Subscribe to our blog
Get ahead with our award-winning insights on the latest developments in the fraud and compliance landscape. Enter your email below to receive our blog posts directly to your inbox.

Post Written by

We have been an innovator in digital identities since 2013, and our core premise has not changed in those five years: the more you know about a user, the easier it is to assess the risk of doing business with them. Our platform gathers information, then applies machine learning and graph analysis to that information to build, proof and maintain digital identities. Our platform highlights the good users as well as the bad, to help you deploy risk-based compliance processes.

A recent industry report by Gartner, the “Market Guide for Identity Proofing and Corroboration,” April 24, 2018, Tricia Phillis, Jonathan Care, Danny Luong, Ant Allan* breaks down the key functions necessary to achieve full identity proofing and corroboration in the following feature sets:

  1. Identity Corroboration Hub
  2. Data-centric, Real World Identity Corroboration
  3. Document-centric, Real World Identity Corroboration
  4. Digital Attribute Corroboration and Assessment
  5. Navigation and Behavior Analysis
  6. Real World and Digital Identity Reputation and Link/Graph Analysis[/box]

Our platform covers each of these capabilities, and we outline how in our latest guide, “Trusted Digital Identities: Creating a Common Framework for Proofing, Monitoring, and Trusting Identities”.

The guide assesses our platform against each of these capabilities, explaining how each comes together to offer a comprehensive identity proofing and corroboration solution. It covers the importance of normalizing and abstracting data, combining digital with physical attributes, and the challenges of document verification. And how identity proofing and ultimately onboarding a client well is just the first step.

Read the Trusted Digital Identities Guide

* Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.