Use Cases
Authentication
Biometric identity
Multi-factor
Can’t be stolen or shared
Anti-Fraud
Detects atypical behaviors
Forensics and reports
Real time alerts
ID Proofing
Confirm real world identity
Verify government photo ID
Tie legal identity to biometric
Authorization
High value transactions
Payments and purchases
Signature verification
Use Cases
Authentication
Biometric identity
Multi-factor
Can’t be stolen or shared
Anti-Fraud
Detects atypical behaviors
Forensics and reports
Real time alerts
ID Proofing
Confirm real world identity
Verify government photo ID
Tie legal identity to biometric
Authorization
High value transactions
Payments and purchases
Signature verification