Altana Atlas for

Security & Compliance

A guardian against supply chain threats

With Altana you can

  • Automatically fuse and screen watchlists of companies, products, and places into a global knowledge graph of supply chain flows and business relationships

  • Identify n-tier suppliers and customers, and their corporate affiliates, across high-risk networks

  • Surface illicit activity through artificial intelligence

Illicit Network Analysis

Power investigations of weapons proliferation, narcotics trafficking, trade-based money laundering, and counterfeiting by:

Automatically building the supply chain and ownership networks of investigative targets across billions of global data points

Searching and fusing data across multiple languages and scripts in order to analyze networks across jurisdictions

Targeting illicit activity in global supply chain networks through artificial intelligence

  • Accelerate investigations

    Reduce investigative timelines through automated entity resolution and network construction from large quantities of data

  • Build networks across languages and geographies

    Gain an integrated view of transnational networks by automatically fusing data across different languages and data types

  • Find new leads

    Generate high-confidence leads for further investigation through artificial intelligence

High-Risk Product Tracking

Track the flows of high-risk products around the world, from suppliers and consumers of dual-use goods, precursor materials, and controlled technologies, such as:

Semiconductors, antennas, and other high-tech equipment

Precursors and componentry for weapons of mass destruction and military equipment


Precursors and componentry for narcotics production

  • Multi-language product search

    Track products in a unified search across different languages, brand names, synonyms, and chemical numbers

  • See deep into extended networks

    Follow the flows of products across multiple tiers of supply chain and customer relationships

  • Target the intersection of lawful
 and illicit commerce networks

    Surface hidden illicit behaviors and relationships of otherwise lawful commercial actors

AI-Powered Counterparty Screening

Automatically screen entities (and extended supply chain affiliations & ownership networks) against watchlists through:

Automated entity matching and resolution

Programmatic screening against multi-tier ownership and supply chain relationships

Ongoing monitoring and alerting for when bad actors enter an extended supply chain network

  • Reduce false positives and false negatives

    Al-based entity resolution and data linking reduce false positive/negative hits and help overcome the challenge of aliases and shell companies

  • Uncover bad actors deep in your extended network

    Go beyond direct counterparty screening and see deep into extended networks - without doing more investigative work

  • Accelerate your compliance screening workflows

    Results include entity verification and risk assessment with confidence scores to expedite investigation.

Supply Chain Security Mapping and Monitoring

Gain a living, 360° view of supply chain security and compliance threats by:


Mapping sensitive value chains across multiple tiers of production

Integrating threat data and risk analytics to the map to create a complete view of supply chain security and compliance threats

Receiving ongoing monitoring and alerting as the supply chain evolves and threats evolve

  • Create a single source of
 truth for supply chain network monitoring

    The Altana Atlas is a canonical map of the global supply chain and business relationships

  • Harmonize and integrate
 data and analytics into a unified view of risk

    Integrate internal and third party data and analytics onto company, location, and product nodes in the graph to gain a customized, unified view of risk

  • Stay up to date as the threats evolve

    The Atlas is constantly evolving as it regularly processes data from worldwide shipping, business registration, and other datasets

Examples of our solution in action

Download an overview of our solution for security and compliance