Enterprise Security Platform Embraces Passkeys
Nok Nok Labs has launched the latest version of its flagship S3 Authentication Suite, delivering four new capabilities for the platform. One of the new […]
Nok Nok Labs has launched the latest version of its flagship S3 Authentication Suite, delivering four new capabilities for the platform. One of the new […]
“These new capabilities will offer greater integration flexibility for our customers that will enable them to integrate our S3 Suite with the use of their […]
Intellicheck has released an updated version of its flagship document and identity verification platform. The Intellicheck Platform 2.0 improves on its predecessor’s document and facial […]
Neurotechnology has announced a much-improved version of its Face Verification solution featuring enhanced algorithms and support for web-based applications. Face Verification 12, which comprises streamlined […]
iDenfy continues to enhance its identity verification platform. The Lithuania-based company has announced a new NFC tool to further enhance the platform’s identity document-reading capabilities. […]
Okta has moved forward with a major redesign of its Okta End User Dashboard. The updated Dashboard is 50 percent faster than its predecessor, and […]
HYPR has released the latest iteration of its flagship Cloud Platform. Version 6.7 comes with some basic security and performance improvements, and also introduces a […]
“Knomi D is the version of the solution aimed at on-device biometric matching, meaning there is no need for the user’s biometrics to be compared […]
Buguroo has upgraded its flagship behavioral biometrics platform to help financial institutions spot (and stop) New Account Fraud. The enhanced bugFraud can be used in […]
“We are making it much easier for enterprises to deploy voice biometrics on all channels using the programming tools they prefer…” ID R&D has released […]
“Administrators will now be able to assign particular policies for their end users in the event of revoked account access, and to leverage different authentication […]
“The system’s operation has also been streamlined, with new threat detection algorithms having reduced the number of end user interactions needed to recognize individuals and […]
Follow Us