2019 Market Guide for Identity Proofing & Corroboration

Get the Gartner report for an in-depth look at representative identity proofing solutions and key considerations.

Download the Guide

By submitting this form, you agree to the Privacy Policy of our website.

What You’ll Learn:

  • Data breaches have led to rampant compromise of personally identifiable information. This is why Gartner now recommends that organizations move away from identity proofing solutions that rely on shared secret verification, such as out-of-wallet knowledge questions, or memorable personal data.
  • According to Gartner, "There continues to be increased overlap between authentication, identity proofing and fraud detection use cases, leading to blurred lines in terms of internal responsibilities and vendor capabilities."
  • Modern enterprises should leverage fraud signals to corroborate a claim to a customer's real-world identity. They can be used not only for new customers (legacy identity proofing use cases) but also for returning customers.

Get to know the identity proofing market.

According to Gartner, "Seeking high confidence in the identity of customers continues to be an imperative. The identity of customers, both new and returning, can be proven with different degrees of confidence, depending on the effort and cost spent, and the use cases in question. There is usually no 'one-size-fits-all' approach." Written by Gartner, we believe this guide will help you understand identity proofing methods and some of the representative vendors to explore in this emerging category.

Lines are getting blurred.

The lines between online fraud detection, identity proofing and user authentication use cases are increasingly blurring with regard to the techniques that can be applied to increase trust in an identity assertion and better identify malicious or anomalous activity. Complete the form on this page for instant access to this valuable guide.