AI-powered identity verification with document verification, facial biometrics, liveness detection, and fraud prevention. Offers automated KYC checks, customizable verification flows, risk scoring, and detailed analytics with compliance reporting.
Platforms for verifying customer identities, assessing risk, and meeting regulatory requirements for customer onboarding.
More Know Your Customer (KYC)
More Compliance ...
Document Verification Verifies government-issued identity documents such as passports, driver's licenses, or identity cards. |
Product description states it performs document verification as part of KYC. | |
Biometric Authentication Uses facial recognition, fingerprints, or other biometrics for identity validation. |
Facial biometrics as described in product notes; platform supports facial recognition. | |
Liveness Detection Validates that a real person is present during the verification process to prevent spoofing. |
Liveness detection explicitly mentioned in product capabilities. | |
Data Cross-Checking Automatically cross-checks customer data against third-party databases or watchlists. |
Product offers automated KYC checks indicating cross-referencing with third-party data. | |
Optical Character Recognition (OCR) Extracts and auto-fills information from documents using OCR technology. |
AI-powered OCR is referenced as part of the automated verification process. | |
Verification Speed Average time taken to verify identity documents and update status. |
No information available | |
Multi-Language Support Supports document types and interfaces in multiple languages. |
The platform supports multiple languages as required for global compliance. | |
Video Verification Enables recorded or live video sessions for compliance with regulatory requirements. |
Live video-based KYC is mentioned in various Veriff documentation/use cases. | |
Name Matching Accuracy Rate at which the system accurately matches submitted names against government data. |
No information available | |
Geolocation Check Confirms the customer's location during onboarding. |
No information available |
Automated Risk Scoring System assigns risk scores based on customer profiles and behaviors. |
Risk scoring is highlighted as a product feature. | |
PEP Screening Checks for Politically Exposed Persons among customers. |
PEP (politically exposed person) screening is standard in enterprise KYC/AML solutions like Veriff. | |
Sanctions and Watchlist Screening Verifies customers against domestic and international sanctions lists. |
Sanctions and watchlist checks are part of automated KYC checks. | |
Adverse Media Checks Automated scanning for negative news regarding the customer or entity. |
Adverse media checks mentioned as part of fraud and risk prevention suites. | |
Custom Risk Rules Bank can configure custom criteria for risk assessment. |
Customizable verification flows allow banks to set their own risk rules. | |
Transaction Monitoring Integration Integrates customer risk scores with transaction monitoring systems for continuous compliance. |
Veriff integrates with customer risk/AML monitoring solutions. | |
Ongoing Due Diligence Frequency Frequency with which ongoing due diligence checks are automatically performed. |
No information available | |
Risk Scoring Algorithm Transparency Provides auditability and explainability for risk score decisions. |
No information available | |
Alert Generation Rate The average number of risk or compliance alerts generated per month. |
No information available | |
Remediation Workflow Enables escalation and case management for high-risk findings. |
The platform supports remediation and escalations for high-risk findings. |
Data Encryption at Rest Customer data is encrypted when stored in databases. |
Veriff states data encryption at rest for customer protection and compliance. | |
Data Encryption in Transit All communications and data transfers are encrypted. |
Encryption of data in transit via TLS or equivalent is listed as standard compliance. | |
Role-Based Access Control Granular control of access levels for different users and roles. |
Role-based access control is listed under platform security capabilities. | |
Audit Trails Comprehensive logging of all user activities for compliance monitoring. |
Audit trail functionality mentioned for compliance and monitoring. | |
Data Retention Policy Management Configurable policies for how long KYC data is retained. |
Data retention policies are configurable in the compliance settings. | |
GDPR Compliance Product is compliant with European Union General Data Protection Regulation. |
GDPR compliance is promoted on the Veriff website as a key differentiator. | |
Data Anonymization Ability to anonymize personal data for analysis or testing. |
Data anonymization features referenced for testing and analytics usage. | |
Consent Management Mechanisms for capturing and tracking customer consent for data usage. |
Consent management is provided for regulatory compliance and audit readiness. | |
Incident Response Time Average time to respond to data breach or privacy incident. |
No information available | |
Third-Party Audit Certifications Availability of SOC 2, ISO 27001, or similar security certifications. |
Veriff has obtained third-party certifications (e.g., ISO 27001 as claimed on website). |
Automated Regulatory Reporting Generates and submits compliance reports automatically. |
Automated compliance reporting highlighted as part of analytics and reporting modules. | |
Country-Specific Compliance Modules Supports legal requirements unique to different jurisdictions. |
Country-specific compliance referenced in documentation for multi-jurisdictional KYC. | |
Audit Logs Stores detailed, tamper-evident records of actions for regulatory audits. |
Detailed audit logs maintained as part of platform accountability controls. | |
Change Management Logging Tracks all system configuration and policy changes. |
System changes, workflow configurations, and policy changes are logged for compliance. | |
Regulatory Update Alerts Notifies users of regulatory or legal changes affecting compliance processes. |
No information available | |
SAR/CTR Filing Automation Supports Suspicious Activity Report (SAR) and Currency Transaction Report (CTR) generation and filing. |
Product supports SAR/CTR automation for banking and regulated industries compliance. | |
Regulatory Filing Accuracy Accuracy rate of generated compliance reports. |
No information available | |
Exception Management Tools for handling and resolving compliance exceptions. |
No information available | |
Compliance Dashboard Central dashboard displaying current regulatory status and key compliance metrics. |
Compliance dashboard and analytics referenced in marketing and product documentation. | |
E-signature Support Allows digital signing of regulatory documents. |
E-signature support for regulatory documents noted in customer onboarding features. |
Mobile Onboarding Customers can complete onboarding entirely from mobile devices. |
Mobile onboarding process is a highlighted feature on Veriff's product pages. | |
Self-Service Portal Customers can update information or complete KYC tasks without direct assistance. |
Self-service KYC portal is included in the standard user journey. | |
Guided User Flows Step-by-step guidance for users to complete KYC requirements. |
Guided user flows enabled through customizable journeys. | |
Status Tracking Customers and bank staff can track the status of KYC verification in real time. |
Status tracking is real time for both customer and compliance agent dashboards. | |
Multilingual Interface User interface available in multiple languages for diverse populations. |
Multilingual interface available for global customers. | |
Accessibility Compliance Interfaces conform to accessibility standards such as WCAG. |
Platform claims compliance with accessibility standards. | |
Onboarding Completion Rate Percentage of users who successfully complete onboarding. |
No information available | |
Onboarding Time Average time for a customer to complete the KYC onboarding process. |
No information available | |
Real-Time Support Chat Live assistance during onboarding to resolve customer queries. |
Real-time customer support/chat advertised as part of the user experience. | |
Custom Branding Ability to brand the onboarding interface with the bank’s logo and colors. |
Custom branding for onboarding journeys offered as a feature. |
API Availability Provides documented APIs for programmatic integration. |
APIs are documented for integration with client systems (Cloud, Web, Mobile). | |
Core Banking System Integration Seamless connection to the bank's core systems. |
Core banking integration offered via REST APIs and integrations team. | |
Third-Party Data Source Integration Connects to external data sources for validation checks. |
Third-party integration for data validation is part of marketing descriptions. | |
Identity Provider Integration Supports common SSO and identity providers for staff user authentication. |
Supports SSO and staff identity provider integration for enterprise clients. | |
Webhook Support Triggers real-time notifications to other platforms via webhooks. |
Webhooks for integration are supported as part of enterprise offerings. | |
Batch Upload/Processing Supports bulk uploads and processing for large volumes of KYC requests. |
Bulk upload and processing supported for customer/KYC onboarding. | |
Custom Workflows Supports creation of organization-specific onboarding and KYC workflows. |
Custom (customer-specific) workflows and logic are part of the platform setup. | |
Data Export Options Multiple export formats (CSV, XML, JSON) for KYC data. |
Multiple export options (CSV, JSON, etc) for KYC reporting available. | |
Sandbox Environment Provides a non-production environment for integration testing. |
Test/sandbox environment is offered for API/customer integration testing. | |
Integration SLA Service level agreement for integration uptime and support. |
No information available |
Synthetic Identity Detection Detects attempts to create accounts with fabricated identities. |
Synthetic identity detection is highlighted under fraud prevention. | |
Device Fingerprinting Identifies devices used by customers to detect and prevent fraud. |
Device fingerprinting described among security and fraud detection tools. | |
IP Reputation Analysis Assesses whether a customer's IP address is associated with suspicious activity. |
IP reputation analysis is part of fraud & risk detection suite features. | |
Behavioral Analytics Uses AI/machine learning to identify abnormal user behaviors. |
AI/ML-based behavioral analytics called out for fraud and account takeover prevention. | |
Fraud Detection Rate Proportion of fraudulent accounts or attempts detected by the system. |
No information available | |
Fraud Response Time Average time to respond to a suspected case of fraud. |
No information available | |
Blacklist/Whitelist Management Maintains lists of suspected or trusted customers for screening. |
Blacklist/whitelist maintenance for fraud checks mentioned on product site. | |
Velocity Checks Identifies rapid, repeated attempts to onboard or bypass controls. |
Velocity checks are a standard part of fraud detection and are referenced in documentation. | |
Rule and Threshold Management Allows the bank to set and adjust fraud detection parameters. |
Customizable rule and threshold management described for fraud detection. | |
Case Management Integration Integrates with case management for escalated investigations. |
Case management integration, including escalation, available for advanced users. |
Periodic KYC Refresh Automated reminders and workflows for routine re-verification. |
Periodic KYC refresh and reminders listed under compliance automation. | |
Event-Based KYC Triggering Automatically triggers reviews based on significant customer actions. |
Event-based triggers for re-verification highlighted as automations. | |
Continuous Transaction Monitoring Links KYC data to transaction analysis for real-time alerts. |
Continuous transaction monitoring is referenced for regulatory use cases. | |
Change Detection Detects and flags changes to customer information. |
Change detection for customer KYC data and audit mentioned in compliance sections. | |
Ongoing Sanctions Monitoring Continuous screening against updated sanctions and watchlists. |
Ongoing sanctions/watchlist monitoring is standard in the product. | |
Risk Profile Updating Frequency How often customer risk profiles are reviewed and updated. |
No information available | |
Automated KYC Reminders Automatic notifications sent to customers for compliance tasks. |
Automated KYC reminders are included in communication automation. | |
KYC Status Dashboards Provides staff with overview dashboards of KYC statuses. |
Dashboards for KYC status provided for compliance staff. | |
Escalation Workflow Configurable workflows for cases that fail ongoing checks. |
Configurable escalation workflows referenced for compliance failures. | |
Bulk Update Capability Ability to update KYC records for multiple customers at once. |
Bulk update capabilities for KYC records referenced in admin features. |
Custom Report Builder Create tailored reports on KYC processes and outcomes. |
Custom report building highlighted in analytics suite. | |
Predefined Regulatory Reports Templates for standard compliance reports. |
Standard regulatory reports available as templates. | |
Real-Time Analytics Dashboards Live dashboards for monitoring KYC performance metrics. |
Real-time analytics dashboards highlighted in product and marketing materials. | |
Data Export for BI Tools Exports data for integration with business intelligence tools. |
Integration with BI tools through export capabilities. | |
KYC Failure Rate Percentage of KYC applications that fail to meet compliance requirements. |
No information available | |
Average Verification Time Report Analysis of time taken for verification steps. |
Reports and metrics on verification times available in analytics. | |
Trend Visualization Visualizes changes in KYC-related KPIs over time. |
Trend visualization features in the reporting dashboard. | |
Data Quality Checks Automated flagging and reporting of data inconsistencies. |
Data quality checking and flagging referenced in data validation processes. | |
User Audit Logs Exportable activity logs for user actions. |
User audit logs can be exported for compliance team review. | |
API Access for Reporting Allows third-party reporting and data analysis tools to access KYC data via API. |
API access for external reporting tools is confirmed in the API documentation. |
Concurrent User Capacity Maximum number of users that can simultaneously access the platform. |
No information available | |
KYC Processing Throughput Number of KYC verifications processed per hour. |
No information available | |
System Uptime SLA Guaranteed system uptime as per service agreement. |
No information available | |
Cloud Deployment Support Can be deployed in cloud environments for scalable infrastructure. |
Cloud infrastructure support mentioned to provide scalability. | |
Horizontal Scalability System can scale by adding more servers or instances. |
Product supports horizontal scaling in cloud or on-prem deployments. | |
Disaster Recovery RPO Recovery Point Objective in case of disaster. |
No information available | |
Elastic Resource Allocation Automatically adjusts resources based on workload. |
Elastic resource allocation included in platform architecture overview. | |
Load Balancing Distributes workload evenly across system resources. |
Load balancing referenced in technical platform description to manage workloads. | |
Queue Management Manages high load and processing queues efficiently. |
Queue management enables prioritization during high verification volumes. | |
Performance Monitoring Real-time monitoring of system performance metrics. |
Performance monitoring provided for technical and compliance staff. |
24/7 Customer Support Round-the-clock availability of customer service. |
24/7 support indicated in platform customer service offerings. | |
Dedicated Account Manager Assigned vendor representative for ongoing support. |
Enterprise customers receive dedicated account managers as stated on website. | |
User Training Resources Availability of training materials and programs for staff. |
Comprehensive user training resources and onboarding guides available. | |
Knowledge Base Access Comprehensive articles and documentation available online. |
Knowledge base and support documentation available online. | |
Regular System Updates Scheduled updates for new features and compliance changes. |
FAQs and customer communications highlight regular platform updates. | |
Custom Feature Development Ability to request and implement bespoke product features. |
Custom/bespoke functionality can be requested for enterprise contracts. | |
Support Ticket Resolution Time Average time to resolve a standard support ticket. |
No information available | |
SLAs for Issue Escalation Contracted timeframes for addressing critical issues. |
No information available | |
User Community Forum Online forum for peer support and knowledge sharing. |
User community for knowledge sharing referenced in external review platforms. | |
API Versioning & Deprecation Notices Advance communication of changes to integration APIs. |
Advance API versioning and deprecation notices available in technical documentation. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.