Technology
We support clients with automation, and in preparing for big structural software deployment.
Let's talk about automation!
People enjoy creative thinking. Let computers do the rest.
Automate repetitive and tedious work and release your best people to think where it really matters
When is automation useful?
All regular reporting and analytics can be fully automated, for example preparing fiscal reports, reconciling and comparing lists of data, and the analytics can be intelligent and presentations elegant on powerpoint or on the web.
Tedious administrative work can be automated, including matters like matching invoices with banks statements, extracting text from documents, and reading of standard reports.
The technology for automation has vastly improved in recent years, and has also become much cheaper, easier to build and to maintain.
Here are some examples of applications we have built:

AML/CFT and name matching controls
Matching of names, bank accounts or other key variables is a critical control function that has been difficult to implement reliably in the past.
Typical use cases include:
- Control of names against U.S. Treasury SDN lists, U.N sanctions list, or other custom lists
- Control of duplicate names or bank accounts across HR payrolls
Users can load data individually, or in batch lists, through simple interfaces using ordinary office tools. It can also be integrated in a more complex automated workflow. Outputs can be built in datasheets customized to user applications.
The application will compare the variable using a cluster of advanced algorithms for matching texts, and returns a probability estimate of similarity.
The application is accessing ultrafast scalable databases designed specifically for advanced analytics like this.

Document reading and data extraction
Gone are the days when skilled analysts needed to spend endless hours typing in data and information form hardcopy forms or invoices.
Modern AI applications today can be designed to extract text from image or PDF files, and can extract text with higher accuracy than most humans. Tirelessly.
This is often a staple of a complex workflow. Typical uses are in transaction processing, accounting, and audit.
The applications typically are designed to:
- recognize a document type,
- extract relevant information, and
- parse the information to datasets for further processing.

Analytics & Reporting
Automation of management reporting can be highly advanced with intelligent solutions today. Most advanced front-end users have once in their career used Excel and VBA for such purposes.
With more modern solutions, so much more is possible. Not only can we fully automate complex reporting workflows, but also include intelligent analysis of data, and reporting in a range of formats.
We also pride ourselves in creating high quality visualizations, and intelligent commentary on the analytical findings.
These are applications that can add much much value to the standard reports from administrative systems, that are often hard to read, and understand for most users.
Publication and distribution can be automated to:
- Websites
- Management reports, powerpoint or PDF
- Clean data sheets
Prepare for big software solutions
Any transformation, also in post-conflict states, involve development of system critical technology
These are especially challenging programs and much can go wrong
Ensure governance, organizational, and workflow issues are well thought through before deployment
Any big transformation today involves deployment of software to support the work. This is often a prolonged and expensive process where many things can go wrong. While much is known about how to plan and prepare, many organizations don't make the necessary preparations.
There are Financial information Management Systems, HR systems, ERP solutions, case handling systems, banking and payment solutions, and other core and critical systems for large organizations.
Good preparation entails:
- Defining needs for information structure, applications, integrations and infrastructure before you approach the tech vendors.
- Defining functional and business requirements so that you get what you really need.
- Defining procurement and contractual arrangements.
- Defining the work-flow and processes in the organization so that the technology can be designed to support what you actually require.
- Defining governance, organization, roles and responsibilities of the implementation.
Training
To build sustained capability for automation, we help clients with training.
Talk to us about training models for:
- Automation using Microsoft VBA and Excel
- Automation using Google Cloud services
- Automation of legacy systems using Blue Prism
- Principles for management of automation in an organization
Perspectives

The Future of Fieldwork is Digital
June 25, 2025
Explore how digital data collection using mobile tools transforms fieldwork by improving data quality, efficiency, and real-time availability in development projects.

Test Data Sets The Ultimate Lie Detector for Financial Software
June 25, 2025
Discover how curated test data sets can act as the ultimate lie detector for financial software, revealing hidden flaws and ensuring system robustness beyond "happy path" scenarios.

The Silent Failures How Tech Can Go Wrong Without Anyone Noticing
June 21, 2025
Explore the hidden dangers of silent systemic failures in financial technology, where errors occur without alarms. Learn about archetypes of silent failure and the need for proactive, independent verification.

Is Your Process Improvement Just Deeper Obfuscation?
May 10, 2025
Digitizing flawed processes without critical analysis can lead to deeper obfuscation and new risks. Discover why process rationalization must precede technology to achieve true digital transformation.

It's a Known Bug Why This is the Scariest Phrase in Financial Tech
April 10, 2025
Discover why the phrase "known bug" is a critical governance signal in financial tech. Learn how to formally manage, assess, and mitigate risks from unaddressed software flaws for robust fiduciary oversight.

Adaptive Monitoring in Access-Constrained Environments
March 11, 2025
Discover a framework for adaptive monitoring in volatile environments using a Traffic Light system to modify methodologies based on access levels ensuring resilient verification and insights
Speak to an Abyrint partner about how we can support you!
Click here for information about who and how to contact us
Contact us here!