Fraud Triangle Analytics

You will identify high value events regarding human behaviors related to corporate fraud

Early Detection

You can associate human behaviors with fraud triangle vertices, to generate early alerts

Artificial Intelligence

You will emulate the deductions of a certified human expert in corporate fraud examinations

Analytics and Big Data

You can perform Descriptive analytics through horizontal and vertical analysis with high volume data

Fraud Triangle

You will support all your analysis through the Fraud Triangle theory created by Donald Cressey

Download the presentation we have prepared for you and become
a rockstar in detecting corporate frauds and organizational abuses

Preventing Fraud

Detecting suspicious behavior in your organization, which according to the Fraud Triangle theory, could lead to the materialization of a corporate fraud

  • Corruption, conflicts of interest, bribery, economic extortion, illegal gratuities
  • Assets misappropriation, theft of cash, fraudulent disbursement, asset extraction
  • Financial fraud, fraudulent financial and non-financial reporting, discredit, espionage
  • Organizational abuse, defamation, data leakage, disgruntled employees
Download the presentation

Classifying Behaviors

Conducts expressed by people in real time which can be associated to the Fraud Triangle theory

  • Pressure, events that motivate an individual to commit fraud in a corporate environment
  • Opportunity, that provide an individual with some assurance to commit fraud without being detected
  • Rationalization, or habits of reasoning themselves as honest people in tough times
  • Arrogance, attitude to show superiority or advance over others
Download the presentation

Making decisions

Use horizontal, vertical, and diagonal analytics to compile, display, and analyze behavioral information

  • Harvest and generate behavioral data through remote agents
  • Visualize information in graphs with data aggregations
  • Set alerts for suspicious conduct based on the fraud triangle
  • Decide based on inferences from the artificial intelligence expert system
Download the presentation

Press Room

Antifraud international recognitions, awards, conferences and meetups


You will benefit implementing the theory of Fraud Triangle through digital method

What is the fraud

It is a theory created by
Donald Cressey, an American
criminalistic, which tries to
explain the factors that influence
people to commit fraud as follows:
Pressure, opportunity and

Endpoint attributes

You will collect all data that employees express or produces in collaborative tools for further analysis

Behavioral analysis

You will analyze behaviors vertically and horizontally, including metrics, reports, tables and graphs

How does it deepens
on a specific behavior?

Endpoints generate Big Data
which is sent to an analytics
platform to be analyzed and
classified according to people’s
behavior and contextualized in a
corporate environment.

How is the fraud

Once the behaviors have been
collected and classified as pressure,
opportunity and rationalization in
the analytics platform, they are ranked
according to the ACFE’s red flags
as high, medium and low risk of
corporate fraud

Artificial Intelligence

You will automatically receive inferences from an expert system that emulates a fraud examiner

You will professional excel making the difference with your new skills to prevent and detect fraud and abuse. You will make it happens!


This is the most important thing to understand. Check out the functionalities here

The most important functional factors and concepts

  1. Client/server architecture, with PC, Mobile and PBX endpoints that capture phrases in corporate applications. These phrases are sent to the analytics server to be later stored in a database and run the algorithm on it according to the fraud triangle.

  2. The generation of events, alerts, advanced reports, deductions, inferences and administration of the phrase’s library are part of its main functionalities, along with the dashboard, analytics and rule management, which are oriented 100% to the fraud triangle.

  3. Business functionalities such as multi-company, multi-role, secure authentication, encryption, backups, record keeping, endpoint management, metrics, departmentalization, API REST, marking of false positives, workflows, definition of criticality and concentration of the entire operation on the Web platform.

  • Dashboard. Top50 dashlets on endpoints, alerts and charts
  • Alerts. By pressure, opportunity and rationalization
  • Endpoints. Management and administration of installed endpoints
  • Analytics. Visualization of the consolidated data in graphs

The Fraud Explorer optimizes resources to prevent and detect unethical behavior related to fraud, corruption and organizational abuse

Marta Cadavid

AML Consultant, Certified Fraud Examiner

The Fraud Explorer is an FTA (Fraud Triangle Analytics) software focused on the discovery of corporate, corruption and organizational abuse frauds

Julián Ríos

NF S.A.S President, Certified Fraud Examiner

The Fraud Explorer with many researchers are opting for fraud prescription techniques through the sentiment analysis in text using semantics

Santiago Acosta

NF S.A.S internal and audit control consultant

Customers who currently use our software solution and the methodolgy are the best sellers to us through their great and real experiences.

Daniela Echavarria

Marketing Manager, Business Administration at NF S.A.S

Let's build a relationship

It is not only a tool, we are a team with certified antifraud consultants by ACFE

free download
It includes:
Full functionality
Installation instructions
No support/warranty
DIY implementation
$2k /usd month
Base price, annual billing +2.7k custom library
Subscription includes:
On-site/private cloud deployment
Antifraud consulting (1 report/month)
Management and operation
Expressions Updates
50 hours/year Integrations/dev custom
$1k /usd month
Support for resellers
Service scope:
Unlimited support in business hours
10 consulting hours/year
Priority in bug fixes
5 hours of training
Does not include implementations

We are innovating in corprate fraud prevention, read here about the key factors that will have a positive impact on your organization

Contact us

Use the below box to request a personalized QUOTATION or ask for our IMPLEMENTATION services on private environment or in the CLOUD. For privacy reasons, it is required you specify a corporate email address. Requests made through no-business email addresses will not be answered.