Entering the Virtual World With Identity Verification
- LANGUAGE: English DATE: Tuesday, December 15, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
The way consumers access products and services across sectors has changed forever as interactions move from physical to digital engagement. What started as a change born from convenience, is now a necessity and solidifying into a long-term behavioural shift. As consumers choose to access more goods and services digitally than ever before, it is essential that organisations meet users’ expectations of instant and convenient transactions, or risk losing customers to more customer centric online competitors.
As businesses accelerate digital transformation initiatives to enable online customer onboarding at scale, digital identity verification becomes pivotal to knowing who they’re doing business with online. An identity strategy is essential in providing protection against fraud, increasing conversion rates, and providing a smoother user experience.
Join this webinar to discuss:
- How digital identity is enabling businesses to meet customer expectations in an online world
- How acquisition strategies need to evolve to drive growth
- How to become digital-first, without inviting additional fraud
- The importance of approved and accredited vendors
Anne Bailey, Analyst at KuppingerCole, will talk about the rise of digital identity, challenges that enterprises are facing, and digital identity’s role in shaping digital transformation.
She will be joined by Oliver Krebs, VP of Central EMEA region at Onfido, who will discuss the use cases driving the future of digital identity.
Onfido is building the new identity standard for the internet. Our AI-based technology assesses whether a user’s government-issued ID is genuine or fraudulent, and then compares it against their facial biometrics. That’s how we give companies like Revolut, Zipcar and Bitstamp the assurance they need to onboard customers remotely and securely. Our mission is to create a more open world, where identity is the key to access.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.