Jumio CTO Paints A Portrait Of ‘IDV Nirvana’
PYMNTS
MAY 15, 2018
Since this requires a secondary token, it can be a strong deterrent for fraudsters – but it can also act as a deterrent for legitimate customers due to its slow and cumbersome nature. But since IDs can be stolen, additional layers of security may be necessary. Data tagging is how ground truth is established.
Let's personalize your content