Published: 23 October 2024
Summary
IDV tools are increasingly evaluated for applications beyond their original scope, but may not be ready to be key parts of a security portfolio. We evaluate the products of 11 IDV vendors across four specific use cases, enabling IAM leaders to shortlist products that align with their requirements.
Included in Full Research
- 1Kosmos
- AU10TIX
- Entrust
- GB Group
- Incode Technologies
- Jumio
- Mitek Systems
- Persona
- Socure
- Sumsub
- ZOLOZ
- Image Capture and Verification
- Configuration and Reporting
- Implementation and Integration
- Data Management, Control, Privacy
- UX and Accessibility
- Scalability and Resiliency
- Risk and Frauds Controls
- External Sources and Verification
- KYC
- Fraud Detection
- Account Recovery
- Sensitive or Regulated
Note 1: Voluntary Product Accessibility Template (VPAT)
Critical Capabilities Methodology