jumio.pathfactory.com Open in urlscan Pro
3.211.42.135  Public Scan

Submitted URL: https://go.jumio.com/e/296082/-1-x-VWekZv-lb-email-0emailurl/5d94lg/526272681/mohammed.bebo%40gib.com?h=Bl9Ngwvy4rWpY...
Effective URL: https://jumio.pathfactory.com/c/jumio-authentication-1?x=VWekZv
Submission: On December 13 via manual from SA — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Thumbnails Document Outline Attachments Layers

Current Outline Item


Previous

Next
Highlight All Match Case
Match Diacritics Whole Words

Color
Size
Color
Thickness
Opacity
Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 24
Presentation Mode Open Print Download Current View

FreeText Annotation Ink Annotation

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

1
Identity Proofing
& Authentication
The Inevitable Collision of

2
No one likes having their online movements tracked. But, advertisers routinely
track our internet habits
across our devices — phone, tablet, laptop — to know where we habitually go,
shop, and what kind of
websites we visit. Worse still is having those advertisers profit from that
information when they sell it to
third parties without our consent.
The other side of the anonymity coin.
Online businesses increasingly need to know who they’re dealing with online. Are
the people creating new
accounts who they claim to be? Is the person transferring $10,000 to a Swiss
bank account who she claims
to be? As services, commerce, communications and socializing shift online,
identifying each other digitally
has become increasingly important.
In some cases, businesses are required to know the real person behind an
account. Know Your Customer
(KYC) is the process of a business verifying the identity of its clients and
assessing potential risks of illegal
intentions for the business relationship. KYC is also used to refer to the bank
regulations and anti-money
laundering regulations which govern these activities. KYC processes are employed
by companies of all
sizes for the purpose of ensuring their proposed agents, consultants or
distributors are anti-bribery
compliant. Banks, insurers and export creditors increasingly demand that
customers provide detailed anti-
corruption due diligence information.
But the internet’s level of openness means the barrier to entry on a wide
variety of online platforms isn’t
just low for users, but for bots and bad actors as well.
Once upon a time,
the internet was a more anonymous space.
Most website visitors aren’t humans, but are instead bots — or, programs built
to do automated tasks. They
are the worker bees of the internet, and also the henchmen.
Overall, bots — good and bad —
are responsible for
52% of web traffic.
Imperva Incapsula Bot Traffic Report, January 2017























More Information Less Information
Close

Enter the password to open this PDF file.

Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel

Next 
Next 

About Jumio - 2 Minute Explainer | Video
Are your online customers really who they say they are? This is the question
Jumio answers. Jumio's aim is to eradicate online identity fraud with
industry-leading AI-driven identity solutions, highlighted by face-based
biometrics, certified liveness detection, computer vision technology, automated
AML screening and selfe-based authentication. Jumio’s end-to-end identity
verification solutions are trusted by leading brands, across industries and
around the globe to know and trust their customers online.
LinkedIn LinkTwitter LinkFacebook LinkDownload Link
The Inevitable Collision of Identity Proofing & Authentication | eBookpdf
About Jumio - 2 Minute Explainer | Videovideo
AI-Powered Identity Verification 2 Minute Explainer | Videovideo
5 Ways It Pays to Go Beyond ID-Only Verification | Blogwebpage
How Identity Proofing Anchors Okta’s Customer Identity | Blog Postwebpage
10 Compelling Reasons to Consider Selfie-Based Authentication |
Infographicwebpage
Jumio Authentication 2 Minute Explainer | Videovideo
KYC Compliance for Online Identity Verification | Videovideo
Identity Verification - Know the True Identity of Your Customers | Datasheetpdf
The Harsh Reality of Account Takeover Fraud | Infographicwebpage

May we use cookies to track your activities? We take your privacy very
seriously. Please see our privacy policy for details and any questions.
Yes No