We are FusionExperience

The big data solutions Company


We fuse together innovation, experience and technology

to provide smart data from big data, cost effectively


Ignoto – A portfolio of smart data applications. They harvest, understand, analyse and report on structured and unstructured data.

These applications enable organisations to unlock the value hidden in big data across industry.  Our applications speed, extend and scale our customers' expertise to facilitate smarter business decisions.

Challenges addressed include automated invoice and contract reconciliation, deconstruction of complex financial contracts , legacy data migration, financial market monitoring and surveillance.

Find out more



Advisory and Consulting

Advisory Services- bringing you the most senior people for specialist projects such as Big Data, Business Strategy, Cyber Security, Data Discovery & Life-cycle Mapping and Managed Security Services.

Consulting Services - A range of highly talented business practitioners to help ensure you deliver. Specialties include Data Science, Regulatory and Compliance, AML and KYC.

Find out more




 Big Data and Cloud Services

Combining technology, process and people to turn big data into smart data

Full lifecycle capabilities from inception through to ongoing system management and support.

Our technology partners






Our People

At Fusion, we have brought together a unique team of people with wide ranging industry and technical skills.  We work together as a team to realise our ambitions and deliver success to all our clients.

Find out more about our People 

Guidepost Solutions are a key partner of FusionExperience.  They incorporate Ignoto into the core of their investigations service.  They have recently made some very interesting comments concerning the coming of the Cyber Monitor.  Here's what they had to say:

Guidepost commented recently that in the foreseeable future regulators will begin to impose cyber monitors upon regulated entities that have failed to adequately protect confidential information. They assert it is the next likely step after the design and mandate by regulators of cybersecurity standards, as is now beginning in the financial services industry. To prepare for this new development, you are asked what we can expect of a cyber monitor.

They first draw upon what monitors of many varieties do now. To put it simply, a monitor compares what is taking place to what should take place and moves the monitored entity to reduce any discrepancy to zero. For example, suppose a financial institution has violated anti-money laundering regulations and has been the subject of a state or federal regulatory action. Using the relevant regulations as a template, the monitor examines the entity's policies and procedures as they appear in internal documentation and as they are actually put into practice in day-to-day operations at every level of the organization. The objective is to bring both the theory (the written policies and procedures) and the practice (what officers and employees really do) into conformity with the regulations. 

To some this may sound like a description of what many consultants do. A monitor, however, is not a consultant. A monitor does not work for the monitored entity. The monitor works for and reports to the regulator, but is paid by the monitored entity. The monitored entity cannot terminate the monitorship or ignore the monitor's findings and recommendations because of the continuing involvement of the regulatory agency.

A cyber monitor will likely operate in a similar fashion. The cyber monitor will, of course, be knowledgeable about all aspects of cybersecurity and have the ability to conduct its own security assessments and penetration tests. But as the agent of the regulator, the cyber monitor will focus on the effectiveness and compliance of security procedures, leaving the details of the procedures, including equipment and personnel to be deployed, up to the monitored entity. Also, a monitor will always pay close attention to the culture of the monitored entity.  Guidepost ask: Does it take its obligations to the regulator seriously? Is there a commitment from the Board of Directors down through the organization not to repeat the behavior that led to the monitorship? This is a key distinction from a security vendor. The monitor is tasked not with making recommendations or installing systems. The monitor is focused on changing how the entity thinks, plans and operates so that it is in compliance with regulations and affirmatively intends to remain so.

Thus, Guidepost concludes the cyber monitor's prior experience as a monitor in multiple industries across a spectrum of issues is absolutely essential to the success of a cyber compliance monitorship.

Cybersecurity is among the fastest changing frontiers on the planet. New weaknesses are discovered and exploited at a dizzying pace. Regulators can only impose requirements that speak to broad issues and reasonable practices. The entities they govern will have to define the specific techniques they believe will comply with those regulations. Should matters go awry, and experience tells us they will, a cyber monitor will actually be able to help the organization re-align operations and achieve compliance.


Latest Tweets

Find Us

This website uses cookies to ensure you get the best experience on our website