With leading research company Juniper predicting a “fraud tidal wave,” Indicio’s authenticated biometric credential solution is a simple, powerful, cost effective defense against synthetic identity fraud and deepfakes while also streamlining account access, mobile,...
SEARCH FOR ANY TOPICS HERE
Five sessions not to miss at Identity Week America
Identity Week is the place to learn about the latest in identity technology. Whether you are attending on behalf of a large enterprise, government agency, or small business, this is your chance to see what others are doing and what is coming next in the industry. Here...
Portable Authenticated Biometrics 101
Portable Authenticated Biometrics are the future of Biometric Authentication, one where you can use your biometric information across platforms and services. Learn how this powerful new technology allows users to hold their sensitive biometric information securely on...
Virtual identity verification in Finance
In a recent Indicio Meetup, Elijah Levine, CEO of Black Mountain, Indicio CEO Heather Dahl, and CTO Ken Ebert discussed the digital transformation of banking and finance, driven not only by decentralization and digital assets, but by consumer preference for mobile...
Indicio, SmartSearch and Socure reach new deals in AML, KYC and KYB
Biometric Update
Regula and Indicio Partner to Transform Identity Verification With Verifiable Credentials
Business Wire
Indicio enters Bank Mountain partnership to revolutionise KYC for the financial and legal industries
Identity Week
Indicio and Black Mountain Investment Group Partner to Modernize KYC and Digital Identity Verification for Exchanges, Banks, and Law Firms
Street Insider
Indicio and Black Mountain Investment Group Partner to Modernize KYC and Digital Identity Verification for Exchanges, Banks, and Law Firms
Digital Journal
How to use Proven Auth with your existing identity provider
Traditional identity providers allow you to configure access across your organization in a variety of ways, including passwords, multi- factor authentication, or logging in with a google account. Proven Auth adds a fourth option in the form of tamper-proof Verifiable...