In The News

< 1 minute read
    In Credit Union Times, ID Dataweb’s Head of Financial Services, Mark Dreux, outlines how credit unions can combat new forms of identity-related fraud by adopting continuous verification and adaptive trust models to detect real-time risk.

    The latest from ID Dataweb

    • Press Release
    < 1 minute read
    CORAL GABLES, Fla. and CENTREVILLE, Va., September 23, 2025 – ID Dataweb and IDMWORKS launched a managed service to secure third-party access, embedding adaptive identity proofing into IAM operations to reduce fraud risks.
    • Media Coverage
    < 1 minute read
    ID Dataweb VP Spencer Crane authored a feature in Hospitality Tech explaining how hotels can move beyond one-time logins to establish continuous digital trust.
    • Media Coverage
    < 1 minute read
    ID Dataweb COO Matt Cochran authored a Hotel Online article on balancing cybersecurity with seamless service, highlighting zero trust and loyalty fraud protection.
    • Media Coverage
    < 1 minute read
    ID Dataweb CEO David Coxe shares how hotels can defend loyalty programs, call centers, and vendor systems from cyber threats through identity verification.
    • Media Coverage
    < 1 minute read
    ID Dataweb CEO Dave Coxe was featured on The Security Podcasts from Security Magazine, discussing how to make sound security decisions in chaotic environments.
      < 1 minute read
      ID Dataweb was recognized by WatersTechnology as Best Cyber-Security Provider in the Waters Rankings 2025, honoring its enterprise identity verification solutions.

      Recent case studies

      Case study

      A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

      Case study

      Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

      Case study

      See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

      Case study

      Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

      Case study

      Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

      Case study

      Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

      The ID Dataweb Blog

      3 minute read
      Device fingerprinting used to be sufficient. But with new privacy tools and account takeovers on the rise, security teams must supplement fingerprinting with broader signals to stop fraud.
      4 minute read
      Multiple studies now attribute “over 80 percent of all new-account fraud” to synthetic personas. Enterprise security teams need the technical power to weigh thousands of risk signals in real time to stop synthetic identities from onboarding.
      5 minute read
      Age gates were once edge‑case plumbing; now they sit squarely in the path of revenue and reputational risk. The good news is that adaptive, policy‑driven workflows can convert what used to be a blunt, ineffective blocker into compliant, parent‑aware verification.
      7 minute read
      If you’re an IT administrator, you know the pain of traditional workforce identity management. Provisioning accounts, verifying identities, handling contractors, disabling access for departures. Identity orchestration simplifies IAM.
      6 minute read
      In fraud prevention, robust machine identity is as critical as user identity – if you can’t trust what device is on the other end, you can’t fully trust the user.
      7 minute read
      Enterprises in finance, healthcare, insurance, and aviation are all seeing fraudsters exploit passwords and static KBA questions. Instead of a one-size-fits-all login process, an orchestrated approach evaluates diverse risk signals (device, network, user behavior, identity data, etc.) in real time,

      Secure your business today