Doc · 01 / Hero / Springwood (UK) Limited / 2026

— Compliance productivity infrastructure Compliance
capacity.
No new
headcount.

Springwood is the production system that sits behind onboarding, monitoring, investigations and reporting. Inputs are verified once. Decisions are written as a by-product of the work. The audit file is the working file.

Built for
Banks · EMIs · PIs
Funds · Crypto · LE
Scope
KYC · KYB · KYT
OSINT · SAR · Audit
Deploy
Platform · API · SDK
White-label · Hybrid
Doc · 02 / Performance against manual baseline
01 / Cycle
73%
*Reduction in case-assembly time, intake to first review.
02 / Surface
1×
One operational file across KYC, monitoring and reporting.
03 / Coverage
24/7
Continuous monitoring with same-day rescreening on profile change.
04 / Provenance
0
Material statements produced without a linked source object.
§ 01 / The operational picture
01.Section one
Workspace · 03 sheets
Rev. 2026.05

One customer.
One live picture.

Fig. 01.AWorkspace — Transaction monitoring · navigationSheet 01 / 06 · 1316 × 698
Springwood Transaction Monitoring workspace, showing the global navigation, the active monitoring tabs, the case information panel, transaction risk and balance charts, a triggered alerts table, geography map, device and account-balance panels, and the related-documents column.
Caption ▸Springwood opens on a single workspace. Left navigation lists the operating modules (Helicopter view, Investigation, Rescoring, Transaction Monitoring, Transactions List, Communication, Entities List). The case opens in tabs; the right edge holds related documents. Every panel on this sheet — risk radar, alerts, geography, device, balances — is bound to the same case object, not loaded from separate systems.
Source-boundWorking file
Audit retained
§ 01 / Body

Six modules.
One operational file.

Conventional compliance is a relay race between systems. Onboarding lives in one tool, screening in another, monitoring in a third, investigations in a case manager, reporting in a separate template. Each handoff loses context.

Springwood collapses the relay into a production line. The customer profile assembled at intake is the same record monitored against, the same record opened in investigation, and the same record drawn from to generate the SAR. There is no second copy.

  • i.Live case objectIdentity, ownership, profile and behaviour as one record.
  • ii.Connected panelsRisk, alerts, geography, devices & balances on one sheet.
  • iii.Provenance trailEvery panel value links back to its source object.
  • iv.Maker / checkerDecisions captured with approval routes attached.
  • v.Audit-as-fileThe working record is the regulatory record.
§ 02 / Verify · Profile
02.Section two
Identity · ownership
Modules M.01 — M.02

Identity, drawn from source.

Fig. 02.AEntity profile · related entities mapSheet 02 / 06 · 1010 × 691
Springwood entity profile showing a related-entities graph on the left, with directors, shareholders, beneficiaries and controllers mapped across multiple companies, and a profile panel on the right listing selfie, passport, proof of address verification, KYC fields and document categories.
Caption ▸Identity and ownership held as one connected file. Related-entities map (left) shows direct and indirect relationships, voting rights and control-by-other-means across companies. Profile panel (right) records biometric document data, liveness-tested selfie, address proof and the KYC document set — each item with provenance and timestamp.
Verified inputsNFC · MRZ · Liveness
Document set complete
§ 02 / Body

Who they are.
Who controls them.

Customer due diligence and beneficial-ownership resolution sit on the same record. Documents extracted once, validated once, scored once — then carried through every subsequent monitoring decision and investigation.

The relationship graph is interrogable: percentage ownership is calculated, nominee arrangements are flagged, control by other means is recorded. Changes to a beneficial owner re-trigger screening downstream automatically.

  • i.Biometric capturePassport, ID card, NFC chip, liveness-tested selfie.
  • ii.Document setProof of address, source of funds, source of wealth.
  • iii.Ownership graphDirect, indirect, voting, control-by-other-means.
  • iv.Change monitoringDirector, shareholder, controller updates rescreened.
  • v.Behavioural baselineExpected activity captured at the start.
§ 03 / Watch · transaction monitoring
03.Section three
Monitoring · KYT
Module M.04

Activity in context,
not just thresholds.

Fig. 03.ATransaction monitoring · case sheetSheet 03 / 06 · 1187 × 697
Springwood transaction monitoring case sheet showing transaction information, a transaction-risk radar chart, average balance over time, triggered alerts and rules table, transaction count and volume charts, client message thread, transaction notes, geography map, device summary, account balances and related documents.
Caption ▸A single transaction opens with its full operating context: information panel (sender / receiver / channel / risk score), transaction-risk radar across six dimensions, average balance history, triggered alerts & rules with topology and clause name, incoming/outgoing transaction counts, geography map of sender and bank locations, device trust signal, account & available funds, and the linked document set. Approve, reject, RFI, SAR Report or escalate — directly from the sheet.
Source-boundLive context
Decisioning sheet
§ 03 / Body

The radar reads
six dimensions.

A transaction is assessed against the customer's declared profile, corridor and counterparty risk, channel typology, device and behaviour, screening exposure and negative-news state — not a single flat threshold. The radar is a quick read of where this transaction sits against expected, and the alert grid below it tells the analyst which rule fired and why.

Crucially, the case sheet is where the decision is made. There is no separate "investigation system" to copy into.

  • i.FrequencyVelocity against declared activity profile.
  • ii.VolumeAmount against expected baseline and corridor norms.
  • iii.Country riskSender / bank / counterparty country exposure.
  • iv.DeviceTrust signal, last login, behavioural anomaly.
  • v.ScreeningSanctions, PEP, adverse risk on the parties.
  • vi.Custom ruleInstitution-specific scenarios and typologies.
§ 03 / Sub-exhibit
Fig. 03.BQueue · transactions listSheet 04 / 06 · 1117 × 587
Springwood transactions list showing rows of transactions with date, sender, receiver, currency, amount, counterparty bank country, counterparty country, payment channel, flag, risk score, status, compliance officer, total timer, status timer, EMD or DD field, and ID.
Caption ▸The queue view ranks the day's work by risk score and status timer. 2,395 transactions sit on the workspace; the analyst's first hour is spent on rows that need a decision, not on triage. Each row opens directly to the case sheet (Fig. 03.A), and every status change is recorded on the operational file.
Operational queueRisk-ranked
Status-timed
§ 04 / Investigate · case workspace
04.Section four
Casework · OSINT
Module M.05

Cases open with
the evidence attached.

Fig. 04.AInvestigation · entity-network workspaceSheet 05 / 06 · 1100 × 686
Springwood investigation workspace showing four open project tabs, an entity-network graph in the centre with the company under investigation linked to other companies, individuals, banks, government agencies and counterparties, with a selected transaction highlighted; a profile panel on the right with company information, ownership and control, and a counterparties list with transactions and amounts; a transaction history chart at the bottom of the workspace.
Caption ▸Investigation opens with the network already drawn. Entity graph (centre) connects company under review to related entities, financial counterparties, government agencies, EMD agents and identified bad actors — colour and shape encode entity type and status. Profile (right) holds ownership, control, registered and trading addresses, regulator information, onboarding history. Counterparties list every party with their transaction trail. Transaction history (bottom) plots the period in scope, with selected transactions marked.
CaseworkPre-assembled
Approval-routed
§ 04 / Body

Judgement.
Not reassembly.

Conventional investigation is mostly file reconstruction. The analyst pulls statements, requests documents, runs OSINT searches, copies data into a working file, then begins the actual analysis hours later. Most of the time is spent before the thinking starts.

Springwood inverts the order. The network, the documents, the counterparties, the timeline and the prior alerts are already on the case when the analyst opens it. The job becomes the judgement: does this pattern, with this evidence, in this context, support a suspicion report?

  • i.Entity networkCompanies, individuals, banks, agencies — connected.
  • ii.Counterparty registerEvery party with transactions, status and reference.
  • iii.Profile depthOwnership, control, addresses, regulator, history.
  • iv.TimelineTransaction history charted with selected events.
  • v.OSINT linksSource-bound external evidence attached to the file.
  • vi.Approval routeMaker / checker / MLRO routes built in.
§ 05 / Module register
05.Section five
Six modules
One control layer

Six modules.
One control layer.

§ 05 / Register
Ref.ModuleScopeSheet
M.01VerifyRemote identity, document and liveness capture; address and database validation.Fig. 02.A →
M.02ProfileOwnership, control, expected behaviour, source of funds and source of wealth.Fig. 02.A →
M.03ScreenSanctions, PEP, adverse risk, internal watchlists, counterparty exposure, rescreening.Not shown
M.04WatchReal-time and batch monitoring of payments, accounts, wallets, FX, settlements.Fig. 03.A — 03.B →
M.05InvestigateUnified casework — AML, fraud, sanctions, onboarding, KYB and transaction review.Fig. 04.A →
M.06ReportSAR / STR drafts, MLRO workflows, FIU bundles, restricted access, post-report monitoring.Not shown
M.00ControlPolicy rules, model governance, QA sampling, audit packs, retention, legal holds.Substrate
§ 06 / Industries
06.Section six
Sector register
Built for

Where volume and
risk are both rising.

§ 06 / Register
Ref.SectorPrimary scopeOperating flow
iBanksCDD, KYB, sanctions, transaction monitoring, fraud review, investigations, SAR/STR, audit.Onboarding → monitoring
iiEMIs & payment institutionsWallets, virtual IBANs, merchants, counterparties, payment flows, fraud typology.Real-time controls
iiiCrypto & digital assetKYC, KYB, wallet intelligence, on/off-ramp behaviour, sanctions exposure, ownership.Wallet ↔ identity
ivLaw firmsClient due diligence, sanctions, complex ownership, asset tracing, enhanced investigations.Engagement-led
vRegulators & law enforcementSupervised firms, suspicious reports, customer networks, transaction patterns, OSINT.Investigation-led
viFunds & administratorsInvestors, SPVs, trusts, source-of-wealth, redemptions, ownership, cross-border structures.Lifecycle-led
CTA · 01 / Next step

A smaller queue.
A stronger record.

Springwood is designed for institutions that need measurable compliance productivity without lowering standards. Discuss your workflow with the team.