Fraud Triangle Analytics

We identify fraud triangle red-flags to prevent and detect corporate fraud

Early Detection

We associate human behaviors with fraud triangle vertices, to generate early alerts

Artificial Intelligence

We emulate the deductions of a certified human expert in corporate fraud examinations

Analytics and Big Data

We can perform Descriptive analytics through horizontal and vertical analysis with high volume data

Fraud Triangle

All the technical methodology is based on the Fraud Triangle theory created by Donald Cressey

Download the presentation we have prepared for you to understand how you can prevent the corruption and fraud in your company

Preventing Fraud

Detecting suspicious behavior in your organization, which according to the Fraud Triangle theory, could lead to the materialization of a corporate fraud

  • Corruption, conflicts of interest, bribery, illegal gratuities
  • Assets misappropriation, theft of cash, fraudulent disbursements
  • Financial fraud, fraudulent financial reporting, espionage
  • Organizational abuse, defamation, data leakage, toxicity
Download the presentation

Classifying Behaviors

Conducts expressed by people in real time which can be associated to the Fraud Triangle theory

  • Pressure, events that motivate an individual to commit fraud
  • Opportunity, provide an individual with assurance to commit fraud
  • Rationalization, habits of reasoning themselves as honest people
  • Arrogance, attitude to show superiority or advance over others
Download the presentation

Making decisions

Use horizontal, vertical, and diagonal analytics to compile, display, and analyze behavioral information

  • Harvest and generate behavioral data through remote agents
  • Visualize information in graphs with data aggregations
  • Set alerts for suspicious conduct based on the fraud triangle
  • Decide based on inferences from the artificial intelligence
Download the presentation

Press Room

Antifraud international recognitions, awards, conferences and meetups


You will benefit implementing the theory of Fraud Triangle through digital method

What is the fraud

It is a theory created by
Donald Cressey, an American
criminalistic, which tries to
explain the factors that influence
people to commit fraud as follows:
Pressure, opportunity and

Endpoint attributes

We collect all the data that employees express or produces in collaborative tools for further analysis

Behavioral analysis

We analyze human behaviors vertically and horizontally, including metrics, reports, tables and graphs

How does it deepens
on a specific behavior?

Endpoints generate Big Data
which is sent to an analytics
platform to be analyzed and
classified according to people’s
behavior and contextualized in a
corporate environment.

How is the fraud

Once the behaviors have been
collected and classified as pressure,
opportunity and rationalization in
the analytics platform, they are ranked
according to the ACFE’s red flags
as high, medium and low risk of
corporate fraud

Artificial Intelligence

We automatically generate inferences from an expert system that emulates a fraud examiner

We make the difference proposing a disruptive solution for the big and worldwide problem of corruption, fraud and corporate abuse


This is our technical product architecture. Check out the functionalities here

The most important functional factors and concepts

  1. Client/server architecture, with PC, Mac, Android and Asterisk endpoints that capture phrases and/or voice in real time. These phrases are sent to the analytics server to be later stored in a database and run the algorithm on it according to the fraud triangle.

  2. The generation of events, alerts, advanced reports, deductions, inferences and administration of the phrase’s library are part of its main functionalities, along with the dashboard, analytics and rule management, which are oriented 100% to the fraud triangle.

  3. Business functionalities such as multi-company, multi-role, secure authentication, encryption, backups, record keeping, endpoint management, metrics, departmentalization, API REST, marking of false positives, workflows, definition of criticality and concentration of the entire operation on the Web platform.

  • Dashboard. Top50 dashlets on endpoints, alerts and charts
  • Alerts. By pressure, opportunity and rationalization
  • Endpoints. Management and administration of installed endpoints
  • Analytics. Visualization of the consolidated data in graphs

The Fraud Explorer optimizes resources to prevent and detect unethical behavior related to fraud, corruption and organizational abuse

Marta Cadavid

AML Consultant, Certified Fraud Examiner

The Fraud Explorer is an FTA (Fraud Triangle Analytics) software focused on the discovery of corporate, corruption and organizational abuse frauds

Julián Ríos

NF S.A.S President, Certified Fraud Examiner

The Fraud Explorer with many researchers are opting for fraud prescription techniques through the sentiment analysis in text using semantics

Santiago Acosta

NF S.A.S internal and audit control consultant

Customers who currently use our software solution and the methodolgy are the best sellers to us through their great and real experiences.

Daniela Echavarria

Marketing Manager, Business Administration at NF S.A.S

Let's build a relationship

It is not only a tool, we are a team with certified antifraud consultants by ACFE

DIY Model (Do It Yourself)
This version includes:
Full functionality
Documentation & instructions
Without customizations
Without Support/warranty
690 AI expressions
Custom quote
Subscription includes:
On-site/private cloud deployment
Antifraud consulting
Delegated management
From 1k to 80k AI rules
Fraud Triangle Webservice
Service scope:
Unlimited REST queries
FTA insights delivery
Full AI rules
Tone detection
Technical Support

We are innovating in corprate fraud prevention, read here about the key factors that will have a positive impact on your organization

Contact us

Use the below box to request a personalized QUOTATION or ask for our IMPLEMENTATION services on private environment or in the CLOUD. For privacy reasons, it is required you specify a corporate email address. Requests made through no-business email addresses will not be answered.