| Cookie | Duration | Description |
|---|---|---|
| _fbp | 3 months | This cookie is set by Facebook to display advertisements when either on Facebook or on a digital platform powered by Facebook advertising, after visiting the website. |
| fr | 3 months | Facebook sets this cookie to show relevant advertisements to users by tracking user behaviour across the web, on sites that have Facebook pixel or Facebook social plugin. |
| IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
| test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
| VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
| YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
| yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
| yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
| yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
| yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |