Understanding Suspicious Activity Reporting & Its Requirements

Financial crime is ubiquitous and often difficult to detect. That’s why governments around the world require financial institutions to take measures that will flag suspicious transactions. Of course, this responsibility is a delicate one, since transactions that look suspicious may be perfectly legal while illegal transactions can sometimes appear to be legitimate. However, the only…

What Is Identity Proofing And How Does It Work?

As individuals and businesses become increasingly dependent on online financial transactions, identity fraud has become a costly issue. Without the proper precautions, it’s all too easy to hack into personal accounts and websites, allowing cyberthieves to steal billions of dollars in assets each year. That’s why identity proofing has become so important in fraud prevention…

Establishing Trust in a Digital World

Because nearly every component of modern life embraces digital channels, the need to obtain confidence in the identities of customers, citizens, partners and employees through remote interactions continues to grow. According to the 2022 Gartner® Market Guide for Identity Proofing and Affirmation, which names Jumio as a Representative Vendor, identity proofing is key to establishing…

Know Your Patient: 5 Ways to Prevent Fraud and Other Headaches in Health Care

Health care has fully entered the digital age, with most providers offering video visits and the ability to onboard new patients remotely. But along with this digital transformation is a dramatic rise in health care data breaches. According to the latest report in HIPAA Journal, 2021 saw more breaches than any other year since they…

Workflows: The Cornerstone of Compliance

In a previous post, we introduced the advanced orchestration capabilities in the next-generation Jumio Platform. Let’s take a closer look at workflows and how the KYX Platform makes it easy to implement the business logic you need for your specific use cases. About Workflows Workflows represent business processes that allow you to adhere to compliance…

Scaleway Case Study: Providing a Premium Onboarding Process with Jumio

From high-performance cloud ecosystems to hyperscale green data centers, Scaleway provides the foundation for digital success. One of Europe’s few pure cloud service providers (CSPs), Scaleway’s offering covers the whole value chain, from software to hardware to data centers, which are operated mainly in the Paris region but also in Poland and the Netherlands. While…

Risk Signals: A Deep Dive into the Next-Generation Jumio Platform

Recently, we announced the release of Jumio’s next-generation Platform that provides companies with a true 360-degree view of their customers. In addition to displaying a yes/no decision during user onboarding, we now provide deeper insights that help you make more nuanced decisions about how to do business with each customer. This is essential for implementing…

Jumio to Acquire 4Stop, Realizing Strategic Vision of Redefining End-to-End Identity

Following up on our post about our next-generation KYX Platform, we are thrilled to announce today that we have signed an agreement to accelerate our business and technology vision by acquiring current strategic partner 4Stop, the leading data marketplace and orchestration hub for KYB, KYC, compliance and fraud prevention. The addition of 4Stop’s data sources…

AML Models – Definition, Development, Validation and Best Practices

Anti-money laundering (AML) practices help fight financial crimes by making it difficult to “wash” illegally acquired funds so that they look legitimate. Businesses, especially financial institutions and high-cash concerns, must be vigilant to prevent this criminal activity. While AML compliance is a high priority, members of the industry are not in complete agreement about what…