{"collectionById":{"f5753d1a-255b-4998-ad33-bc822d10514b":{"id":"f5753d1a-255b-4998-ad33-bc822d10514b","name":"Case Studies","fieldSchemas":[{"id":"2aeea09f-46e4-4234-bfd1-736953e4605c","name":"Slug","type":"slug","role":"slug"},{"id":"c2158d92-80c4-4a3d-9e69-1ee7d71063a8","name":"Title","type":"plain_text","role":"primary"},{"id":"3d61cc60-2f41-4067-8df9-fb9dfc415037","name":"Sub Title","type":"plain_text"},{"id":"0a63c280-e0c6-4dfc-867f-8603a3284908","name":"Image","type":"image"},{"id":"48156f1c-2a5d-4c16-a2a5-5f141650af12","name":"The Results","type":"rich_text"},{"id":"b98a352b-5a9b-4de9-8543-9a96bd4ed0aa","name":"The Client: SubTitle","type":"plain_text"},{"id":"c639446e-af03-4c89-991e-8dd61d1b4e14","name":"The Challenge","type":"rich_text"},{"id":"acc54212-e2aa-4ef9-a06d-8e79c1649b6a","name":"The Client","type":"rich_text"},{"id":"30c323e4-a27f-4b59-b92c-09c78902fd52","name":"The Solution","type":"rich_text"},{"id":"80c99dd7-9643-4510-a5bd-7a04bd52cad0","name":"Date Published","type":"date"},{"id":"4eb0d330-dc6b-46f6-a05d-6e0d4c15363f","name":"The Results: Sub Title","type":"plain_text"},{"id":"6796c417-9397-4852-8d63-36b8ba9fd483","name":"The Challenge: Sub Title","type":"plain_text"},{"id":"b9d4afeb-0ecf-4b31-8aaf-45fa2c926a04","name":"The Solution: Sub Title","type":"plain_text"}],"itemById":{"0d74ad46-38ea-44a4-8730-9e34438201ba":{"id":"0d74ad46-38ea-44a4-8730-9e34438201ba","index":"!f","collectionId":"f5753d1a-255b-4998-ad33-bc822d10514b","fields":[{"id":"209fcbd0-6e66-4e66-95ea-ec355bf32d64","value":"Thousands of multi-jurisdictional KYC files created a Compliance \"Data Gap\"","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"6796c417-9397-4852-8d63-36b8ba9fd483"},{"id":"e7afa418-6882-4e4d-b87d-3631134f34ed","value":"{\"root\":{\"children\":[{\"children\":[{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\"A Global Financial Institution\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"root\",\"version\":1}}","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"acc54212-e2aa-4ef9-a06d-8e79c1649b6a"},{"id":"497d2a22-d589-4afc-9f17-4705cf26a7ba","value":"{\"root\":{\"children\":[{\"children\":[{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The bank relied on an unstructured Adobe workflow where critical identity and risk information was trapped in static PDFs. This manual process created a fragmented view of client risk.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The Inconsistency:\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" Because the data was unstructured, the firm suffered from frequent errors in identifying \",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"Politically Exposed Persons (PEPs)\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" and other high-risk indicators.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"listitem\",\"version\":1,\"value\":1},{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The Update Failure:\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" When KYC files were updated, changes remained isolated. Updates did not \\\"carry over\\\" to the broader system, meaning the bank was often working with stale or conflicting data.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"listitem\",\"version\":1,\"value\":2},{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The Oversight Gap:\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" The legacy system lacked a digital audit trail and robust supervisory controls. There was no clear evidence of who changed what, when, or why, leaving the firm vulnerable to regulatory scrutiny.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"listitem\",\"version\":1,\"value\":3}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"list\",\"version\":1,\"listType\":\"bullet\",\"start\":1,\"tag\":\"ul\"}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"root\",\"version\":1}}","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"c639446e-af03-4c89-991e-8dd61d1b4e14"},{"id":"fd9587b0-db5c-4c1b-9b9c-b445de6d718e","value":"How an International Bank eliminated KYC Blind Spots by transitioning from Static PDFs to AI-Based Digital Intelligence.","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"c2158d92-80c4-4a3d-9e69-1ee7d71063a8"},{"id":"87f52de8-3924-4b75-97bc-74b966e918be","value":"AI-Based Digital Transformation","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"b9d4afeb-0ecf-4b31-8aaf-45fa2c926a04"},{"id":"b5b7ca95-8b29-4410-9400-515d7ba44b6d","value":"{\"root\":{\"children\":[{\"children\":[{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\"Moving from a legacy Adobe-based manual PDF workflow to an \",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"AI-Based Digital Transformation\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" to secure global compliance.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The bank deployed Surveill to move beyond simple document storage and into real-time digital intelligence. We digitized the entire KYC lifecycle into a structured, searchable database.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"1. Data Structuring \u0026 Validation (Interpret)\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" We migrated all unstructured legacy PDFs into a centralized dashboard.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":1,\"textStyle\":\"\"},{\"children\":[{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The Action:\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" \",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"[Interpret]\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" extracted and validated data points for completeness and correctness, ensuring that every \\\"shadow\\\" document was turned into actionable, structured data.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"listitem\",\"version\":1,\"value\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"list\",\"version\":1,\"listType\":\"bullet\",\"start\":1,\"tag\":\"ul\"},{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"2. Automated Risk Assessment (Doctrine)\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" With the data now structured, the bank leveraged \",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"[Doctrine]\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" to apply complex regulatory logic.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":1,\"textStyle\":\"\"},{\"children\":[{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The Logic:\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" We ran automated risk assessments against the entire data set. This enabled the firm to identify PEPs and risk inconsistencies instantly, with \",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"[Supervision]\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" providing a real-time oversight layer for compliance officers to monitor alerts.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"listitem\",\"version\":1,\"value\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"list\",\"version\":1,\"listType\":\"bullet\",\"start\":1,\"tag\":\"ul\"},{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"3. Smart Workflows \u0026 Audit Integrity (Nexus)\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" Finally, we replaced the Adobe workflow with \",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"[Nexus]\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" smart workflows.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":1,\"textStyle\":\"\"},{\"children\":[{\"children\":[{\"detail\":0,\"format\":1,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The Result:\",\"type\":\"text\",\"version\":1},{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\" Every update, change, or alert now carries a 100% immutable audit trail. Data updates now flow through the entire ecosystem, ensuring the \\\"Golden Record\\\" of a client is always current and compliant.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"listitem\",\"version\":1,\"value\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"list\",\"version\":1,\"listType\":\"bullet\",\"start\":1,\"tag\":\"ul\"}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"root\",\"version\":1}}","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"30c323e4-a27f-4b59-b92c-09c78902fd52"},{"id":"a6e63757-652a-4e6e-b919-dd0c5d22275d","value":"From Months to Moments","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"4eb0d330-dc6b-46f6-a05d-6e0d4c15363f"},{"id":"5da482b1-f2fb-4d1e-a49f-5f8451d8dc2f","value":"2026-02-01","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"80c99dd7-9643-4510-a5bd-7a04bd52cad0"},{"id":"97d93cc9-9caf-4bb2-8c04-49bc69317086","value":"Understanding Client Needs","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"b98a352b-5a9b-4de9-8543-9a96bd4ed0aa"},{"id":"140f536d-fcbf-4519-a2b4-fb83e4cb548d","value":"Case Study: Elimination of KYC Blind Spots","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"3d61cc60-2f41-4067-8df9-fb9dfc415037"},{"id":"c70da8d3-05f2-48ca-890e-3a5225f2962f","value":"{\"image\":\"462b177a35474f17be38e046c0ada8d264bd8bac\",\"imageThumbnail\":\"0089f23e727cf688103f06b29456d381969e377b\",\"originalImageHeight\":3648,\"originalImageWidth\":5472,\"altText\":\"\",\"fileName\":\"ZH4FUYiaczY-unsplash.jpg\"}","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"0a63c280-e0c6-4dfc-867f-8603a3284908"},{"id":"1666d15c-3094-4c9c-a5e4-3a5990af051a","value":"{\"root\":{\"children\":[{\"children\":[{\"detail\":0,\"format\":0,\"mode\":\"normal\",\"style\":\"\",\"text\":\"The morning Surveill's AI agents went live, the bank moved from reactive manual checking to proactive, automated supervision.\",\"type\":\"text\",\"version\":1}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[{\"type\":\"image\",\"version\":1,\"hash\":\"69f07fb2daab67e2d55d6af016bc4db354376719\",\"src\":\"https://s3-alpha-sig.figma.com/img/69f0/7fb2/daab67e2d55d6af016bc4db354376719?Expires=1771200000\u0026Key-Pair-Id=APKAQ4GOSFWCW27IBOMQ\u0026Signature=MYst7a48J6nXzc7Jwnpr2sCJSmWwwNVJKrXYV1E1SDu~tNyjnZlRm7xIoQtBY5tHKJBY5RY520ct8VgF0k4YoGdME5696TTqHqNZLE1balCKoOsF4OYjN-fFecFgTAjnwemCXR5qRnjsvZ1IOtrKVTX4SnN84PW4n4x2Pcj-WtyNMeAANLDuSwivHVDIzZVnhVBilGcF7Xw496kV1G0kv0JRhD0R1LDdX~uYcp9mHCubVHTyDeB3iMi0g98kPmeH3~MdoFvra-I1gfkEQxOH1pgoP6JLVCiSQAesCiu5gyn5cmmA6gDpJn~BhcJ~BNyRCOh9XNmjrbfL1j4V-7Wb3Q__\",\"altText\":\"\",\"originalImageWidth\":2562,\"originalImageHeight\":1414,\"isFillWidth\":false}],\"direction\":null,\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"},{\"children\":[],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"paragraph\",\"version\":1,\"textFormat\":0,\"textStyle\":\"\"}],\"direction\":\"ltr\",\"format\":\"\",\"indent\":0,\"type\":\"root\",\"version\":1}}","itemId":"0d74ad46-38ea-44a4-8730-9e34438201ba","fieldSchemaId":"48156f1c-2a5d-4c16-a2a5-5f141650af12"}]}}}},"slugByItemId":{"701a7e46-d323-4346-99af-8d8cb41be47c":"how-a-latin-american-banking-giant-reduced-false-positives-by-95-without-changing-their-archive","471ce5b2-c4fe-4a62-b722-de92edd049a1":"how-a-top-tier-affiliate-firm-scaled-to-10-000-assets-per-month-by-using-ai-to-police-ai","d300f977-ee79-44ff-a6cb-ae6e4b5c81e1":"how-an-immigration-firm-uncovered-1m-in-invisible-receivables-by-unlocking-their-legacy-data","0d74ad46-38ea-44a4-8730-9e34438201ba":"how-an-international-bank-eliminated-kyc-blind-spots","435fd198-cacf-4d6b-a8a8-c93e7f78093f":"how-a-global-hedge-fund-cut-review-times-from-1-week-to-4-hours-without-lowering-the-bar"}}