Filter by
Most Recent
- Most Recent
- Most popular
All time
- All time
- This Month
- This Year
The Power of Orchestration: Why Businesses are Turning to End-to-End Identity Proofing Platforms
When it comes to onboarding customers online, businesses have adopted eKYC solutions to ensure their new customers are who they say they are and are suitable to do business with. But most eKYC solutions are limited in scope, forcing companies to research, purchase, integrate and maintain dozens of different point solutions to meet all their…
How KYC and Blockchain Technology Can Operate Together Successfully
Blockchain technology has not yet achieved true mainstream status, although its uses have been expanding over the last few years. Cryptocurrency, for example, has been a tempting and lucrative investment for many consumers who are attracted to its decentralized structure. Crypto is not controlled by a single entity such as a bank or government, and…
Understanding Suspicious Activity Reporting & Its Requirements
Financial crime is ubiquitous and often difficult to detect. That’s why governments around the world require financial institutions to take measures that will flag suspicious transactions. Of course, this responsibility is a delicate one, since transactions that look suspicious may be perfectly legal while illegal transactions can sometimes appear to be legitimate. However, the only…
Guidance on Anti-Money Laundering (AML) in Banking and Finance for 2022
Anti-money laundering (AML) policies are put in place to deter criminals from integrating illicit funds into the financial system. Money laundering schemes are used to conceal the source and possession of money obtained through illegal activities, such as drug trafficking and terrorism. Banks and other financial institutions are legally obligated to follow AML regulations to…
What Is Identity Proofing And How Does It Work?
As individuals and businesses become increasingly dependent on online financial transactions, identity fraud has become a costly issue. Without the proper precautions, it’s all too easy to hack into personal accounts and websites, allowing cyberthieves to steal billions of dollars in assets each year. That’s why identity proofing has become so important in fraud prevention…
Establishing Trust in a Digital World
Because nearly every component of modern life embraces digital channels, the need to obtain confidence in the identities of customers, citizens, partners and employees through remote interactions continues to grow. According to the 2022 Gartner® Market Guide for Identity Proofing and Affirmation, which names Jumio as a Representative Vendor, identity proofing is key to establishing…
Know Your Patient: 5 Ways to Prevent Fraud and Other Headaches in Health Care
Health care has fully entered the digital age, with most providers offering video visits and the ability to onboard new patients remotely. But along with this digital transformation is a dramatic rise in health care data breaches. According to the latest report in HIPAA Journal, 2021 saw more breaches than any other year since they…
Workflows: The Cornerstone of Compliance
In a previous post, we introduced the advanced orchestration capabilities in the next-generation Jumio KYX Platform. Let’s take a closer look at workflows and how the KYX Platform makes it easy to implement the business logic you need for your specific use cases. About Workflows Workflows represent business processes that allow you to adhere to…
4Stop: Now a Jumio Company
Today, we are happy to announce that Jumio’s acquisition of 4Stop is complete, allowing us to take the next step forward in the evolution of our KYX platform. Jumio’s no-code orchestration platform will now be enhanced by 4Stop’s workflow engine. This tool makes it easy to use cascading verification logic to run various onboarding checks…
Scaleway Case Study: Providing a Premium Onboarding Process with Jumio
From high-performance cloud ecosystems to hyperscale green data centers, Scaleway provides the foundation for digital success. One of Europe’s few pure cloud service providers (CSPs), Scaleway’s offering covers the whole value chain, from software to hardware to data centers, which are operated mainly in the Paris region but also in Poland and the Netherlands. While…
AML Risk Assessments: Developing and Implementing a Plan for Your Organization
Anti-Money Laundering (AML) processes are designed to prevent illegal money transactions that hide the source of funds earned from or funded for criminal activity. One of the best ways to improve your company’s security against these transactions is to develop a thorough risk assessment procedure. Although the law does not specifically require that you develop…
Risk Signals: A Deep Dive into the Next-Generation KYX Platform
Recently, we announced the release of Jumio’s next-generation KYX Platform that provides companies with a true 360-degree view of their customers. In addition to displaying a yes/no decision during user onboarding, we now provide deeper insights that help you make more nuanced decisions about how to do business with each customer. This is essential for…