Back to All Products

Jumio Risk Signals

Frictionless services that stop fraudsters at the door and help you assess risk throughout the customer lifecycle.

Risk Assessment Throughout
the Entire Customer Lifecycle

For many businesses, identity verification requires more than just checking an ID. Jumio’s advanced risk signals provide additional assurance and trust that your customers are who they say they are — and that they do not provide unnecessary risk to your business — during onboarding and each time they return to your platform.

svg

Comprehensive Data Hub

Access 500+ data sources to confirm your customers’ personally identifiable information (PII) and assess their risk.

svg

Composite Risk Score

Get a yes/no answer, automatically drive onboarding decisions and streamline your workflows.

How It Works

phone

Customizable Risk Workflows

Select the right amount of friction at the right time, starting with background signals like Device Risk and only triggering additional checks as needed.

phone

Automated User Onboarding

Automation enables easy decision making in real time based on the customer’s risk score.

phone

Ongoing Risk Monitoring

Keep your business healthy by periodically checking risk signals for your existing customers.

Key Risk Services

svg

Device Risk

Assess the risk of the user’s device by detecting its IP address, OS and age with this frictionless check. Find out if they’re using GPS emulation, device rooting, VPNs or proxies to mask its high-risk location and trick your online identification flow.
svg

Global Identity Check

Run the user’s name, address, phone and email through a network of global identity databases to gain assurance that they belong to this person and to assess the person’s overall risk in a single, lightweight step.
svg

Phone Number Risk

Determine the risk and reputation of a phone number. This service looks at usage patterns, usage velocity and phone data attributes. It also checks the number against the Global Phone Data Consortium for fraud history and evaluates messaging behavior.
svg

Email Risk

More deeply assess the risk of an email address by evaluating its velocity, age, domain details, country, fraud history and other details.
svg

Address Services

Validate and corroborate addresses with independent, third-party sources. Determine whether the address extracted from a government-issued ID exists in the real world, and see if the person being verified actually lives at the address on their ID.
svg

Social Security Number Check

Verify that the name and address (and optionally date of birth and phone number) match the SSN by checking databases such as the Social Security Administration, USPS, credit bureaus and other proprietary sources.

Use Cases

User onboarding
Throughout the onboarding process, easily streamline workflows and get a definitive yes/no decision based on the customer’s risk assessment score.
Learn More
User onboarding
Fraud detection
Catch fraud before it happens. Easily identify cybersecurity threats and fraudsters before they are onboarded.
Learn More
Fraud detection
KYC/AML compliance
Increase your compliance management and stay up to date with the latest KYC and AML regulatory requirements.
Learn More
KYC/AML compliance
Enhanced due diligence
Improve your customer identification program and mitigate high-risk clients to improve your enhanced due diligence processes.
Enhanced due diligence
Risk assessment
Get a detailed risk analysis on each customer during the onboarding process and throughout the customer lifecycle.
Risk assessment
Monitoring of existing customers
Continually monitor your customer profiles to assess changes in risk.
Monitoring of existing customers

Frequently Asked Questions

1
AML regulations require businesses to take a risk-based approach to onboarding. This means your risk management solution must go beyond simply identifying the person’s identity — you must truly know your customer and their operational risk to your business. Therefore, risk identification is as important as identity verification in the KYC process. Risk signals combine metrics into a single risk score, which allows you to get a clear picture of the potential risks of your customers before you onboard them — and throughout the customer lifecycle.
2
The risk score is calculated based on many factors, including the age and reputation of the email address and phone number, the IP address of the device, and whether the person actually lives at the address on the ID. The result is a single score in one management system that helps reduce the risk associated with onboarding users online.
3
Yes, Jumio uses bank-grade security in all our products and services and utilizes proven internal controls, including regular tests for vulnerabilities and security risks. We are proud to have achieved ISO/IEC 27001:2013, PCI DSS and SOC2 Type 2 certifications, and our security is in a continuous process of improvement regardless of certifications that we hold or strive to achieve. For more information, see Information Security.
4
There are many enterprise risk management software solutions available, but the seamless integration of Jumio’s hundreds of risk signals with the identity verification process allows you to check the person’s identity and assess their risk in a single step. With only one contract to sign, one set of pricing, and one cloud-based platform to implement through a single API, business operations are all streamlined. Our analytics dashboards provide easy visualization of trends during internal audits and day-to-day use, allowing your incident management team and other stakeholders to prioritize and execute the right risk mitigation strategies in real time, maximizing business continuity and reducing the need for remediation. And our user-friendly risk signals (such as the frictionless Device Risk service) help maintain high conversion rates while reducing financial risk, making them an essential part of an integrated risk management solution.
5
There are many types of risk management platforms for everything from cyber risk to operational risk management to IT risk. But for deterring fraud, the best risk management software is cloud-based, easy to integrate with your existing user journey, and includes modules for verifying the person’s identity, screening them against watchlists including sanctions, politically exposed persons (PEPs) and adverse media, and re-authenticating their identity each time they sign in to your service online. See the related services below for more information.

Get Started

Let a Jumio expert show you how easy it can be to integrate our automated identity proofing solutions into your existing processes.