DocsWatchTowerWatchTower Overview

WatchTower Overview

What Remllo WatchTower does, who it is for, and how teams use it in production.

Ingest and Evaluate

Send transactions into WatchTower and receive real-time decisions and risk outputs.

Investigate

Work alerts and cases with assignment, notes, attachments, and outcome tracking.

Configure

Manage API keys, thresholds, SLA settings, users, roles, and monitoring rules.

Operate Safely

Use MFA, audit logs, and role-based access to run WatchTower safely.

Section

What WatchTower is

Remllo WatchTower is a transaction monitoring, fraud detection, and investigations platform for regulated financial teams. It ingests transaction events, evaluates them against monitoring controls, assigns risk outcomes, and turns suspicious activity into analyst workflows.

When paired with Remllo Identity, WatchTower also becomes an identity-enriched investigations workspace. Risk teams can view customer trust posture, onboarding-safe evidence, linked identifiers, and recent identity activity alongside transactional alerts and cases.

Designed for

  • fintechs, digital banks, and embedded finance platforms
  • lenders, wallets, and consumer finance apps
  • payment processors, switching platforms, and merchant operators
  • compliance, fraud, AML, and transaction monitoring teams
Section

Core platform layers

Transaction ingestion

  • organization-scoped API keys
  • canonical transaction model
  • source-specific adapters
  • idempotency protection
  • real-time evaluation entry point

Fraud detection and transaction monitoring

  • screening
  • behavior and velocity analysis
  • movement and pass-through logic
  • threshold and anomaly logic

Customer and identity context

  • customer risk posture
  • KYC and KYB status
  • onboarding evidence summary
  • linked identifiers
  • recent identity activity and access events

Alert and case operations

  • alert inbox review
  • analyst assignment
  • case escalation
  • notes and attachments
  • resolution tracking

Governance and reporting

  • reporting and export
  • rules management
  • SLA configuration
  • audit logs
  • role and security controls
Decision model

WatchTower expresses outcomes as ALLOW, REVIEW, or BLOCK, so detection results can move directly into operational workflows.

Section

Current product capabilities

  • organization-based onboarding
  • API-key and adapter-backed transaction ingestion
  • real-time monitoring and decisioning
  • identity-enriched customer profiles
  • onboarding evidence summary and KYC/KYB posture
  • linked identifiers and recent identity activity context
  • alert inbox and case management
  • rules catalog and custom rule support
  • reporting and CSV export
  • SLA configuration
  • audit logs
  • team member invites and role management
  • MFA, password reset, and password change
Section

Monitoring coverage

  • screening
  • geography
  • value and structuring
  • velocity
  • counterparty behavior
  • movement and pass-through patterns
  • expected behavior deviation
  • narration signals
  • trend shifts
  • data-quality checks
  • grouping overlays
  • account-state controls
Why this matters

WatchTower already provides a broad base for fraud detection and transaction monitoring, so most teams can start with the built-in library and then add custom rules as their operating model matures.