Abyrint Logo abyrint.

Technology

We support clients with automation, and in preparing for big structural software deployment.

Let's talk about automation!

People enjoy creative thinking. Let computers do the rest.

Automate repetitive and tedious work and release your best people to think where it really matters


When is automation useful?

All regular reporting and analytics can be fully automated, for example preparing fiscal reports, reconciling and comparing lists of data, and the analytics can be intelligent and presentations elegant on powerpoint or on the web.

Tedious administrative work can be automated, including matters like matching invoices with banks statements, extracting text from documents, and reading of standard reports.

The technology for automation has vastly improved in recent years, and has also become much cheaper, easier to build and to maintain.

Here are some examples of applications we have built:

Image representing AML/CFT and name matching controls.

AML/CFT and name matching controls

Matching of names, bank accounts or other key variables is a critical control function that has been difficult to implement reliably in the past.

Typical use cases include:

  • Control of names against U.S. Treasury SDN lists, U.N sanctions list, or other custom lists
  • Control of duplicate names or bank accounts across HR payrolls

Users can load data individually, or in batch lists, through simple interfaces using ordinary office tools. It can also be integrated in a more complex automated workflow. Outputs can be built in datasheets customized to user applications.

The application will compare the variable using a cluster of advanced algorithms for matching texts, and returns a probability estimate of similarity.

The application is accessing ultrafast scalable databases designed specifically for advanced analytics like this.

Image representing document reading and data extraction.

Document reading and data extraction

Gone are the days when skilled analysts needed to spend endless hours typing in data and information form hardcopy forms or invoices.

Modern AI applications today can be designed to extract text from image or PDF files, and can extract text with higher accuracy than most humans. Tirelessly.

This is often a staple of a complex workflow. Typical uses are in transaction processing, accounting, and audit.

The applications typically are designed to:

  • recognize a document type,
  • extract relevant information, and
  • parse the information to datasets for further processing.
Image representing analytics and reporting.

Analytics & Reporting

Automation of management reporting can be highly advanced with intelligent solutions today. Most advanced front-end users have once in their career used Excel and VBA for such purposes.

With more modern solutions, so much more is possible. Not only can we fully automate complex reporting workflows, but also include intelligent analysis of data, and reporting in a range of formats.

We also pride ourselves in creating high quality visualizations, and intelligent commentary on the analytical findings.

These are applications that can add much much value to the standard reports from administrative systems, that are often hard to read, and understand for most users.

Publication and distribution can be automated to:

  • Websites
  • Management reports, powerpoint or PDF
  • Clean data sheets

Prepare for big software solutions

Any transformation, also in post-conflict states, involve development of system critical technology

These are especially challenging programs and much can go wrong


Ensure governance, organizational, and workflow issues are well thought through before deployment

Any big transformation today involves deployment of software to support the work. This is often a prolonged and expensive process where many things can go wrong. While much is known about how to plan and prepare, many organizations don't make the necessary preparations.

There are Financial information Management Systems, HR systems, ERP solutions, case handling systems, banking and payment solutions, and other core and critical systems for large organizations.

Good preparation entails:

  • Defining needs for information structure, applications, integrations and infrastructure before you approach the tech vendors.
  • Defining functional and business requirements so that you get what you really need.
  • Defining procurement and contractual arrangements.
  • Defining the work-flow and processes in the organization so that the technology can be designed to support what you actually require.
  • Defining governance, organization, roles and responsibilities of the implementation.

Training

To build sustained capability for automation, we help clients with training.

Talk to us about training models for:

  • Automation using Microsoft VBA and Excel
  • Automation using Google Cloud services
  • Automation of legacy systems using Blue Prism
  • Principles for management of automation in an organization

Perspectives

Person using tablet in a field setting

The Future of Fieldwork is Digital

June 25, 2025

Explore how digital data collection using mobile tools transforms fieldwork by improving data quality, efficiency, and real-time availability in development projects.

Read More →
A person's hand holding a magnifying glass over complex data on a screen.

Test Data Sets The Ultimate Lie Detector for Financial Software

June 25, 2025

Discover how curated test data sets can act as the ultimate lie detector for financial software, revealing hidden flaws and ensuring system robustness beyond "happy path" scenarios.

Read More →
A person looking closely at a computer screen displaying seemingly normal financial data with a subtle anomaly.

The Silent Failures How Tech Can Go Wrong Without Anyone Noticing

June 21, 2025

Explore the hidden dangers of silent systemic failures in financial technology, where errors occur without alarms. Learn about archetypes of silent failure and the need for proactive, independent verification.

Read More →
A person looking perplexed at a complex digital workflow on a screen.

Is Your Process Improvement Just Deeper Obfuscation?

May 10, 2025

Digitizing flawed processes without critical analysis can lead to deeper obfuscation and new risks. Discover why process rationalization must precede technology to achieve true digital transformation.

Read More →
A person looking concerned at a computer screen displaying a bug report or error message.

It's a Known Bug Why This is the Scariest Phrase in Financial Tech

April 10, 2025

Discover why the phrase "known bug" is a critical governance signal in financial tech. Learn how to formally manage, assess, and mitigate risks from unaddressed software flaws for robust fiduciary oversight.

Read More →
Close up of a local monitoring officer hand adjusting a traffic light style field notebook under a shaded mango tree in northern Uganda

Adaptive Monitoring in Access-Constrained Environments

March 11, 2025

Discover a framework for adaptive monitoring in volatile environments using a Traffic Light system to modify methodologies based on access levels ensuring resilient verification and insights

Read More →

Speak to an Abyrint partner about how we can support you!

Click here for information about who and how to contact us

Contact us here!