...
 
 
Site Search
 

Authentication Compliance

Weak authentication is the source for account takeovers and the resulting fraud and information disclosures this leads to. For this reason, standards bodies and government agencies have been advocating or requiring more robust authentication approaches.

The requirements and principles all focus on the need to move to multi-factor authentication and to minimize use of personal knowledge in authentication in both digital and telephone channels.

Download PDF

TRUSTID supports commercial and government organizations by providing authentication solutions that replace use of knowledge-based authentication. The table below summarizes some of the most relevant guidelines and regulations.

Related Resources