Flagship Business Assurance Platform
iView 360

iView 360°
Complete RAFM, Zero Code

A powerful, flexible, and scalable no-code platform covering the entire Business Assurance lifecycle — from ETL to dashboards, fraud rules to case management — without writing a single line of code.

90%Faster Deploy
0Lines of Code
FixedLicense Cost
360°Unified View
AISAILOR Powered

Why Legacy RAFM Falls Short

Many Business Assurance systems exist, but the real difference is how easily you can build robust controls and take proactive action.

🔒

IT Dependency

Every new control, rule change, or data attribute requires IT development cycles. Analysts wait days or weeks for changes that should take minutes.

Reactive Assurance

Manual processes trap teams in reactive mode. Issues are detected after the damage is done, with no proactive prediction or automated prevention.

🔍

No Holistic View

Alarms analyzed one-by-one. No consolidated view per subscriber, dealer, or terminal. Cross-referencing across sources is manual and error-prone.

💸

Unpredictable Costs

Per-subscriber and traffic-based licensing creates spiraling, unpredictable costs as your business grows. No budget certainty.

📋

No Version Control

Business rules undocumented. No change tracking, no rollback. Every modification is a risky operation with zero audit trail.

📊

No Real-Time Dashboards

Rule performance tracked manually. Measuring fraud percentage vs false alarms requires custom IT reports for every inquiry.

Focus on What Really Matters

iView 360° is designed to drastically reduce development efforts, provide relevant features for business users, and deliver a library of prebuilt control templates.

🎯

Business Centric

Built for analysts, not developers. Business users manage the entire BAFM lifecycle independently.

🚀

Time to Market

Library of prebuilt control templates. Deploy ready-made controls in minutes instead of months.

📈

Boost Productivity

A BI tool that really serves the business — relevant features, not feature bloat.

🔄

One-Time Fit All

Drastically reducing development efforts with a single platform that adapts to any assurance domain.

End-to-End Data Flow

From source systems through enrichment, reconciliation, rule execution, and case management — a complete pipeline with zero code.

01📡
Data Sources

ASCII, ASN.1, Binary, Excel, Database

02🔗
Canvas ETL

Drag-and-drop enrichment & normalization

03🔄
Reconciliation

Multi-source recon with drill-down

04
Rule Engine

Waves, alarms, linked units & attributes

05🔬
Dive 360

AI-powered analysis & automation

06📁
Case Management

SURF workflow, SLA, escalation

📡 Data Layer
  • Out-of-the-box telecom decoders
  • Canvas-based visual ETL designer
  • Dynamic enrichment & normalization
  • Reference & lookup tables
  • Duplicate checks
  • Direct Excel/CSV data sources
  • Scheduled ETL runs
  • Operational logs & health checks
⚡ Analysis & Rules
  • Stream trend analysis
  • Two-source & multi-source recon
  • Custom low-code templates
  • Master attributes & master units
  • Pivot analysis & Excel analysis
  • Saved filters & scheduled queries
  • Wave stream & rules grouping
  • Linked waves & linked units
📁 Case & Governance
  • Case reporting & discussion
  • Escalation & SLA management
  • Case lifecycle workflow
  • Actions & tasks tracking
  • Case closure & historical data
  • Risk control mapping (RCM)
  • Coverage index calculation
  • Real-time collaboration & blacklisting

One Platform, Multiple Domains

iView provides ready out-of-the-box control templates for each industry, facilitating the control lifecycle and enhancing time to market.

💰

Revenue Assurance

Usage assurance, billing verification, prepaid balance, tariff verification, profitability assurance, cell sites, market share simulation.

🔍

Fraud Management

Real-time fraud detection, wave-based analysis, subscriber profiling, wholesale fraud, MVNO coverage, automated case management.

🛡️

GRC

Risk register, risk assessment, policy lifecycle, control lifecycle management, continuous monitoring, dashboards & reporting.

Quality Assurance

Quality control templates, QA metrics and KPIs, process compliance monitoring, service quality tracking.

📊

Data Integrity & Quality

Data quality assessment, data cleansing workflows, integrity monitoring, NDMO/PDPL compliance controls.

⚙️

IT Operations

System logs validation, platform integrity monitoring, configuration assurance, operational health checks.

PLATFORM IN ACTION

iView 360° Live Environment

Real-world screenshots from the iView 360° platform — demonstrating the powerful analysis, geo-mapping, and investigation capabilities that analysts use daily.

iView 360° Analysis — Zain Activations Demo

iView 360° Geo-Analysis — Zain Activations Demo with real-time mapping and stream-based investigation

Stingray Digital Ocean & iView 360° Login

Stingray Digital Ocean & iView 360° — Enterprise-grade secure access portals

Built-In Assurance Capabilities

Core validation and assurance functions that work across all domain templates, ensuring comprehensive coverage.

🏛️
Platform Integrity

Validate system health, data flows, and processing integrity end-to-end.

🔄
Transaction Assurance

Ensure every transaction is captured, processed, and billed correctly.

📝
Billing Verification

Invoice validation, rating checks, rejection analysis, and balance verification.

💲
Rating Validation

Tariff verification, rate plan testing, and pricing accuracy assurance.

👤
Profiling Integrity

Subscriber, dealer, and terminal profiling with 360° entity views.

📋
System Logs Validation

Automated validation of system logs for completeness and accuracy.

⚖️
Compliance & Process

Continuous compliance monitoring with automated exception reporting.

🔒
Configurations Assurance

Detect configuration drift and unauthorized changes across systems.

12 Flagship Features

Every feature designed to empower business users, eliminate IT dependency, and accelerate time to value.

🎨

Canvas ETL

Visual drag-and-drop ETL designer. Build data pipelines in minutes with out-of-the-box telecom decoders. Support for ASCII, ASN.1, Binary, Excel, and database sources.

No-CodeVisual DesignerAuto-Decode
🔬

Dive 360

AI and ML powered module that automatically detects violations, opens cases, and applies corrective actions. Auto detect-correct-prevent lifecycle.

AI/MLAuto-DetectionROX Scheduling
📚

Control Library

Library of prebuilt out-of-the-box control templates for each industry. Browse, deploy, and modify controls independently without IT involvement.

Pre-builtLow-CodeReusable
🔄

Multi-Source Reconciliation

Record-to-record reconciliation with stitching capability, duplicate checks, and Sankey charts with drill-down search capability.

StitchingDrill-DownScheduled
🚨

Alarms & Rule Engine

Set thresholds on any control stream trend — day-over-day, month-over-month, or fixed. Raise alarms automatically when breached.

Wave StreamsRules GroupingLinked Units
🤝

Contextual Collaboration

Real-time collaboration with discussion boards, stakeholder communication, and team-based case management across all modules.

Real-timeBlacklistingRCM
📈

Predictive Analytics

SAILOR AI integration for advanced pattern detection, anomaly scoring, predictive risk assessment, and automated rule optimization.

SAILOR AIML ModelsAuto-Tune
📖

Knowledge Base

Centralized repository for business rules documentation, control frameworks, and institutional knowledge with version control.

VersionedSearchableShared
🔍

Search 360 / Data Source Net

360° entity search collecting all details for subscribers, IMSI, dealers, and terminals in a single view with linked KPIs and alarms.

Entity 360°Cross-SourceWave 360
📁

Dynamic Case Management

SURF-powered workflow engine for case lifecycle — reporting, discussion, escalation, SLA management, actions, and closure with full history.

SURFSLAEscalation

Data Retention Management

Automated data lifecycle management with configurable retention policies, archiving, and compliance-ready data governance.

AutomatedCompliantConfigurable
🔧

Smart Query Builder

Analysts create their own queries using business interface — no technical experience required — with scheduling and visualization options.

Self-ServiceScheduledVisual

13 Steps — From Data to Decision

See how iView 360° transforms every step of the analyst's workflow, replacing legacy pain with zero-code power.

1–3STEPS

⚠️ Legacy Pain

  • Adding new data attributes requires IT dev cycles taking days or weeks
  • External data (Excel/CSV) needs custom connectors built by developers
  • Data enrichment requires SQL scripts and manual ETL changes
  • Every change is an IT ticket with zero analyst self-service

✅ iView 360° Solution

  • Step 1: Modify ETLs or add sources via visual CANVAS designer, no code
  • Step 2: Upload Excel/CSV directly, preview data, specify types, auto-ingest
  • Step 3: Link sources, perform lookups, normalize fields via drag-and-drop
MinutesNot Weeks
Self-ServeNo IT Tickets
4–5STEPS

⚠️ Legacy Pain

  • Every fraud rule requires developer involvement
  • Refining with nested conditions means another dev cycle
  • Alarms reviewed one-by-one with no entity-level consolidation
  • Cross-referencing alarms across sources is manual and error-prone

✅ iView 360° Solution

  • Step 4: Create rules via CANVAS with templates and nested conditions, no coding
  • Step 5 — WAVE: All alarms per UNIT consolidated for holistic 360° analysis
  • Link UNITs across streams (IN, MSC, billing) — close a WAVE to close all associated alarms
360°WAVE View
NestedRule Logic
BulkClosure
6–7STEPS

⚠️ Legacy Pain

  • No real-time dashboards — rule performance tracked manually
  • Measuring fraud % vs false alarms requires custom IT reports
  • Designing new controls means starting from scratch every time
  • Prolonged time-to-market for every new control

✅ iView 360° Solution

  • Step 6: Pre-built Rules 360 Dashboard with trends, fraud %, top UNITs in real-time
  • Step 7: Library of ready-made controls to browse, deploy, and modify independently
  • Bulk analysis from rule perspective with top attributes and dimensions
Real-timePerformance
Pre-builtControls Library
8–10STEPS

⚠️ Legacy Pain

  • Complex fraud patterns go undetected without AI/ML
  • Deep analysis requires exporting to Excel — losing context and versioning
  • No query builder so analysts depend on IT for ad-hoc queries
  • Analysis must be repeated manually with every data refresh

✅ iView 360° Solution

  • Step 8 — SAILOR: ML algorithms for advanced pattern detection and automation
  • Step 9: Query Builder and Stream Search to run queries and visualize via GUI
  • Step 10: In-app Pivot tables with auto-refreshing data, versioning, and team sharing
AI/MLDetection
In-AppPivot & Excel
11–13STEPS

⚠️ Legacy Pain

  • Case management done via email chains or spreadsheets
  • No SLA tracking or automated escalation
  • Governance and maturity assessment performed manually
  • No automated quantification or regulatory reporting

✅ iView 360° Solution

  • Step 11: SURF case management with automated lifecycle, SLA, and escalation
  • Step 12: Automated maturity assessment, governance scoring, and quantification
  • Step 13: Operational health checks with real-time notifications and auto-reporting
SURFCase Lifecycle
AutoGovernance

20+ Features Mapped to
the Analyst Journey

Every capability is designed for business users — no IT dependency, no code, full audit trail. Click any feature area to expand details.

01📡

Data Readiness & Stream Exploration

Steps 1–3 · Data Onboarding

+
User Story: As a business analyst, I want to open stream tables and explore data records so I can verify anomalies, validate compliance, and support fraud detection or revenue assurance checks.
Stream Record Viewing

Dynamic grid with paginated rows handling large data. Columns aligned to data schema with correct types and field names.

Advanced Filtering

Quick filters above columns plus advanced AND/OR chains with grouping brackets. Compare delivery dates, agent patterns, payment amounts.

Data Profiling

Shows total record count, distinct values by field, and null presence for instant data quality assessment.

Export & Audit

Export filtered or full results to CSV/Excel for offline audits. All exports watermarked and logged for PDPL compliance.

Key Differentiator: Unified streams aggregating 47+ data sources across CRM, ERP, payments, logistics, and attendance — all accessible without IT intervention.
02⚙️

Stream Field Configuration

Steps 1–3 · Data Onboarding

+
User Story: As a business owner, I want to configure key fields (dimensions and measures) in each data stream directly through the system interface, so I can rapidly adapt analyses, rules, and reconciliations without waiting for IT.
Self-Service Configuration

Business users define dimensions and measures directly — no developer, no ticket, no wait time.

Dynamic Adaptation

Changes cascade instantly to all dependent rules, analyses, and reconciliations with one click.

03🔗

Master Unit Management

Steps 1–3 · Entity Network Building

+
User Story: As a business user, I want to create and manage master units (National ID, MSISDN, Device ID) to establish unified entities across streams, enable 360 searches, and build robust detection rules.
Create Master Unit

Define units (National_ID, MSISDN, Email, Device ID) and link them to fields across multiple streams.

Entity Network

Build cross-stream relationships — becomes the backbone for 360 Search and cross-pattern detection.

No IT Intervention

Business team builds the fraud unit network dynamically, including linking manually uploaded data.

Key Differentiator: Linking is done once by the business team to form a cross-stream network — enabling holistic entity profiling across all data sources.
04🚨

Detection & Fraud Rule Engine

Steps 4–5 · Rules & Alarms

+
User Story: As a fraud prevention manager, I want to configure detection rules without IT (no-code), aggregate alarms into waves, suppress duplicates, and detect linked patterns so I can proactively identify suspicious activity.
No-Code Rule Config

Build rules via UI with field/operator/value conditions, AND/OR logic, nested brackets. Threshold or % based, with sequential detection steps.

Alarms & Waves

Alarms auto-aggregate into waves by shared unit. Wave attributes include source, total hits, status, re-wave counter.

Duplicate Suppression

Auto-identifies near-duplicate alarms (same unit in <2 min window) and suppresses to keep dashboards focused.

Network Fraud Detection

Link waves across shared fraud units to detect organized rings. Builds fraud graph views across contexts.

Rule 360 Dashboard

Auto-generated performance dashboard for every rule — trend analysis, hit rates, false positive tracking.

Multi-Stream Rules

Rules work across multiple streams with various detection methodologies — threshold, percentage, and sequential steps.

Key Differentiator: FM business users create, edit, and stop any rule independently — a daily task handling rapid regulation changes and fraudster maneuvers without any IT cycle.
05🌊

Wave Management & Assignment

Steps 4–5 · Investigation Workflow

+
User Story: As a fraud operations manager, I want to assign waves to investigators, auto-balance workloads, track wave status and SLA, and perform bulk operations for efficient case handling.
Wave Assignment

Assign individual waves to investigators or teams. Reassign near SLA expiry to avoid breaches.

Auto Assignment

Skill-based routing, round-robin balancing, and workload-aware distribution. Auto-assign by rule type or severity.

Wave Status Lifecycle

Clear status tracking from New → Under Review → Closed. Critical for reporting and external auditors.

SLA & Escalation

Configurable SLA per wave type (24h financial, 72h delivery). Reminders at 50%/80%. Auto-escalation on breach.

Bulk Operations

Bulk assign 200+ alarms with comment. Bulk close after validation with linked justification. Manager-restricted.

Re-Wave Counter

Tracks how many previous times the same fraud unit triggered — repeat offenders instantly highlighted.

06🔗

Cross-Role Linked Units

Steps 4–5 · Network Fraud

+
User Story: As a fraud analyst, I want the system to detect when the same fraud unit appears across different unit types (customer, agent, merchant, device) to uncover organized fraud rings rotating roles.
Cross-Field Matching

Auto-compares key fraud fields across all unit types. Highlights same phone found as Customer_Phone and Agent_Phone.

Linked Wave Network

Visualizes cross-role relationships in network views. Click to drill into all contexts where unit appears.

Strategic Impact: Organized fraud exploits silos — same device used by agent today and fake customer tomorrow. Cross-role linkage exposes multi-vector attacks.
07📊

Performance Monitoring

Steps 6–7 · Dashboards & Controls

+
User Story: As a fraud manager, I want to monitor investigator productivity and rule effectiveness to recognize top performers and refine detection logic.
Employee Performance 360

Dynamic dashboard tracking alarms handled, SLA compliance, escalation rates, and average resolution time per investigator.

Rule Performance 360

Auto-generated per rule: hit counts, false positive rates, conversion rates. Auto-disable high false-positive rules. Clone & modify for safe experimentation.

08📈

Analysis & Investigation (No-Code BI)

Steps 8–10 · AI, Analysis & Pivot

+
User Story: As a fraud analyst, I want to build pivot charts, perform manual rule checks, run 360 searches, and enrich streams with external Excel data — all without IT, shareable with the team.
Chart Builder

Column, Line, Pie, Donut, Sankey, Geo Map, Summary Cards. Multi-Y support, HAVING filters, Top N, dual X-axes, mandatory date grouping.

Drill-Down & Pinning

Click chart segments to drill (Org → SLA → Agent Type). Pin values for side-by-side comparison. View underlying transactions.

360 Search

One-click entity search across all streams. Network summary showing which streams contain the unit with transaction counts.

External Enrichment

Upload Excel, join on shared field, validate external audit data. Uploads tracked in audit log for compliance.

Manual Rule Engine

Run ad-hoc rules on any stream or uploaded data for custom lookback periods. Convert to formal rule if patterns confirmed.

Pivot Analysis

Drag-and-drop dimensions to rows/columns. Auto aggregations (SUM, COUNT, AVG). Nested hierarchies. Share live pivots with team.

09📋

Dashboards & Unified Monitoring

Steps 6–7 · Consolidated View

+
User Story: As a fraud manager, I want to combine analyses into dashboards to monitor fraud patterns, KPIs, SLA compliance, and team metrics in a single consolidated view.
Add vs Copy

Add (Linked): Original edits auto-update across all dashboards. Copy (Independent): Separate instance, changes don't propagate.

Layout Editor

Drag-and-drop reordering, resize chart widths, remove or rename. Supports multi-language names.

Unified Filters

Dashboard-level filter instantly applies to all analyses sharing the same stream. Consistent slicing for comparative views.

10📁

Case Management & Reporting

Steps 11–13 · Case Lifecycle

+
User Story: As a compliance officer or fraud investigator, I want configurable case flows with dynamic forms, wave linking, SLA tracking, internal/external logs, and automated actions for transparent, auditable investigations.
Dynamic Forms

Multi-flow case types (FM, LMD, HR) each with tailored fields. Required vs optional enforcement per type. Canvas builder for form design.

Wave & Transaction Linking

Auto-link all transactions in triggered waves. Manual linking for additional waves sharing same fraud unit.

Case Lifecycle

Assignment to individuals/teams, draft mode for sensitive cases, SLA timers with auto-escalation, and mandatory action completion before closure.

Internal & External Logs

Comments flagged as Internal (team only) or External (auditors/compliance). Full audit history of every update, assignment, and status change.

Actions & Workflows

Action owners, due dates, mandatory actions, status tracking. RPA actions for automated processing upon specific conditions.

Closure Actions

Predefined closure actions including blacklisting. Further approval workflows. Historical case lineage auto-generated.

11🛡️

Prevention: Blacklist, Whitelist & Redlist

Steps 11–13 · Proactive Prevention

+
User Story: As a fraud manager, I want to maintain blacklists, whitelists, and redlists integrated with detection rules, with automated case actions, API access, and temporary listing capabilities.
Multi-List Management

Blacklist: Triggers blocks or auto-case. Whitelist: Exempts from checks. Redlist: Flags for priority escalation. Bulk import/export via Excel/CSV.

Rule Integration

Detection rules auto-check against lists. Open cases auto-close when entity moves to whitelist. Temp blacklisting for time or condition.

Business-Driven Requests

Business unit employees raise requests to add entities. Business integrity team approves/rejects with full audit trail.

API Integration

APIs to browse and search all lists. Conflicting entries (same ID on black and white) auto-prioritize blacklist and flag for review.

12🤖

AI Image Processing

Advanced · AI-Powered Verification

+
User Story: As a fraud prevention manager, I want the system to analyze images (trade-in photos, contract scans, location snapshots) using AI to ensure process compliance and detect fraud patterns without manual review.
AI-Powered Processing

Images processed on upload or batch schedule. AI tags metadata: type, confidence, duplicate checks, anomalies.

Compliance Automation

Validates employees follow procedures. Detects forged documents and improper workflows. Tied to transactions via CRM/ERP.

13🔐

Compliance, PDPL & Security

All Steps · Platform Foundation

+
User Story: As a compliance officer, I want full PDPL compliance with field masking, audit trails, approval workflows, RBAC, export controls, and SSO — ensuring data privacy and regulatory obligations at every level.
Field Masking & PDPL

Sensitive fields (NID, mobile, accounts) masked for unauthorized users. Watermarks on exports. PDPL approval workflow before viewing high-risk fields.

Full Audit Logs

Every action tracked: logins, views, filters, exports, case updates. Searchable by user, date, action type. Tamper-proof records.

RBAC at Every Level

Stream-level, field-level, export-level, and dashboard-level access controls. Role-based audit views for different audiences.

Approval Flows

High-risk data exports require explicit approval with reason codes. Temporary view windows with auto-close. Multi-approver for large datasets.

Export Configuration

Control which exports allowed, formats, and fields. Tied to RBAC and audit log. Watermarked outputs for traceability.

SSO & User Management

Active Directory integration, role resolution on login, secure session handling, and automated access revocation.

Regulatory Coverage: Full Saudi PDPL compliance, GDPR-equivalent protections, internal audit traceability, and regulator-ready evidence trails.

The iView Advantage

What sets iView 360° apart from every other Business Assurance system on the market.

🚨

Alarm-Based Analysis

Set specific thresholds on any control or stream trend — day over day, month over month, or fixed — and raise alarms automatically when breached.

🤖

Auto Detection & Correction

Dive 360 module uses AI and ML to automatically detect violations, open cases, and apply corrective actions like disconnection — hands-free.

🔄

Record-to-Record Reconciler

Reconciliation with stitching capability, duplicate checks, and Sankey charts with deep search capability — not just basic matching.

🔍

Smart Query Builder

Analysts create their own queries via business interface — no technical experience required — with scheduling and visualization options.

🌊

Wave 360 Entity View

All details for subscribers, IMSI, dealers collected in single view, connecting KPIs with alarms for complete entity profiling.

📊

Operational Health & KPIs

Automated operational dashboard and health checks with real-time notifications — solving the market's biggest gap in operational control.

Ready to Transform Your Business Assurance?

See how iView 360° can revolutionize your RAFM operations with a personalized demo from our team.