{"componentChunkName":"component---src-templates-tag-js","path":"/tags/identity-proofing/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":2,"edges":[{"node":{"fields":{"slug":"/growth/identity-proofing-orchestration-security/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In today's digital world, the demand for robust identity proofing solutions is greater than ever. As businesses strive to protect their systems from increasing cyber threats while maintaining a seamless customer experience, orchestration has emerged as a powerful tool.</p>\n<p>By integrating comprehensive identity proofing solutions through orchestration, companies can enhance security, improve compliance, and deliver a <a href=\"https://www.loginradius.com/customer-experience-solutions/\">smoother user experience</a>. Let’s understand the aspects of comprehensive identity-proofing solutions. </p>\n<h2 id=\"the-growing-need-for-identity-proofing\" style=\"position:relative;\"><a href=\"#the-growing-need-for-identity-proofing\" aria-label=\"the growing need for identity proofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Growing Need for Identity Proofing</h2>\n<p>With the rise of digital interactions, businesses face significant challenges in verifying the identities of users, customers, and employees. Cybercrime is rising, and organizations must protect sensitive information and prevent unauthorized access. This has made <a href=\"https://www.loginradius.com/blog/identity/identity-proofing/\">identity proofing</a> an essential component of modern business operations.</p>\n<p>Traditional identity verification methods, such as passwords and security questions, are no longer sufficient to combat sophisticated attacks. Businesses must adopt more advanced techniques that leverage biometric data, machine learning, and real-time analysis to ensure accurate and reliable identity verification.</p>\n<h2 id=\"what-is-orchestration-in-identity-proofing\" style=\"position:relative;\"><a href=\"#what-is-orchestration-in-identity-proofing\" aria-label=\"what is orchestration in identity proofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Orchestration in Identity Proofing?</h2>\n<p>Orchestration in identity proofing involves integrating various verification tools and processes into a single, cohesive platform. This approach allows businesses to automate and streamline identity verification tasks, making them more efficient and effective.</p>\n<p>By utilizing orchestration, companies can:</p>\n<ul>\n<li><strong>Automate Verification Processes:</strong> Streamline the identity-proofing process by automating routine checks and procedures, reducing manual intervention and human error.</li>\n<li><strong>Enhance Security Measures:</strong> Integrate multiple layers of security, such as biometrics, document verification, and device intelligence, to strengthen identity proofing efforts.</li>\n<li><strong>Ensure Compliance:</strong> Easily adapt to regulatory requirements across different regions by incorporating compliance checks into the orchestration workflow.</li>\n<li><strong>Improve User Experience:</strong> Deliver a seamless and frictionless experience for users by reducing the number of steps required for <a href=\"https://www.loginradius.com/blog/identity/digital-identity-verification/\">identity verification</a>.</li>\n</ul>\n<h2 id=\"benefits-of-comprehensive-identity-proofing-solutions\" style=\"position:relative;\"><a href=\"#benefits-of-comprehensive-identity-proofing-solutions\" aria-label=\"benefits of comprehensive identity proofing solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Benefits of Comprehensive Identity Proofing Solutions</strong></h2>\n<h3 id=\"1-enhanced-security\" style=\"position:relative;\"><a href=\"#1-enhanced-security\" aria-label=\"1 enhanced security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Enhanced Security</h3>\n<p>Comprehensive identity proofing solutions offer advanced security features that help businesses protect their digital assets and user data. By leveraging multiple verification methods, organizations can create a robust defense against identity theft and fraud. Orchestration allows these security measures to be applied consistently and automatically, reducing the risk of human error.</p>\n<h3 id=\"2-regulatory-compliance\" style=\"position:relative;\"><a href=\"#2-regulatory-compliance\" aria-label=\"2 regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Regulatory Compliance</h3>\n<p>Businesses must navigate a complex landscape of data protection and privacy regulations, such as GDPR, CCPA, and PSD2. </p>\n<p>Comprehensive identity proofing solutions help companies stay compliant by integrating regulatory checks into their workflows. Orchestration ensures that these checks are performed consistently and accurately, minimizing the risk of non-compliance and associated penalties.</p>\n<h3 id=\"3-improved-customer-experience\" style=\"position:relative;\"><a href=\"#3-improved-customer-experience\" aria-label=\"3 improved customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Improved Customer Experience</h3>\n<p>A streamlined and efficient identity verification process is crucial for providing a positive customer experience. </p>\n<p>With orchestration, businesses can reduce the time and effort required for users to prove their identities, leading to higher satisfaction and loyalty. Automated processes also minimize the risk of false positives, ensuring unnecessary security hurdles do not inconvenience legitimate users.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/identity-orchestration-workflow/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-id-orchestration\"\n        title=\"DS-id-orchestration\"\n        src=\"/static/684e33528c22fabe4e035d1e4cc17b39/e5715/DS-id-orchestration.png\"\n        srcset=\"/static/684e33528c22fabe4e035d1e4cc17b39/a6d36/DS-id-orchestration.png 650w,\n/static/684e33528c22fabe4e035d1e4cc17b39/e5715/DS-id-orchestration.png 768w,\n/static/684e33528c22fabe4e035d1e4cc17b39/81501/DS-id-orchestration.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-cost-efficiency\" style=\"position:relative;\"><a href=\"#4-cost-efficiency\" aria-label=\"4 cost efficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Cost Efficiency</h3>\n<p>Orchestration reduces the need for manual intervention and streamlines identity verification processes, resulting in cost savings for businesses. By automating routine tasks, organizations can allocate resources more effectively and focus on strategic initiatives that drive growth.</p>\n<h3 id=\"5-scalability-and-flexibility\" style=\"position:relative;\"><a href=\"#5-scalability-and-flexibility\" aria-label=\"5 scalability and flexibility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Scalability and Flexibility</h3>\n<p>As businesses grow and expand into new markets, their identity proofing needs may change. Orchestration provides the flexibility to adapt to these changes by easily integrating new verification tools and processes.</p>\n<p>This scalability ensures that companies can continue to provide secure and efficient identity verification as their operations evolve.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In a world where digital interactions are becoming the norm, businesses must prioritize identity proofing to protect their assets and build trust with their users. </p>\n<p>By embracing comprehensive identity proofing solutions through orchestration, companies can enhance security, ensure compliance, and deliver a superior customer experience. As cyber threats continue to evolve, the adoption of orchestration will be crucial for businesses looking to stay ahead of the curve.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 12, 2024","updated_date":null,"title":"Mastering Orchestration: The Business Case for End-to-End Identity Proofing Solutions","tags":["identity orchestration","identity proofing","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/d0989f98bd821ddeb9cf5df4770d959a/33aa5/id-proofing.jpg","srcSet":"/static/d0989f98bd821ddeb9cf5df4770d959a/f836f/id-proofing.jpg 200w,\n/static/d0989f98bd821ddeb9cf5df4770d959a/2244e/id-proofing.jpg 400w,\n/static/d0989f98bd821ddeb9cf5df4770d959a/33aa5/id-proofing.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Cooper Matheson","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/identity-proofing/"},"html":"<p>You book a hotel for your stay in Paris; you go to the counter, show your passport and other ID verification documents, and take the keys to your room to finally enjoy your stay. </p>\n<p>This is identity proofing—the process of verifying that the claimed identity_ _of a person matches their actual identity. You’ve probably undergone this process a bunch of times yourself at hotels, financial institutions, and for retailers.</p>\n<p>The entire process feels taxing, intrusive, and needlessly comprehensive. Yet, it might be surprising to hear that, despite the measures taken by many institutes, according to Consumer Sentinel Network, <a href=\"https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2019/consumer_sentinel_network_data_book_2019.pdf\">3.4 million identity thefts</a> and frauds took place in 2019 alone.</p>\n<h2 id=\"importance-of-improved-identity-proofing\" style=\"position:relative;\"><a href=\"#importance-of-improved-identity-proofing\" aria-label=\"importance of improved identity proofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Importance of Improved Identity Proofing</h2>\n<p>According to the <a href=\"https://www.accenture.com/sa-en/insights/security/invest-cyber-resilience\">2020 State of Cybersecurity Report</a> by Accenture, an average company was subject to 22 data breaches in the studied year. Such data breaches are often the consequence of and result in more identity thefts and frauds. </p>\n<p>As a matter of fact, it takes over six months for <a href=\"https://www.zdnet.com/article/businesses-take-over-six-months-to-detect-data-breaches/\">an average data breach</a> to be detected. That gives the perpetrator six months to exploit your information as vastly as possible. The risk is significantly greater with the onset of higher cloud computing reliance in the day-to-day functioning of an organization.</p>\n<p>Typical knowledge-based identity proofing also involves asking a customer a set of common security questions, e.g., “What was your hometown?”, “What was your mother’s maiden name?” etc. These questions are used across a range of organizations. </p>\n<p>So, what happens when an organization as big as <a href=\"https://edition.cnn.com/2019/07/30/tech/biggest-hacks-in-history/index.html\">Facebook or Marriott Intl.</a> suffer a breach compromising hundreds of millions of accounts?</p>\n<p>Your Personally Identifiable Information (PII), including your bank account details and security questions, fall in the hands of fraudsters that can exploit your information through, for instance, fraudulent transactions.</p>\n<p>Therefore, effective identity solutions should be one of the top priorities for any organization at this phase. To exemplify, identity proofing is particularly useful when a user is trying to claim an account, access content above a certain age, or register for an ecommerce site.</p>\n<h2 id=\"how-to-implement-effective-identity-proofing\" style=\"position:relative;\"><a href=\"#how-to-implement-effective-identity-proofing\" aria-label=\"how to implement effective identity proofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Effective Identity Proofing</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAOCAYAAAAvxDzwAAAACXBIWXMAAAsSAAALEgHS3X78AAACNUlEQVQ4y32Ue08aQRTFN5Wd2U2obY2PptGmTfABgoCiFpRFXvKMsdZXtdZgje33/wKn597dJUgff9ywy8z85txzZtbxVw/grR2OK37X3/UA5vAOM5+ukdg9x0zpHO7+JUxwD3NwC8tnKVO+hi0M4acqcOLFf4A56BWHcMtf8e74AUvtB6z0n/Cyegt37wKmSijHFMgN7e6ZrnMUJgCqicEK36jBKwxU0YfhL7wnbJmVDO4UaKnKVL9HwCsCv2hHjiy02WO4my14WdaqqCsTGMDb6nLxJeYb91juPiJRG8GtP8JSkRHQM2Ck0OY6SBZ6WNwbwhLgCXjjiLAOn5twdz5jNviGWbb6IhjBNJ9gKjchKAZOeijKlgjLtq5Chfl+CMw04GfqcDMtzDVH+Mi2X7d+wGVIlopElQSm6giVNWKVYwlMFgeY2z8NVdEC2Ul9zLVh2UZy5wQrg594UyOAaYfqGEolTNrLtjm/EoWyVoXNNGGk1fTRxLHhhPWqBmO5SWKzDZfGWyYrrRr6abdPQmX0XNeJQk9TrUQVHZ0oeVXMtr10HT79VH9zHbVD/lOLCLQyxnna8hgialh+DJSdqU6PU2SBbpqKNpeTIPB8D6+yjSjE1iQw0Bq3HJU3deDHB59WuekGFood5Ls3eFvqwVC14/9lwRg0MeZPPcscl97Pb3eRCs6wWOozi8bzqxdPjD30p+84Q1Nb4tsk/vLsWgl2K/TW+efHYQL43w+I3CgNp6bvvwFsbKBKKMekGgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"importance-identity-proofing\"\n        title=\"importance-identity-proofing\"\n        src=\"/static/a146c8695e81bf237cbcec728113bcaa/e5715/importance-identity-proofing.png\"\n        srcset=\"/static/a146c8695e81bf237cbcec728113bcaa/a6d36/importance-identity-proofing.png 650w,\n/static/a146c8695e81bf237cbcec728113bcaa/e5715/importance-identity-proofing.png 768w,\n/static/a146c8695e81bf237cbcec728113bcaa/2bef9/importance-identity-proofing.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As stated above, identity proofing can be done manually through documentation and interactive checks. This process, as already pointed out, is taxing and poorly affects the user experience. Manual identity solutions are also unscalable for large organizations dealing with hundreds of thousands of consumers every day.</p>\n<p>To pick up virtual methods of identity proofing is the right way to go in the current tech-dominated global environment. For instance, the British government has come up with a document on verifying someone’s identity on the <a href=\"https://www.gov.uk/government/publications/identity-proofing-and-verification-of-an-individual#how-to-check-someones-identity\">basis of set guidelines</a>:</p>\n<ul>\n<li>Strength: Getting evidence of identity from official ID documents.</li>\n<li>Validity: Confirming that the document is legitimate.</li>\n<li>Activity: Tracking the prevalence of the identity over time with other records.</li>\n<li>Identity fraud: Assessing the risk of fraud by comparing it with the national fraud database.</li>\n<li>Verification: Assuring the identity belongs to the person claiming it.</li>\n</ul>\n<p>An adequate identity proofing system should be able to perform most of these tasks on its own. It’s worth noting that such a comprehensive undertaking is not necessary for all activities. The organization’s sound discretion should be used to assess where it wants to employ identity proofing solutions.</p>\n<h2 id=\"protect-your-business-identity-with-loginradius-ciam-solutions\" style=\"position:relative;\"><a href=\"#protect-your-business-identity-with-loginradius-ciam-solutions\" aria-label=\"protect your business identity with loginradius ciam solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Protect Your Business Identity With LoginRadius CIAM Solutions</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity-proofing-loginradius\"\n        title=\"identity-proofing-loginradius\"\n        src=\"/static/2f1995fa060fc29d0ca86bc251df00a1/e5715/identity-proofing-loginradius.png\"\n        srcset=\"/static/2f1995fa060fc29d0ca86bc251df00a1/a6d36/identity-proofing-loginradius.png 650w,\n/static/2f1995fa060fc29d0ca86bc251df00a1/e5715/identity-proofing-loginradius.png 768w,\n/static/2f1995fa060fc29d0ca86bc251df00a1/2bef9/identity-proofing-loginradius.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"two-factor-and-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#two-factor-and-multi-factor-authentication\" aria-label=\"two factor and multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor and Multi-Factor Authentication</h3>\n<p>When dealing with sensitive information, regardless of the network being public or private, it is a good idea to add extra layers of security to an account. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication</a> overcomes the flaws of typical password-based authentication and mandates it for a user to verify the claim to an account through two or more methods.</p>\n<ul>\n<li>LoginRadius makes it incredibly convenient to implement MFA for consumers as well as employees without disrupting any other services of the company.</li>\n<li>You can choose the factors via which you would want anyone to verify their claim to the account: SMS, authenticator apps, dynamic security questions, automated phone calls, etc.</li>\n<li>LoginRadius makes sure that the user experience (UX) is not compromised through its intuitive and easy-to-pick user interface.</li>\n</ul>\n<h3 id=\"password-management-solution\" style=\"position:relative;\"><a href=\"#password-management-solution\" aria-label=\"password management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Management Solution</h3>\n<p>Some accounts don’t need the comprehensive identity proofing processes that were explained above because they don’t interact with sensitive information. Nevertheless, it is a <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">good business practice to safeguard data</a>, no matter how insignificant it may seem. </p>\n<p>LoginRadius identity and access management solutions offer password management that helps make traditional password-based identity-proofing safer in itself.</p>\n<ul>\n<li><strong>Regulated password resets</strong>: This feature allows you to configure your system to mandate it for users to update their password at regular intervals. The default setting is set at 90 days.</li>\n<li><strong>One-way hashing</strong>: This feature encrypts the passwords of users of a system with <a href=\"https://www.loginradius.com/docs/security/platform-security/cryptographic-hashing-algorithms/\">customizable hashing</a> salts. The one-way here means that the password can only be encrypted, not decrypted. To increase security, each consumer is allowed to set a random hashing salt for each password. Thereby also disallowing anyone with access to the database to find out the passwords of other users.</li>\n<li>\n<p><strong>Password policy</strong>: The password policy recommended is:</p>\n<ul>\n<li>Password length + complexity: A minimum of ten characters with at least one number and one symbol.</li>\n<li>Password history: Users cannot use the last five passwords again.</li>\n<li>Maximum password age: 90 days.</li>\n<li>Multi-factor authentication: Optional to enable Google Authenticator or Phone SMS as the second authentication factor.</li>\n</ul>\n</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"enterprise-buyer-guide-to-consumer-identity\"\n        title=\"enterprise-buyer-guide-to-consumer-identity\"\n        src=\"/static/6cd4771c097ebff7bd4aca4351efd934/e5715/enterprise-buyer-guide-to-consumer-identity.png\"\n        srcset=\"/static/6cd4771c097ebff7bd4aca4351efd934/a6d36/enterprise-buyer-guide-to-consumer-identity.png 650w,\n/static/6cd4771c097ebff7bd4aca4351efd934/e5715/enterprise-buyer-guide-to-consumer-identity.png 768w,\n/static/6cd4771c097ebff7bd4aca4351efd934/63ff0/enterprise-buyer-guide-to-consumer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"built-in-layers-of-protection\" style=\"position:relative;\"><a href=\"#built-in-layers-of-protection\" aria-label=\"built in layers of protection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Built-in layers of protection</h3>\n<p>To further strengthen your system’s ecosystem, LoginRadius’ tools enforce restricted access and stave off <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">automated attacks</a> on your system. Some of the mechanisms involved in implementing it involve:</p>\n<ul>\n<li><strong>Blacklisting</strong>: You can ban accounts with specific email address domains and thereby, disallow them from registering into your services. </li>\n<li><strong>Whitelisting</strong>: You can allow email addresses of only set domains to interact with and register to your services.</li>\n<li><strong>Brute force lockout</strong>: You can set a threshold for failed login attempts. After a certain number of attempts, you can determine the next course of action. For example, you can temporarily block the account or ask a security question. This effectively reduces the vulnerability to brute force attacks to negligible proportions.</li>\n<li><strong>CAPTCHA</strong>: You can use captcha to restrict bots from generating accounts and interacting with your system. It helps you ensure only humans are using the system.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With the growing reliance on technology and cloud-based ecosystems, there is a higher susceptibility to <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyber-attacks</a>. SME organizations tend to undermine the benefits of identity proofing and cyber security. </p>\n<p>By improving privacy, the identity proofing process helps build a trustable image in the consumers’ minds towards your brand.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 18, 2020","updated_date":null,"title":"What is Identity Proofing and Why is it Important?","tags":["data security","identity proofing","ciam solution"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/275ab4ecedf2daa304ca8584a331adf6/33aa5/identity-proofing.jpg","srcSet":"/static/275ab4ecedf2daa304ca8584a331adf6/f836f/identity-proofing.jpg 200w,\n/static/275ab4ecedf2daa304ca8584a331adf6/2244e/identity-proofing.jpg 400w,\n/static/275ab4ecedf2daa304ca8584a331adf6/33aa5/identity-proofing.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"identity proofing"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}