7 results in Reports
Sort by:
  • Identity Verification

Featured content

The Identity And Access Management Playbook For 2018

Evolve Your Identity Strategy For The Extended Enterprise

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • Report Top Consumer Authentication Pitfalls To Avoid

    Continuous Improvement: The Identity And Access Management Playbook
    July 6, 2018 | Merritt Maxim, Andras Cser

    Digital businesses must manage, govern, and secure customers' access to systems without hurting the customer experience. As firms increase the digital channels for customer interaction, they also...

  • Report The State Of Facial Recognition For Authentication And Verification

    Facial Recognition Expedites Critical Identity Processes For Consumers And Employees
    June 11, 2018 | Andras Cser, Alexander Spiliotes, Merritt Maxim

    Facial recognition (FR) expedites mobile logins, reduces password-related help desk calls, and makes authentication more secure. Antifraud and compliance pros should consider FR for the unique...

  • Report Top Trends Shaping Identity Verification (IDV) In 2018

    Post-Equifax Breach, IDV Aggregators Will Cater To Multifaceted IDV Requirements
    March 29, 2018 | Andras Cser, Merritt Maxim

    In the face of increasing identity theft, stricter compliance regulations, and the push for online customer acquisition, reliable, accurate, cost-effective, and easy-to-use identity verification...

  • Report Now Tech: Identity Verification, Q1 2018

    Tools And Technology: The Identity And Access Management Playbook
    February 27, 2018 | Andras Cser, Merritt Maxim

    You can use identity verification (IDV) to support digital transformation, help comply with anti-money laundering, and stop account takeovers. But to access these benefits, you'll first have to...

  • Report Top Trends Shaping IAM In 2018

    Landscape: The Identity And Access Management Playbook
    January 9, 2018 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report A Secure Blockchain Will Transform Security And Risk Management

    Secure Payments, Cryptocurrencies, Anti-Money Laundering, Identity Verification Demand New, Distributed, And Tamper-Evident Transaction Databases
    June 9, 2017 | Andras Cser, Martha Bennett

    Secure blockchains will become the foundation for verifiable transactions — both business and operational — running the gamut from payments, financial transfers, and shipment tracking to identity...

  • Report Breakout Vendors: Social Identity And Eligibility Verification (SIDEV)

    SIDEV Will Supplant Traditional Identity Verification Within 24 Months
    November 21, 2016 | Andras Cser, Merritt Maxim

    Traditional identity verification (IDV) solutions use information from customers' credit files to verify their identity online or on the phone. Social identity and eligibility verification (SIDEV)...

Content Type