1. Data collection via verification flows
While our verification flows look simple, most of the work happens behind the scenes. Browser and device analytics, optional background video checks, and other data cross-checking methods run in the background to maximize accuracy without cutting your conversion rates.
Select between 35 languages
Verify 7,500+ government-issued IDs
Customize web and mobile flows
Add or remove steps for your users
Optional background video
Assisted image capture
2. Configure our verification engine
When it comes to identity verification, a one-size-fits-all solution does not work. Optional features make it possible to scale fraud protection up or down according to your requirements for compliance, speed, and conversions.
Network and device analytics
Automated data extraction
Manual and automated ID checks
PEP and sanctions checks
3. Your one-stop verification platform, Veriff Station
View session statuses in real time, manage multiple integrations, and automate the flow of information with webhooks in one place. Veriff Station is used by startups and enterprise clients for maximum visibility and comes with a 30-day free trial for all future partners.
Live data at your fingertips
Test integration option
30-day free trial
Our blog is packed with insights from the people who make verifying millions of identities a year possible.
Transportation is often taken for granted. It makes our lives more connected and allows for more freedom in travel. Owning a car is one of the most popular options, however it is also expensive.
Veriff’s 1 million free verifications program has successfully been kicked off. The first organisation to start using Veriff’s free verifications is the Estonian Youth Work Centre (EYWC). It’s a national centre that coordinates and develops youth work in Estonia.
Over the past few months, the world has been introduced to the recently discovered coronavirus, better known as COVID-19. This disease has caused widespread panic amidst national lockdowns and recorded fatality rates, which cyber criminals are using to their advantage.