Liminal Link™ Index Report for KYC 📄 ------ Grab My Copy
security hero e1751053719994

OUR SECURITY

Security is in everything we do

Discover why organizations trust us to successfully fend off security threats, denial of service attacks, and malicious software intrusions while providing data protection and meeting global compliance standards

Security Image 2

Your trustworthy partner for data security and compliance

AuthenticID is committed to upholding strong information security policies and data privacy practices throughout all aspects of our business operations. We’ve completed data security and risk management certifications to attest our commitment and provide trust to our clients.

security 2

Intensely vetted personnel

Every AuthenticID staff member is required to go through extensive background checks, and regular security training. Security Awareness Training includes obligations related to information classification and handling, password security, virus protection, email hoaxes, desktop security, information security and social engineering.

Continuous vetting and training are pursued to maintain operational security while keeping developers in line with secure coding practices.

Certifications

The Marks of Excellence

A comprehensive suite of deliverables to support your business needs

certification cards 1

AuthenticID has achieved SOC2 certification to assure that critical service commitments and system requirements are in place to manage and protect client data.

certification cards 2

Our ISO/IEC 27001 certification shows that AuthenticID meets the highest international standards for risk management by implementing, maintaining, and continually improving its information security management systems.

certification cards 3

AuthenticID follows the set of federal regulations that outline how protected health information (PHI) can be used and disclosed in the United States. It’s important for related healthcare entities to be HIPAA compliant to protect a person’s privacy and trust to avoid legal consequences.

certification cards 4

To ensure GDPR compliance, AuthenticID’s privacy policy identifies how personal data is collected, used , and stored. If you partner with AuthenticID we will support your GDPR compliance through ongoing efforts and will evolve our capabilities with the ever-changing regulatory landscape.

Added Layers of Security for IDENTITY Verification

Enhancements for the most comprehensive identity solution

card carousel icon
Security Environment Roles

To minimize risk, access to production services and customer data is limited via controlled interfaces within specifically trained roles and responsibilities of AuthenticID personnel. Customer environment PII access is tightly controlled, monitored and audited both digitally and physically.

card carousel icon
Data Security

All data is encrypted in every AuthenticID use case. Our secure network connections are encrypted with TLS v1.2 or higher for application API communication, user web portal access, system maintenance and logging platforms. AES-256 and RSA-2048 are used to provide trusted encryption methods.

card carousel icon
Operational Access Control

Strict NIST-driven password policies and multi-factor authentication methods (MFA) are required for all production services and system access. User permission segregation, hierarchy, and unique credentials are required for all PII access to achieve full customer environment data separation at all times.

card carousel icon
Change Management

AuthenticID incorporates governance and change-management traits into the core functions of our engineering discipline. To ensure that customers experience consistent and repeatable operations, we practice peer code reviews, conduct regular code audits, implement change control, and facilitate unit testing, system integration testing, and penetration testing.

Access AuthenticID’s Trust Package

The AuthenticID Trust Package is a curated library showcasing key components of our Information Security Compliance Program. Designed for professionals in Compliance, Procurement, and Vendor Management, the Trust Package provides a real-time, centralized view into our security and compliance practices.

This resource offers transparency into how AuthenticID manages its compliance controls and security frameworks, supporting your due diligence and third-party risk management efforts.

REQUEST TRUST PACKAGE
RESOURCES

Stay Informed, Stay Ahead

All Resources
FindBiometrics Podcast Chris
Podcast
Walking the Privacy Tightrope in Identity Fraud Prevention with AuthenticID’s Chris Borkenhagen
On this week’s episode, we’re joined by Chris Borkenhagen, AuthenticID’s Chief Digital Officer, who offers insights on cybersecurity and biometrics, the changing regulatory landscape, and why there’s no “silver bullet” for preventing hack attacks. Chris brings a level of expertise to the discussion that clearly has a lot of depth and breadth, and manages to do so with classic Canadian good humour. Be sure to check out AuthenticID’s 2024 Mid-Year Identity Fraud Review, which informs important parts of the conversation:
Read More
2024 Biometrics Digital Identity Prism Report
Report
2024 Biometrics Digital Identity Prism Report
Read More
ID Talk Podcast Beyond Biometrics Blair 2
ID Verification
Podcast
AuthenticID’s Blair Cohen on the Evolution of Identity Tech
This week, the ID Talk podcast welcomes Blair Cohen, the Founder and President of AuthenticID. Blair is a serial entrepreneur with over three decades of experience in identity verification and fraud prevention. He shares his journey from founding one of the world’s first background screening companies to pioneering innovations in digital identity, including the development of automated facial recognition and forensic document examination technologies. The conversation dives into key issues shaping the identity technology landscape, such as the rise of organized crime in digital fraud, the evolution of government ID verification, and the technological advancements powering AuthenticID’s platform. Blair explains the complementary differences between the company’s proactive Velocity Check solution and its reactive Fraud Shield system, while also offering insights into behavioral biometrics, identity proofing standards, and the importance of robust fraud detection in protecting both consumers and enterprises. This episode offers a fascinating look into the dual evolution of digital fraud and identity assurance technology. Whether you’re a tech professional, a business leader, or simply curious about how cutting-edge solutions are keeping your data safe, you won’t want to miss this in-depth discussion with one of the field’s leading innovators.
Read More
All Resources