Categories
The category system uses one primary category plus secondary category tags so overlapping providers are not forced into a single rigid box.
Launch List
31 categories
Full-stack platforms for verifying individual users through IDs, biometrics, data checks, and workflow tools.
25 providersKYC ProvidersCustomer identity verification and due diligence providers for regulated onboarding.
27 providersKYB ProvidersProviders that verify businesses, merchants, legal entities, officers, and beneficial owners.
12 providersDocument VerificationTools for authenticating passports, driver licenses, residence permits, and other identity documents.
18 providersDocument OCR and Data ExtractionOCR and data extraction providers for IDs, bank statements, utility bills, and forms.
2 providersNFC Chip Reading and ePassport VerificationMobile SDKs and APIs for reading and verifying chips in ePassports and NFC-enabled documents.
2 providersLiveness DetectionProviders that detect whether a biometric sample comes from a live person rather than a spoof or replay.
17 providersBiometric VerificationProviders that compare a biometric sample to an ID document, identity record, or returning user profile.
15 providersAML ScreeningScreening tools for sanctions, PEPs, adverse media, watchlists, and ongoing AML monitoring.
16 providersSanctions, PEP, and Adverse Media DataData-first providers for risk lists, sanctions datasets, PEP data, media screening, and entity risk data.
4 providersTransaction MonitoringTools for detecting suspicious transactions, financial crime patterns, and post-onboarding risk.
10 providersFraud Detection and Risk IntelligenceRisk intelligence tools for account fraud, synthetic identity, mule accounts, and suspicious behavior.
17 providersDevice Intelligence and FingerprintingTools for identifying devices, browsers, bots, proxies, VPNs, and suspicious device patterns.
5 providersBehavioral BiometricsFraud tools that analyze typing, swiping, mouse movement, and session behavior patterns.
2 providersBot Detection and Abuse PreventionProviders that prevent automated abuse, fake accounts, scraping, credential stuffing, and scripted attacks.
3 providersIdentity OrchestrationPlatforms that route users through verification steps, vendors, rules, and risk decisions.
5 providersCase Management and Manual ReviewReview queues and analyst workspaces for verification failures, fraud alerts, and compliance exceptions.
13 providersDecision Engines and Risk RulesRules, policies, scoring, simulations, and decision logs across identity, fraud, credit, and compliance.
10 providersAge Verification and Age AssuranceProviders that verify or estimate age for age-restricted products, content, services, and commerce.
10 providersProof of Address and Residency VerificationProviders that verify where a customer lives using documents, databases, or geolocation signals.
3 providersKYB and Business VerificationBusiness verification tools for companies, merchants, entities, directors, and ownership data.
2 providersBeneficial Ownership and UBO DiscoveryTools for identifying beneficial owners, controllers, directors, shareholders, and ownership chains.
2 providersMerchant and Seller VerificationVerification workflows for merchants, sellers, creators, drivers, and marketplace counterparties.
2 providersCrypto AML, Blockchain Analytics, and Travel RuleBlockchain analytics, wallet screening, crypto AML, and Travel Rule tools for VASPs and fintechs.
4 providersReusable Digital IdentityProviders that let users verify once and reuse a credential, verified profile, or identity wallet.
8 providersZero-Knowledge Identity VerificationPrivacy-preserving verification providers that prove facts about identity, eligibility, or compliance without exposing the underlying raw data.
1 providersGovernment eID and Digital Identity WalletsProviders and schemes tied to national eID, electronic signatures, identity wallets, and trust services.
3 providersIdentity Infrastructure SDKs and APIsDeveloper-oriented identity verification building blocks that apps and KYC vendors can embed.
6 providersDocument Forensics and Border-Control ToolsSpecialist document authentication, inspection hardware, forensic analysis, and border-control workflows.
1 providersAuthentication and Account SecurityAdjacent tools for proving returning-user identity after onboarding through MFA, passkeys, or step-up checks.
8 providersEmployment, Candidate, and Workforce VerificationIdentity checks for candidates, contractors, creators, workers, delivery drivers, and gig participants.
1 providers