Trulioo Launches Global Identity Platform for Person and Business Verification

Identity verification firm Trulioo on Tuesday launched a new global identity platform for Person and Business verification. Trulioo so far sold multiple identity products, each operating in their own silos. Their products and services range from person and business verification, to no-code workflow building, low-code integrations, and anti-fraud measures. The new platform combines all these solutions into a single contract for clients who can use the platform to access information matching, identity document verification, proof of address through utility data, in-depth business verification, and watchlist screening with ongoing monitoring. The silo products already being offered are well-integrated into the new platform, and our customers can continue to access them through the APIs as they do today, but we have added all of the no-code and low-code tools to it, Michael Ramsbacker, chief product officer at Trulioo said. Currently, Trulioo caters to the payment services, cryptocurrency exchanges, ecommerce firms, and banking or fintech clients. The new platform is targeted at large enterprises, which have a global presence. The customers can utilize the platform over 70 countries on a daily basis. With the new platform, the customers can use our expertise in areas such as how to do business verification in China, how to have a regulatory compliant person or individual on-boarding in Canada. We have that knowledge built into our platform, Ramsbacker said. Once a customer is onboarded to the Trulioo platform, they can build workflows that take users through a series of steps collecting personal identifiable information, document evidence etc. Organizations can then deploy the workflows using low-code capabilities of the platform. If an organization has its own user interface, they can integrate with the Trulioo platform and the workflows through an API. This will allow them to leverage all the business logic in the workflow while maintaining the user interface on the organizations end, the company said. As part of the new offering, Trulioo is also launching Trulioo Portal, providing single sign-on access to all verification services, no-code and low-code integration methods, auditable reporting and performance analytics. The capabilities also include an on-device single point keying that can be used to capture government-issued identity document images and selfies for document verification capabilities. Trulioo charges a consumption-based transaction fee from customers for each transaction on the platform. All existing customers will get access to the new capabilities of the new platform starting Tuesday, the company said. Organizations want to onboard as many good users as possible and prevent as many bad actors as possible. If they are operating in multiple countries, they are dealing with a volume of changing regulations that differ from country to country. To manage this, the customer organization needs to rely on 5-25 different identity vendors that provide different point solutions, Ramsbacker said. The value proposition of Trulioo is the built in capabilities on the platform that allows organizations to build the workflows to manage the onboarding and have the appropriate fraud prevention steps and change workflows as regulations evolve. Trulioo platform will reduce the number of vendors that organizations need to stitch together, Ramsbacker claimed.

This Cyber News was published on www.csoonline.com. Publication date: Tue, 31 Jan 2023 13:05:02 +0000


Cyber News related to Trulioo Launches Global Identity Platform for Person and Business Verification

Trulioo Launches Global Identity Platform for Person and Business Verification - Identity verification firm Trulioo on Tuesday launched a new global identity platform for Person and Business verification. Trulioo so far sold multiple identity products, each operating in their own silos. Their products and services range from ...
1 year ago Csoonline.com
1Kosmos Unifies Identity Verification User Journeys Across Web and Mobile Platforms - PRESS RELEASE. EAST BRUNSWICK, N.J., Nov. 29, 2023 - 1Kosmos, the company that unifies identity proofing and passwordless authentication, today announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity ...
1 year ago Darkreading.com
Taking the complexity out of identity solutions for hybrid environments: Identity Fabric and orchestration - For the past two decades, businesses have been making significant investments to consolidate their identity and access management platforms and directories to manage user identities in one place. Instead, businesses must learn how to consistently and ...
1 year ago Securityintelligence.com
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions - In particular, there is an immediate and profound impact on the identity and access management postures of both companies. While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and ...
1 year ago Microsoft.com
Identity as a Service - Let us introduce Identity as a Service, a revolutionary identity management strategy that aims to improve security, simplify user interfaces, and enable frictionless access to online resources. Organizations can use IDaaS platforms to access identity ...
11 months ago Feeds.dzone.com
SailPoint unveils two sets of new offerings to help companies grow their identity security program - SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity ...
10 months ago Helpnetsecurity.com
Strata Identity Reins in Global Access and Compliance Challenges With Cross-Border Orchestration Recipes - PRESS RELEASE. BOULDER, Colo., Feb 15, 2024 - Strata Identity, the Identity Orchestration company, today announced Global Access Orchestration Recipes that manage the complex identity relationships and processes associated with meeting data ...
10 months ago Darkreading.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
6 months ago Securityboulevard.com
What is identity management? Definition from SearchSecurity - Identity management is the organizational process for ensuring individuals have the appropriate access to technology resources. Identity management is an essential component of security. Identity management includes authenticating users and ...
8 months ago Techtarget.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
10 months ago Hackread.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
11 months ago Pandasecurity.com
Unseen Threats: Identity Blind Spots and Misconfigurations in Cybersecurity - It's rather obvious to most in the IT sector that cybercriminals consistently and successfully exploit stolen or weak online identities to gain unauthorized access to businesses of all types. It's these identities in an enterprise that are clearly ...
10 months ago Cybersecurity-insiders.com
The Role of Identity Data Management in Achieving CISA'S Strategic Goals - At the heart of this growing risk is identity, with over 60% of all breaches today involving identity exploitation. As organizations continue to expand their digital footprints, driven by a move towards cloud resources and remote systems, their ...
8 months ago Cyberdefensemagazine.com
The 11 Best Identity and Access Management Tools - Demand for Identity and Access Management tools is booming. Today, there are dozens of Identity and Access Management tools on the market. Identity and Access Management solutions share many things in common with other cybersecurity technologies. ...
10 months ago Heimdalsecurity.com
Reducing credential complexity with identity federation - Help Net Security - Organizations also need to ensure compatibility between different platforms and protocols, and effectively merge user identities across multiple IdPs to avoid security gaps or identity conflicts. From a security perspective, federated authentication ...
2 months ago Helpnetsecurity.com
HireRight Global ID enables employers to remotely verify their candidates' identity documents - HireRight launched its new global identity verification solution, Global ID. With identity theft and fraud on the rise-and many employees being onboarded and working remotely-it is arguably more important than ever to verify candidates' identities. ...
1 year ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Analyst Perspective: Toward Converged Identity Assurance - Identity and access management is a crucial security component and a business enabler for the modern enterprise - but it's clear that current systems are falling short on both fronts. Enterprises remain rife with legacy systems, technology silos, and ...
1 year ago Securityboulevard.com
​​Strengthening identity protection in the face of highly sophisticated attacks​​ - We continuously work to improve the built-in security of our products and platforms. It's a multi-year commitment to advance the way we design, build, test, and operate our technology to ensure we deliver solutions that meet the highest possible ...
1 year ago Techcommunity.microsoft.com
Unmasking Identity Theft: Detection and Mitigation Strategies - In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies ...
11 months ago Cybersecurity-insiders.com
Deepfake Digital Identity Fraud Surges Tenfold, Sumsub Report Finds - Threat actors undertaking identity fraud have been using deepfakes ten times more in 2023 than in 2022, according to digital identity verification solutions provider Sumsub. In its third annual Identity Fraud Report, published on November 28, 2023, ...
1 year ago Infosecurity-magazine.com
Jakarta EE Security: Using Identity Stores - As one of the most important aspects of modern business applications and services, the security of the Java enterprise-grade applications didn't wait for the Jakarta EE 10 outbreak. It evolved little by little with the gradual development of ...
11 months ago Feeds.dzone.com
DataVisor integrates SMS customer verification into its platform - DataVisor announced the expansion of its end-to-end platform capabilities with the integration of SMS customer verification for fraudulent transactions. This new offering, powered by Twilio technology, provides customers with enhanced fraud ...
1 year ago Helpnetsecurity.com
What is Identity Threat Detection and Response? - Identity Threat Detection and Response remains crucial for preventing unauthorized access and mitigating security breaches. The security of digital identities has never been more paramount, and Identity Threat Detection and Response is a 2024 ...
11 months ago Securityboulevard.com
How ConductorOne's Copilot Improves Identity Governance with AI - Identity governance is table stakes for shutting down insider attacks and reducing the risks of a catastrophic breach. Getting identity governance right also helps eliminate compliance-related fines and audits - a win for any CISO or CIO managing ...
1 year ago Venturebeat.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)