Is It Time to Ditch Passwords Once and for All?

Speed and security have become of paramount importance for any business dealing with customer data. Customers want to be able to access their accounts and services as soon as possible, but they expect their information to remain safe and secure...


Creating a Winning Identity Verification Experience for Operators

In the gaming industry, creating a smooth onboarding process which is both robust and efficient is no mean feat, especially with increasingly strict KYC & AML laws. But, there are ways you can employ smarter methods of identity verification to...


Fighting First-Party Fraud by Monitoring Customer Risk

First-party fraud is when individuals—for their own purposes or on behalf of others—using a real or synthetic identity enter an exchange of some sort for goods or services without intending to follow through on the future payment(s). This can include...


The Future of Identity in Gaming

The gaming landscape has changed dramatically over the past 12 months with more traditional players having to opt for online services. Moving further into the digital space means gaming and gambling is now done in real-time. However, the identity verification...


What is Bayesian Belief? A Dummies Guide

At Acuant, we use various advanced analytics techniques to derive meaningful insights from unstructured data. Bayesian Belief Networks are one of techniques we use in our models and here, we will explore just what they are. (more…)


Which is the Most Secure Authentication Method for Your Business?

The more efficient your methods of onboarding customers, the faster your business will experience growth, but speed is only one aspect of authentication. To ensure your processes are safe, compliant and only allow ‘good’ customers through, security is paramount. But...


Why No Code Tech Is A Game-Changer For Identity Proofing In The Era Of Digital Transformation

Glenn Larson is the Vice President of Engineering at Acuant and a member of the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives. Read his article for the Forbes Technology Council below, or find the original...


The Difference Between Fakes, Forgeries and Counterfeits

Whether a document is a fake, forgery or counterfeit, none of them should be used to verify a customer’s identity. Here, we will explore the difference between the terms and what they mean in practice when referring to falsified identity...


Introducing My Digital ID from Acuant | Debuting in Microsoft Azure AD Verifiable Credentials

Verify Once, Use Everywhere As announced at Ignite, Microsoft is breaking ground to introduce verifiable credentials in Azure Active Directory, encouraging the adoption of a Zero Trust approach in the wake of today’s increasing fraud landscape. Acuant was chosen as...


Infamous Fraudsters Series: Charles Ponzi

The landscape of fraud is constantly evolving as criminals continually develop new ways to attack businesses and customers. Millions of people are affected by fraud every year and it is estimated that in 2019, criminals made $4.2 trillion from fraudulent...


How to Protect Your Business and Comply with AML Regulations in LATAM

Money laundering is a significant issue faced by banks and other financial institutions, particularly in the Latin American regions. To counteract this fraudulent behavior, governments are being more proactive in their countermeasures against money laundering and exploitative practices, by introducing...


Solving KYC Challenges for FinTech Startups

Knowing your ideal customer is one of the most fundamental aspects of starting any business, but for those in the financial sector, it’s a regulatory requirement. (more…)

Acuant is now a GBG cmpany Acuant is now a GBG company


Let's Talk