Veridas, the Spanish technology company specialising in digital identity and biometrics announced it has once again been included in the Gartner Market Guides for Identity Verification and User Authentication.

The Gartner Market Guides include definitions, benefits, key findings, and recommendations for organisations looking to implement and utilise both User Authentication and Identity Verification technologies for security, risk management, and fraud prevention.

User authentication

As defined in the Market Guide for User Authentication, “User authentication is used to provide credence in an identity claim for a person already known to an organisation."

"The credence must be sufficient to bring account takeover (ATO) risks within the organisation’s risk tolerance. Without effective authentication, the security of and trust in that person’s digital interactions are deeply undermined.

DEI considerations

IAM pioneers should also pay attention to socioeconomic bias, especially about the acceptability"

When discussing the market direction for User Authentication, the Market Guide states “IAM pioneers (and everyone else) should also reflect diversity, equity, and inclusion (DEI) considerations."

"To avoid impairing security, as well as UX, IAM pioneers should choose methods that are equitable across different clines. IAM pioneers should also pay attention to socioeconomic bias, especially about the acceptability and possession of different authenticators.

Biometric technology

We think the Market Guide touches on the drastic difference in utilisation of biometric technology when socioeconomic bias is ignored. At Veridas, our roots are firmly planted in the idea that users should not suffer to authenticate themselves, they should be able to do so freely and entirely as they are,” said Eduardo Azanza, CEO, of Veridas.

For this reason, we urge biometric adopters to explore a range of biometric tools, such as Face and Voice biometrics, to best support their users.”

Identity Verification

Identity verification capabilities, delivered as SaaS or on-premises, assure that a real-world identity exists"

Additionally, in the Gartner Market Guide for Identity Verification, Identity Verification is defined as “the combination of activities during a remote interaction that brings a real-world identity claim within organisational risk tolerances."

"Identity verification capabilities, delivered as SaaS or on-premises, assure that a real-world identity exists and that the individual claiming the identity is its true owner and genuinely present during a remote interaction.”

Improving security and/or UX

For security and risk management pioneers who focus on identity and access management, the Gartner Market Guide for Identity Verification recommends pioneers “Investigate if multiple use cases exist within your organisation where the technology can improve security and/or UX both across workforce and customer interfaces. Examples include:

  • Customer use cases such as automating Know Your Customer (KYC) processes, preventing identity fraud during application processes, and increasing trust between buyers and sellers on marketplaces.
  • Workforce use cases such as remote hiring, onboarding, and ensuring the integrity of credentialing and account recovery processes.”

Common layers of defence

Active techniques typically involve asking the user to act, such as turning their head or smiling"

The Gartner Market Guide for Identity Verification additionally highlighted common layers of defences for both presentation and injection attacks, including Liveness detection, defined as “Active or passive techniques to assess genuine human presence before the selfie is taken."

"Active techniques typically involve asking the user to act, such as turning their head or smiling. Passive techniques may involve looking for micromovement in the face, 3D depth analysis, and changes in light reflection as blood flows under the skin and others.

Liveness detection

Liveness detection continues to drive organisations' trust and reliability in biometric technology,” said Eduardo Azanza, CEO, of Veridas. 

As deepfake attacks continue to increase, we can stop threat actors in their tracks with our easy-to-use and 100% proprietary technology.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?