Here’s How
It’s All Put Together

It’s Relay Simple

Flume Relay's specialized approach to bidirectional data movement of vendors and systems streamlines complex processes and helps payers meet customer demands.


Your Systems

Data is distributed to and from select vendors, in their formats, allowing for maximum data fidelity and rapid integrations.

Relay simplifies data mapping and transformation with support for a variety of data types, including but not limited to Eligibility, Accumulators, Authorizations, Claim Service Lines, Rx Claim Service Lines, and Provider Directories. Relay can quickly be configured to accommodate additional data types to meet customer needs.

With built-in support for data interchange formats that are either tabular or JSON, Relay ensures seamless data mapping and transformation across multiple sources and destinations.


Your Relays

Bidirectional trades first map to Relay’s canonical format, then transform to the destination format. Rigorous quality, validation and testing processes ensure high-visibility and seamless data operations.

Real-time insights into the overall health and status of your trading operations. Quickly monitor, identify, and address potential issues – ensuring consistent data transmission with your vendor ecosystem – and a reliable member experience that follows

Add or remove vendors from specific groups, populations or plans – anytime. Deploying custom vendor stacks with Relay cuts group implementation costs and timelines

Instant “click-to-integrate” connectivity with the pre-built connections in Relay’s Vendor Atlas

Quickly setup and manage custom connections with 1st and 3rd party systems not found in the Vendor Atlas. Relay’s robust mapping, transformation, and movement capabilities across multiple sources & destinations means you can confidently deploy and manage new connectors that scale


Your Vendors

Data is distributed to and from 3rd parties such as vendors, in their formats, allowing for maximum data fidelity and rapid integrations.

Data transactions are committed to their destinations only after passing required validation checks. Data movement is safeguarded by multiple layers of security, including encryption, authentication, and authorization. Users can set up triggers or scheduled events to control data movement.

Get started

Schedule a Demo

Schedule A Demo

Schedule a Demo

Fill out the form with your details and a team member will get in touch shortly