MOBILE APP SECURITY STEP UP

  • Mobile banking & healthcare applications
  • Compliant protection of financial access, personal information
  • Two-factor authentication contexts
  • Zero-effort user experience & reassuring ceremony
  • Resists nation-state level & DIY attacks

PASSWORD RESET

  • Enable users to securely change their login credentials without having to remember anything
  • Protection from forged replicas and replay attacks for every password reset attempt
  • Reduction of customer support costs

KYC & ONBOARDING

  • Confirmation of ID document ownership by remote users, for KYC, onboarding and e-border applications
  • Face matching to ID document image captured through NFC or optical reads
  • Supports financial institutions’ compliance with KYC and AML regulations
  • Reduction of operational costs and increased accessibility with a digital en-to-end onboarding process

IN-BRANCH AUTHENTICATION

  • Alternative to PIN access for ATM and counter transactions
  • Highly accessible solution, especially for senior customers
  • Suitable for ATMs
  • Simple for branch counter staff to execute

CONTACT CENTER CALL/CHAT

  • ID check customers for inbound/outbound calls
  • Greatly improved user experience, shorter call times and high levels of compliance
  • Contact centre agent can remotely start/alert app on consumer’s device
  • Fully integrated with technology from major call centre vendor

REMOTE PARTNER ACCESS

  • ... to internal IT systems for contractors & outsourced staff, brokers, resellers, customers with admin rights
  • ... to sensitive systems/data for non-employees
  • Reduces reliance on partner security
  • Limited demands on partner
  • Central activity logging provides clear visibility of activity and attempted attacks

REMOTE EMPLOYEE ACCESS

  • Remote employee VPN access or login to corporate network/systems from home
  • Stop sys admin credential sharing
  • Faster change programmes result from lower employee resistance
  • Lower risk result from zero hardware distribution
  • Employee credential cannot be compromised accidentally or intentionally

PRIVILEGED ACCESS CONTROL

  • High assurance that only specific individuals can gain access
  • When it is essential to prevent credential sharing or use of stolen credentials
  • ...for WID management root functions, ICT Administrator access, board-level information access, access to Sensitive Personal Data
  • Proof against device tampering or compromise

Use cases

OCCASIONAL ACCESS TO ONLINE ACCOUNT

  • Ideal for infrequently visited services (less than once per month) or use by older consumers
  • Users can access their account without remembering seldom-used passwords, reusing passwords that are sensitive elsewhere, locking themselves out and failing to transact
  • Optimised the user experience
  • Securely protects the service provider

PHYSICAL ACCESS CONTROL

  • User asserts their identity by any means (e.g. ID number tapped on keypad) & then iProov confirms their assertion
  • Supports installed capture device & authentication via user’s own device
  • Tamper resistance not required for security
  • Resilient to attempts by unsupervised user to gain unauthorised access
  • Use to improve cell tower access security

AUTHENTICATION OF CUSTOMER - NOT - PRESENT PAYMENT TRANSACTIONS

  • ...for returning users, risk reduction without Verified-by-Visa/Securecode
  • Online or mobile commerce payment transactions
  • High level of confidence in authenticity of user presenting payment instrument
  • Increased transaction conversion rate