Identity Continuity
An idea originated by Daon, Identity Continuity is a unique approach to eliminating dangerous gaps between siloed digital identity processes by building customer journeys that create trust – not friction. Identity Continuity works by creating a single, central identity for each user that is interwoven into every verification, authentication, and recovery process a customer encounters through their lifetime of interaction with your organization.
One Customer.
One Record.
Convenient, secure access.
From identity verification during onboarding to authentication across every channel, Identity Continuity supports your business needs today and into the future.
- Minimize fraud with a single, secure identity for each customer
- Reduce overhead by leveraging a single platform with a centralized view of your customer
- Improve customer engagement and satisfaction with convenient, consistent, customizable user experiences
Confident eKYC onboarding: anytime, anywhere
With digital identity verification (IDV), you can be confident that your customers are truly who they claim to be: no matter where they are or when they access your services. All they have to do is scan an ID and snap a selfie – and you’ll instantly have the proof you need to build a trusted relationship and prevent fraudulent accounts, all without added customer friction.
Convenient and secure access
Using a single, central, and secure biometric template for identity authentication ensures that your customers have access when and where they need it – without the risks that come with legacy authentication methods. No more forgotten or stolen passwords. No more threats of social engineering attacks, like phishing or pretexting. Just low-risk, low-friction account access.
Frictionless account recovery
When every point of access uses a central biometric template as the key authentication factor, securely adding a new device or an extra factor, like a voice print, is as easy as taking a selfie. Costly password reset calls can quickly become a thing of the past, and the added risk of account takeover during recovery interactions is practically eliminated with Identity Continuity.
Limitless possibilities
No matter where your customers are or what channel they use – a computer, mobile device, a phone call to your contact center…or even accessing services in-person – with Identity Continuity, you can ensure each customer is exactly who they claim to be and grant them (and only them) access every time they interact with your organization. Identity Continuity gives you the ultimate in trusted identity assurance, all on a single platform.
Identity Continuity was created out of the belief that each customer must be treated like a unique, known individual in order for an organization to provide them with the optimum level of security and customer experience. The Identity Continuity method of identity assurance focuses on definitively knowing who your customer is, establishing a customer record connected to that identity, and then securely recognizing that customer at every point of digital interaction, no matter the channel used.
Frequently Asked Questions
Do I need to implement verification and authentication to add Identity Continuity to my organization?
No. One of the unique benefits of Identity Continuity is that you can start with the solution you need and then expand into a more full-featured solution as your needs grow, all on the same platform.
Do I have to use biometric authentication factors with Identity Continuity?
No. While some of the more powerful features of Identity Continuity, like self-service credential recovery, require a facial biometric, with our xAuth application you can use nearly any authentication factor as a part of Identity Continuity.
How does Identity Continuity work with contact centers?
With our xVoice application, customers can add biometric voiceprints to their record, allowing them to use passive voice authentication to prove their identity. The power of Identity Continuity doesn’t stop there, though: with a single, secure customer record, your contact center can also trigger secondary authentications, like in-app approval or a face scan, to strengthen fraud protection and provide step-up authentication.