Summary is AI-generated, newsdesk-reviewed
  • iDenfy launches new KYC tools enhancing SMS and email verification for secure onboarding.
  • Verification codes act as barriers against fraud, preventing account takeovers and fake registrations.
  • iDenfy's tools help businesses detect invalid data, ensuring seamless and secure customer interactions.

iDenfy, a Lithuanian company specialising in identity verification, compliance, and fraud prevention, has unveiled new SMS and email verification features within its Know Your Customer (KYC) software.

These enhancements aim to streamline the initial user onboarding process by tackling common identity verification challenges such as multiple account creation, invalid phone numbers, and forged identities.

Enhancing ID verification processes

New features bolster the standard ID verification process by including an extra layer of authentication

The new features bolster the standard ID verification process by incorporating an added layer of authentication.

This involves verifying email addresses and phone numbers, which aids in identifying suspicious users prior to granting them access to secure services, such as payment applications.

Users are required to provide contact details to receive a verification code, which is a prerequisite for the standard ID verification using government-issued documents.

Demand for simplified verification

iDenfy's Chief Marketing Officer, Viktor Vostrikov, highlighted the demand for straightforward authentication methods in sectors dealing with financial transactions and personal data.

Vostrikov stated, “We noticed our partners asking for simple, familiar authentication methods that would increase security without damaging the general ID verification process with an ID document, since it’s mandatory for a compliant KYC flow.”

Simplified user onboarding

The SMS and email verification system sends a one-time code to the user, who then verifies their contact information by entering this code.

This procedure not only affirms the legitimacy of phone numbers and email addresses but also enhances security measures, preventing fraudulent activities before they escalate.

Strengthening security

iDenfy emphasises that these tools are designed to complement, not replace, existing identity checks

iDenfy emphasises that these tools are designed to complement, not replace, existing identity checks. By verifying emails and phone numbers, businesses can detect warning signs such as invalid or suspicious contact information, which may signal fraudulent activity.

This early alert system helps prevent potential security breaches, ensuring that fraudulent actors are detected before any further verification steps are initiated.

Maintaining platform integrity

According to Domantas Ciulde, CEO of iDenfy, “Trust begins with accurate data; therefore, our solution acts as an early checkpoint, filtering out fraudulent users before they even begin the onboarding process."

"By verifying emails and phone numbers upfront, we help businesses eliminate fake profiles, minimise risk, and maintain secure integrity of their platforms from the very first interaction.”

Integrating with existing systems

iDenfy's new verification tools can be seamlessly integrated into existing onboarding procedures

iDenfy's new verification tools can be seamlessly integrated into existing onboarding procedures.

Clients can utilise these features as primary risk assessment tools or combine them with the full suite of iDenfy's KYC solutions, including face biometrics, document authentication, and risk scoring, to form a robust identity management strategy.

Addressing evolving fraud tactics

In response to escalating fraud instances, with reports from the Federal Trade Commission showing consumer losses exceeding $12.5 billion in 2024, iDenfy’s tools help combat schemes that often originate from fake contact information.

The costs associated with neglecting data validation are mounting, making these verification measures essential in thwarting phishing and multi-accounting fraud tactics.

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...