Most advice on how to find sec filings is too shallow for competitive intelligence work. It tells you where to click in EDGAR, maybe how to search by ticker, and then stops. That’s fine if all you need is a document. It fails if you need a defensible view of what a competitor changed, why it matters, and whether it’s worth briefing to leadership.
That gap is even worse for UK and international operators. Many guides treat “SEC filings” as if all public company disclosure runs through the same system. It doesn’t. UK teams run into a practical dead end because those guides ignore UK equivalents, even though 78% of UK-listed companies require FCA disclosures and there were over 15,456 regulatory filings in 2025 according to the provided reference to the SEC search context used in the brief. The result is familiar: manual checking, noisy alerts, and weak confidence in what’s material.
The useful question isn’t just where to find filings. It’s how to turn filings into verified competitor intelligence with an inspectable proof trail. That requires source discipline, deterministic change detection, and an evidence chain in competitive intelligence that stakeholders can confidently trust.
Table of Contents
- Why Finding Filings Is Not the Same As Intelligence
- The Manual Path to US Public Company Filings
- Key Filing Types to Scan for CI Signals
- Automating Detection with APIs and Feeds
- From Raw Filings to Verified Intelligence
- Finding and Analysing UK Company Filings
- Build a More Defensible CI Programme
Why Finding Filings Is Not the Same As Intelligence
A filing is a source object. Intelligence is a reviewed conclusion attached to evidence.
That distinction matters because raw disclosure systems are built for compliance, not for competitor monitoring. They contain material events, routine updates, repeated legal language, archived exhibits, and formatting differences that create false urgency if you treat every new document as a signal.
The US problem is scale. The SEC processed an average of 788,914 filings in 2022, with daily volumes ranging from 2,000 to 11,000 documents according to EDGAR filing statistics. In that environment, “just monitor filings” is not a workflow. It’s an invitation to overwhelm your team.
The common mistake
Many teams still do one of these:
- Search reactively: They look up a competitor only when a sales deal, board question, or launch review forces the issue.
- Track everything equally: A routine filing gets the same attention as a material disclosure.
- Summarise before verifying: They let a broad summary engine tell a story before anyone confirms what changed.
Practical rule: If you can’t point to the exact filing section, the exact change, and the exact date, you don’t have a CI signal yet.
The UK angle exposes the weakness in generic advice. Searching “find sec filings” won’t help much when the target company is listed in London and files through UK mechanisms instead of EDGAR. Operators who don’t separate source systems end up with patchy coverage and false confidence.
What intelligence work actually requires
A filing-centred CI workflow has five parts:
- Source selection
- Change detection
- Verification
- Interpretation
- Action
Only the first part is “finding filings”. The rest is where trust is built or lost.
The Manual Path to US Public Company Filings
Manual search is still worth learning because it teaches source structure. You see how companies label forms, where exhibits sit, how amended filings appear, and how disclosure timing works in practice.

Start with EDGAR search
For US public companies, the baseline source is the SEC’s EDGAR system. A practical manual path looks like this:
- Search by company name or ticker first. That’s usually enough for a quick lookup.
- Confirm the entity. Similar names and subsidiaries can create avoidable mistakes.
- Use the company filings page as the canonical record. It’s less polished than a corporate site, but it’s the official disclosure trail.
- Filter by form type. If you care about strategic drift, annual and quarterly reports matter more than a broad undifferentiated feed.
- Open the filing detail page. Don’t stop at the filing list. The exhibits often hold the useful detail.
A lot of teams skip the entity check and pay for it later. The wrong issuer, the wrong subsidiary, or an amended filing reviewed as if it were a fresh event can distort an entire competitor brief.
Use investor relations pages carefully
Investor relations pages are the convenient layer, not the authoritative one. They often package annual reports, earnings decks, transcripts, and webcasts in one place, which is helpful for context and stakeholder-ready review.
They’re also inconsistent. Some IR sites are easy to search. Others bury historical materials, remove older decks, or split disclosures across presentations, press releases, and governance pages.
Use them like this:
- Use EDGAR to establish the record.
- Use IR to gather supporting materials.
- Cross-check dates and document titles before you brief anyone.
A polished IR page can save time, but it can also hide the exact source boundary. Always verify against the filing record.
If you’re still relying on inbox alerts and lightweight monitoring, it’s worth reviewing where those methods break down in practice. A good example is the trade-off discussed in this piece on Google Alerts settings, which shows why broad alerting often misses the specificity CI teams need.
Manual work remains useful for one-off analysis, board prep, and source familiarisation. It’s a poor operating model for ongoing rival tracking because it depends on memory, discipline, and spare time.
Key Filing Types to Scan for CI Signals
Not every filing deserves the same weight. Good operators scan filings by likely signal value, not by formal importance alone.
Where the strongest signals usually sit
For competitor intelligence, these forms tend to matter most:
- 10-K for annual strategic framing, risk language, segment discussion, and long-form management disclosure.
- 10-Q for shorter-cycle movement such as operating changes, concentration issues, or updated narrative on performance.
- 8-K for near-real-time material events.
- S-1 and related registration statements for companies going public or issuing securities, especially when you need an unusually deep read on business model, GTM posture, and disclosed risks.
The key is to look for movement, not mere presence. A risk factor repeated word-for-word may have little value. A rewritten risk section, new segment emphasis, a changed description of customer demand, or a fresh executive agreement can matter a lot.
SEC filings for competitive intelligence
| Form Name | Description | Key CI Signals to Look For |
|---|---|---|
| 10-K | Annual report | Strategic priorities, market framing, risk factor changes, product focus, segment commentary, partnership language |
| 10-Q | Quarterly report | Updated management discussion, changes in spending emphasis, customer concentration references, operational pressure points |
| 8-K | Current report | Leadership changes, acquisitions, financing events, major agreements, other material developments |
| S-1 | Registration statement | Business model explanation, category positioning, growth narrative, risk disclosures, use of proceeds, GTM structure |
| 13D / 13G | Beneficial ownership filings | Ownership changes that may affect control, pressure, or strategic direction qualitatively |
| Proxy materials | Governance disclosures | Executive incentives, board changes, strategic oversight themes, compensation-linked priorities |
A disciplined review pattern helps:
- Read the filing summary first. You need orientation before detail.
- Jump to management discussion next. That’s where competitors often reveal priorities in plainer language.
- Compare wording against the prior filing. Static language rarely deserves escalation.
- Review exhibits last. Contracts, presentations, and supplemental attachments can explain the event better than the main filing body.
Don’t ask “what forms should I collect?” Ask “which forms are most likely to show public competitor movement I can verify?”
This is also where less experienced teams over-index on 8-Ks. They’re important, but annual and quarterly reports often reveal the deeper directional change that explains the event-level noise.
Automating Detection with APIs and Feeds
Once you know how the documents are structured, manual monitoring stops being defensible. It’s slow, easy to forget, and impossible to scale across a live competitor set.

RSS is useful but limited
RSS feeds are the lightest automation layer. They can work for narrow monitoring, especially when you’re tracking a small set of issuers and only need a basic filing alert.
That said, RSS has real limits:
- It tells you something was published. It usually doesn’t tell you whether the filing contains a meaningful change.
- It creates shallow workflows. Teams still end up clicking through and reviewing manually.
- It doesn’t solve normalisation. Amendments, exhibit-heavy filings, and inconsistent labels still need handling.
RSS is best treated as a temporary intake mechanism, not the core of a CI programme.
After the first alert layer, visualising the system helps. This is the operational progression teams typically need:
APIs create a stable intake layer
A better path is direct API-based ingestion. For US filings, that means building around EDGAR-accessible data or a filing aggregation layer that normalises retrieval.
The practical benefits are straightforward:
- Consistent intake across a defined competitor list.
- Structured filtering by form type, issuer, and date.
- Automated downstream processing so change detection starts immediately.
- Reproducibility because the same source logic runs every time.
A distinct mistake many teams make is treating ingestion as the hard part. It isn’t. Ingestion is the plumbing. True value comes from what you do after a filing enters the system.
A reliable automated intake should feed into:
- Document parsing
- Section-level comparison
- Noise suppression
- Candidate signal promotion
- Human review for material items
If you’re evaluating technical approaches, look for tooling that supports repeatable source coverage rather than broad, low-trust alerting. That’s the same principle discussed in this piece on a rank tracking API: the feed itself matters less than whether you can build a dependable downstream workflow on top of it.
Basic automation reduces labour. Good automation preserves context, source fidelity, and reviewability.
For most CI teams, the best design is a narrow monitoring set with strong filtering, not a maximal feed of every possible filing.
From Raw Filings to Verified Intelligence
The alert is not the insight. It’s the start of the review.
That’s the point where many teams lose trust. A system flags a new filing, an analyst or model writes a summary, and stakeholders receive a neat narrative with no clear evidence trail behind it. If the interpretation turns out to rest on boilerplate language or a harmless amendment, confidence drops fast.

Verification comes before interpretation
A stronger model is deterministic detection first, interpretation second.
That means:
- code identifies the source document
- code isolates the changed section or material object
- the system suppresses likely noise
- a reviewer checks whether the change is real and relevant
- only then does narrative interpretation get added
This order matters even more as filings become more machine-readable. The FCA’s Digital Regulatory Reporting pilot recorded a 42% increase in machine-readable XBRL filings from April 2025 to March 2026, as referenced in the provided brief via the cited pilot reference. Better machine readability improves automation, but it doesn’t remove the need for verification. It makes a proof-first workflow more achievable.
What a confidence-gated review looks like
A useful review model has gates.
| Review stage | Question | Action |
|---|---|---|
| Detection | Did a relevant filing arrive from a trusted source? | Ingest and classify |
| Diffing | Did any monitored section actually change? | Compare to prior version |
| Materiality | Is the change likely to matter for CI? | Suppress or promote |
| Verification | Can a reviewer inspect the exact source evidence? | Approve for interpretation |
| Interpretation | What does this change suggest about competitor movement? | Draft brief with evidence attached |
A few practical examples make the boundary clearer:
- Low confidence signal: formatting changes, reordered sections, repeated legal boilerplate, exhibit replacements with no substantive movement.
- Medium confidence signal: rewritten demand commentary, new strategic emphasis, changed partner references, updated go-to-market language.
- High confidence signal: explicit disclosure of leadership change, financing event, acquisition, product-related risk shift, or a materially different annual narrative.
Raw alerts create activity. Confidence-gated signals create trust.
When you brief stakeholders, every conclusion should point back to a visible source trail. That’s the difference between “we think the competitor is shifting upmarket” and “the annual filing changed its customer description, added enterprise implementation language, and removed prior emphasis on self-serve growth”.
For teams trying to operationalise that standard, the right benchmark is a system built around verified competitor signals, where proof is inspectable before interpretation is distributed.
Finding and Analysing UK Company Filings
For UK-listed companies, searching for SEC filings is usually the wrong move. The source environment is different, and using US-oriented advice without adaptation leaves obvious gaps.
Use the right UK sources
For UK competitor monitoring, three sources matter most:
- FCA National Storage Mechanism (NSM) for required regulatory disclosures and archived filings
- Regulatory News Service (RNS) through the London Stock Exchange for market announcements
- Companies House for company records, annual accounts, officer changes, and related corporate information
These sources serve different purposes. RNS is the fast signal layer. NSM is the archive and disclosure repository. Companies House adds legal entity and corporate record context that often clarifies what changed around the listed business.
The strongest workflow uses all three rather than treating any single source as complete.
A deterministic UK workflow
The practical UK method is more operational than most published guides suggest.
Start by ingesting from the NSM sitemap and pulling documents into a parser that can handle annual reports, half-year materials, and related disclosure files. Then run section-level diffs on the parts most likely to reveal competitor movement, such as management discussion, strategic reports, and notes that touch pricing, product direction, or operating structure.
The evidence in the brief is clear on the value of this approach. A professional methodology built on automating ingestion from the NSM sitemap, using PDF parsing, and detecting diffs on key sections yields 88% precision on pricing intelligence from annual reports, compared with 45% for heuristic scraping tools, according to the provided FCA-linked reference to the National Storage Mechanism.
That difference reflects a broader truth. Heuristic scraping tends to overreact to layout and wording noise. Deterministic comparison performs better because it asks a narrower question: what materially changed in a monitored section of a known source?
A practical operator workflow for UK filings looks like this:
- Define the issuer set. Start with the exact UK competitors you care about.
- Map source coverage. Identify which disclosures arrive via RNS, NSM, and Companies House.
- Normalise documents. Convert PDFs and structured files into comparable text sections.
- Run deterministic diffs. Compare current and prior filings at the section level.
- Gate for materiality. Suppress legal repetition and archive-only movement.
- Verify before briefing. Attach the changed excerpt, filing date, and source path.
UK filing work becomes manageable when you stop treating it as “international edge cases” and start treating it as a first-class CI source system.
That matters for PMMs and strategy leads tracking UK SaaS rivals. Annual reports, ownership disclosures, company record changes, and market announcements can all reveal pricing pressure, leadership changes, product focus, or packaging drift. The useful output isn’t a pile of documents. It’s a small set of verified signals tied to public competitor movement.
Build a More Defensible CI Programme
Finding filings is easy compared with building a workflow people trust.
The teams that get real value from public disclosures do three things well. They use the right source system for the market they’re tracking, they detect changes deterministically instead of relying on broad alert noise, and they keep an evidence chain attached to every conclusion. That’s what turns regulatory data into decision-ready competitor intelligence.
If you’re building that capability from the ground up, this guide on how to build a competitive intelligence programme from scratch is a useful next step.
Metrivant helps teams track public competitor movement with deterministic detection, confidence-gated signals, and an inspectable evidence chain. If you want a proof-first way to monitor rivals across filings, websites, careers pages, and other public sources, see how Metrivant works.
