ACUANT BLOG

Creating a Winning Identity Verification Experience for Operators

In the gaming industry, creating a smooth onboarding process which is both robust and efficient is no mean feat, especially with increasingly strict KYC & AML laws. But, there are ways you can employ smarter methods of identity verification to...

READ MORE

Fighting First-Party Fraud by Monitoring Customer Risk

First-party fraud is when individuals—for their own purposes or on behalf of others—using a real or synthetic identity enter an exchange of some sort for goods or services without intending to follow through on the future payment(s). This can include...

READ MORE

The Future of Identity in Gaming

The gaming landscape has changed dramatically over the past 12 months with more traditional players having to opt for online services. Moving further into the digital space means gaming and gambling is now done in real-time. However, the identity verification...

READ MORE

What is Bayesian Belief? A Dummies Guide

At Acuant, we use various advanced analytics techniques to derive meaningful insights from unstructured data. Bayesian Belief Networks are one of techniques we use in our models and here, we will explore just what they are. (more…)

READ MORE

Which is the Most Secure Authentication Method for Your Business?

The more efficient your methods of onboarding customers, the faster your business will experience growth, but speed is only one aspect of authentication. To ensure your processes are safe, compliant and only allow ‘good’ customers through, security is paramount. But...

READ MORE

Why No Code Tech Is A Game-Changer For Identity Proofing In The Era Of Digital Transformation

Glenn Larson is the Vice President of Engineering at Acuant and a member of the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives. Read his article for the Forbes Technology Council below, or find the original...

READ MORE

The Difference Between Fakes, Forgeries and Counterfeits

Whether a document is a fake, forgery or counterfeit, none of them should be used to verify a customer’s identity. Here, we will explore the difference between the terms and what they mean in practice when referring to falsified identity...

READ MORE

Introducing My Digital ID from Acuant | Debuting in Microsoft Azure AD Verifiable Credentials

Verify Once, Use Everywhere As announced at Ignite, Microsoft is breaking ground to introduce verifiable credentials in Azure Active Directory, encouraging the adoption of a Zero Trust approach in the wake of today’s increasing fraud landscape. Acuant was chosen as...

READ MORE

Infamous Fraudsters Series: Charles Ponzi

The landscape of fraud is constantly evolving as criminals continually develop new ways to attack businesses and customers. Millions of people are affected by fraud every year and it is estimated that in 2019, criminals made $4.2 trillion from fraudulent...

READ MORE

How to Protect Your Business and Comply with AML Regulations in LATAM

Money laundering is a significant issue faced by banks and other financial institutions, particularly in the Latin American regions. To counteract this fraudulent behavior, governments are being more proactive in their countermeasures against money laundering and exploitative practices, by introducing...

READ MORE

Solving KYC Challenges for FinTech Startups

Knowing your ideal customer is one of the most fundamental aspects of starting any business, but for those in the financial sector, it’s a regulatory requirement. (more…)

READ MORE

Crypto Casinos: A Gateway to The World of Crypto

Things move quickly in the world of cryptocurrency and the value of assets like Bitcoin have recently risen to their highest price in years. When markets continually experience price hikes of the like we’ve seen recently, investors can feel they...

READ MORE

Questions?

Let's Talk