search icon
Identify

Secure all transactions with identity verification

Identify is the first line of defense to deter fraudsters and secure all transactions. This easy-to-use tool provides the confidence that your customers are legitimate, their identity documents are genuine, and your transactions meet the highest standards for verification and security.

Two phones, one showing a photo of a license, the other showing a selfie being scanned for identity verification

Fraud is reaching unprecedented levels

No matter your industry, the best way to protect your business and your customers is by identifying users as early as possible in your process and reverifying them at every step.

HIRING

The hidden threat in your hiring process

5 min read
Proof
Fraud

$81B in fraud is caused by forged documents and identity theft

17 min read
FINCEN
Housing

Fraud in homebuying represents a $30 trillion problem

9 min read
Proof

Start with Identify to secure your business

Start with Identify and transact with confidence. Share an Identify request with your customers, prompting them to complete the authentication steps you’ve selected. Once complete, you’ll gain access to a Proof identity report detailing indicators of success and potential fraudulent activity.

Identify system UIIdentify system UI
QR code to share an Identify request

Flexible request options

Easily distribute Identify requests via QR code, allowing your customers to complete steps from their mobile device. You may also send individual Identify requests to your recipients.

A list of credential analysis checks, some of which have failed

Robust verification checks

With every step of the Identify process, Proof is running a robust system of checks. This combination of checks validates the integrity of the credential or selfie.

Phone with a video call between your customer and a trusted agent

Fallback to trusted agent

If users fail IAL2 identity verification, they will be routed to an on-demand fraud agent to determine if the identity is genuine.

Proof identity report

Proof identity report

Instantly receive back a Proof identity report documenting the results of the Identify request. This serves as a record of truth for each of your customers.

Built to secure trust across all use cases

From start to finish, Identify is your layer of protection throughout the transaction life-cycle. Use in silo, such as ahead of an account opening, wire authorization or new hire workflow, or pair Identify with electronic signature(s) and notarization to secure documents to a proven identity.

home and a building icon

Seller-side closings

Protect against illegitimate property sales by confirming sellers' identities

user with a plus sign icon

New account openings

Ensure a high standard of identity verification, supporting compliance with KYC and AML

document being edited icon

Loan applications

Increase security on loan applications without complicating the applicant experience

money exchange icon

Wire authorizations

Share wire transfer information and verify account details prior to authorization

gavel icon

Durable power of attorneys

Streamline the process of appointing an investment advisor or managing an estate

briefcase icon

Verified hiring

Vet and onboard new employees with confidence

Two coworkers looking at a laptop
Datasheet

Learn more about using Identify to reduce your company’s risk

search icon
Identify
+
shield icon
Defend

Security without friction

Pairing Identify with Defend gives you greater peace of mind without creating additional work for your customer. Defend provides access to 150+ behavioral risk signals that are run silently in the background while your customer completes their transaction. Each customer interaction will be assigned a low, medium or high risk value to help you evaluate whether to move forward with that transaction.

Identities table highlighting a high risk user

Identify is part of one unified platform

The Proof℠ platform provides multiple solutions to secure every interaction across the customer lifecycle.

Solutions for every transaction
Cross-platform fraud Detection
Company-wide Enterprise tooling
checkmark icon
AICPA SOC 2
checkmark icon
IAL2 Certified by Kantara Initiative
checkmark icon
MISMO Certified
checkmark icon
WCAG Level AA Compliant
checkmark icon
WebTrust Audited