Address. PO Box 3340, Incline Village, NV 89450

Tel. 775-335-2030

© Nominodata LLC

GDPR/Privacy policy

I'M AN ORIGINAL CATCHPHRASE

I’m a paragraph. Double click here or click Edit Text to add some text of your own or to change the font. This is the place for you to tell your site visitors a little bit about you and your services.

Create a comprehensive defense for your company by including ElasticRISK in your quiver of mitigation techniques.

‚Äč

 

NominoData has just taken risk management and search to the next level  with a our new technology offering:  ELASTICrisk.   

Based on the powerful and lightning-fast Elasticsearch platform hosted on Amazon to support tight security, NominoData is offering
all of its risk mitigation databases in one package.

Elasticsearch technology has rapidly become the industry standard in stable, enterprise search options.  Combined with NominoData’s powerful data, your search for a stable and all-encompassing risk mitigation product ends here.
 

Your search for a stable risk

mitigation product ends here.

Entity Resolution and Names:  Name data is curated internationally help companies use enhanced name data to look up and supplement an algorithmic approach to entity resolution


Comprehensive Compliance: A due-diligence tool for analysts, investigators and financial institutions

  • Negative News

  • PEPS

  • Sanctions/ Watch-lists

  • Beneficial Corporate Position    

 

Global Risk Data:  Keep Risk and Sanctions in chec


Smart Adverse Media:  Reduces the time analysts spend when performing enhanced due-diligence on persons or corporations.


Cannabis Related Business (CRB) Data Solution:  identifies legitimate CRBs and their Beneficial Owners in all the disparate “legalized” states.


HIDTA/HIFCA Compliance Database: All the
disparate government information and consolidated the HIDTA/HIFCA designated counties listing(s) by State, County, City and  mapped those counties to Zip-Codes/Area Codes


Human Trafficking Risk Data:  Allows FIs to search within customer profiles and identify suspicious data through phone numbers, emails, etc.