Digital Identity Solution Segment Glossary

Solution Segment Definitions

Arrow Left

2023 Digital Identity Landscape

Glossary


a
A


B
B


C
C


D
D


E
E


F
F


G
G


H
H


I
I


J
J


K
K


L
L


M
M


N
N


O
O


P
P


Q
Q


R
R


S
s


t
t


u
U


v
V


w
W


x
X


Y
Y


z
Z


A

Antivirus

Antivirus software works as a gatekeeper to prevent, detect, and remove viruses and malware that put identity data at risk, passively running in the background to provide customers a frictionless experience. Antivirus prevents social engineering techniques, advanced persistent threat (APT), botnet Distributed Denial-of-Service (DDoS) attacks, and protects users against known malware threat signatures.

Authentication

Authentication factors are credentials that verify and authorize a user. These are often described as something you know (e.g., a password), something you have (e.g., a security token), or something you are (e.g., a biometric characteristic).

B

Background Screening

Background screening is the process of looking up and compiling the employment, criminal, commercial, and financial records of an individual or an organization.

Biometrics

Biometrics measure a human’s physical and behavioral characteristics to verify and authenticate an identity.

Business & Entity Verification (KYB)

KYB processes ensure that financial services institutions make reasonable efforts to understand their enterprise customers’ potential risks and activities to prevent financial crime.

C

Credit and Financial Identity

Credit and financial identity for individuals is established by the analysis of financial information, history, and activity and is intended to expand the reach of access to financial services and other services requiring proof of identity.

Customer IAM

Customer (or consumer) IAM solutions focus on identity management for end-users. Organizations that manage omnichannel environments benefit from IAM solutions that optimize user experience while preserving customer privacy and security. CIAM solutions provide a centralized and managed view of each customer across registration, authentication, authorization, federation, and data capture.

D

Data Aggregators

Data aggregators collect, prepare, verify, and sell identity data to enable enrichment of existing datasets for risk management and business performance improvement.

Decentralized Identity and Verifiable Credential Management

Decentralized identity and verifiable credential management (VCM) are standards-based architectures, tools, and infrastructure that address the lifecycle, transformation, and utility of credentials and assertions that do not rely on centralized authorities for verification.

Document Verification

Document verification establishes an individual is who they say they are through validation and verification of a government-issued identity document.

E

eID and Civil IDs

Electronic identification (eID) and civil ID schemes are digital identity systems and credentials issued by governments and other public authorities for proof of identity and to access public and private sector services.

eSignatures

eSignatures are legally binding digital equivalents of handwritten signatures demonstrating consent or agreement to the content of a document to which the signature relates.

F

Fraud Detection and Prevention

Fraud solutions use risk-based approaches to analyze transaction history and network-related activity to identify potential fraudulent or risky behavior patterns.

I

Identity Governance & Admin

IGA applications enable the management of user identities, access, and privileges across an enterprise. IGA helps organizations to implement necessary controls to manage security and compliance risks.

Identity Graphing and Resolution

ID graphs map deterministic and probabilistic data sets to correlate online and offline identifiers with consumer identities. Identity resolution matches disparate records and data attributes to create a single, 360-degree customer view.

Identity Proofing

Identity proofing confirms that a user’s identity is associated with a real person and answers the question “are you really whom you say you are?” Identity Proofing is accomplished through Document Verification and IDV/(KYC) for enrollment or account registration requiring high assurance.

Identity Theft Protection

Consumer ITP solutions monitor personal data for anomalies (e.g., social security numbers, credit card accounts) and provide paths for identity restoration in the event of theft. Such paths include reimbursement options, customer service, and legal support to help mitigate any damage incurred to credit, reputation or fiscal standing as the result of identity theft.

Identity Verification (KYC)

Identity verification (IDV/KYC) is the process of confirming that a user’s identity is associated with a real person. IDV is primarily a data-centric function to establish that an individual is who they say they are. IDV may include document authentication to provide further identity assurance by validating a government-issued identity document.

Identity Wallets

Identity wallets are smartphone-enabled applications that allow individuals to manage their digital identity credentials and data. Digital identity wallets offer control over what information is shared, when, and with whom, facilitating privacy, security, and consent management.

IT Security

IT security solutions enable the defense of networks, endpoints, servers, and data from malicious attacks. Solutions protect user devices from vulnerabilities as well as monitor network traffic to protect them from external threats.

M

Machine Identity

Machine Identity solutions focus on managing device identity credentials, permissions management, endpoint security, and data protection for the billions of internet-connected devices.

Master Data Management (MDM)

Master data management helps companies maintain a single source of truth, creating a ‘golden record’ for their digital assets, such as customer data. They ensure the accuracy, accessibility, and accountability of shared data across the enterprise. These solutions also enable companies to develop a 360-degree view of their customers’ relationships and apply regulatory rule enforcement.

Mobile Identity & Device Intelligence

Mobile identity and device intelligence include user account information, carrier data, and mobile device data (e.g., account information, location data, device number). Together, solution providers can determine risk signals, prevent fraud, and improve customer experiences.

P

Password Managers

Password managers help customers generate and store secure passwords so that individuals only have to memorize a single, master password. Password managers help enterprises set organization-wide password policies.

Persona- and Signals-Based Intelligence (PSBI)

Persona- and signals-based intelligence (PSBI) is a data science-led approach to segmentation, detection and decisioning for human and non-human actors, relying on the collaboration of AI systems, data scientists and customers to arrive at a set of personas relevant to a given application, such as fraud detection, age assurance, or customer journey.

Physical Access Control

PIAM manages physical identities and their ability to access the right exits and entries, in the right areas, and at the right time. Based on an individual’s identity attributes and an organization’s security policies, companies can automate the management of on-premises access to restricted areas. PIAM systems are widespread, with applications ranging from building access to public event safety to border security.

Privacy, Data Protection, and Consent

Privacy, data protection, and consent providers help companies comply with data privacy and protection regulations such as GDPR and CCPA and provide consumers with tools to manage their online presence and data.

Privileged Access Management

Privileged Access Management (PAM) consists of identity strategies and technologies to manage the full lifecycle of elevated (“privileged”) users who have access to highly confidential corporate or government information that can become targets for cybercriminals.

R

Regulatory Compliance Transaction Monitoring

AML transaction monitoring helps financial institutions and money services businesses monitor customer information and activity such as transfers, deposits, and withdrawals to identify suspicious activity, enable reporting to national FIUs (e.g., FinCEN), and prevent financial crime.

U

User and Entity Behavior Analytics

UEBA analyze the behavioral patterns of humans and machines (e.g., routers, servers, endpoints), and applies algorithms to detect anomalies and potential threats.

User-Generated Content Management

UGC moderation is a set of tools and technologies that enable individuals and organizations to filter inappropriate or dangerous content. UGC moderation has become a critical pillar in maintaining trust and safety online; it’s how platforms protect their audiences from illegal and inappropriate content. Platforms incorporating UGC solutions in their identity stack can determine, with increasing sophistication, whether an account is human vs. non-human, providing the ability to remove bad actors before they have a chance to be disruptive.

W

Workforce IAM

Enterprise/Workforce IAM solutions provide full identity lifecycle management and administration for an organization’s employees, partners, and contractors.