In The News

< 1 minute read
    CENTREVILLE, Va., Feb. 24, 2026 /PRNewswire/ — ID Dataweb™, a recognized leader in identity threat detection and risk mitigation, today announced it has been named a recipient of the 2026 SLED Industry Excellence (SLEDIE) Rising Star Award by e.Republic. The

    The latest from ID Dataweb

    • Media Coverage
    < 1 minute read
    ID Dataweb and IDMWORKS launched a managed service integrating adaptive identity proofing into IAM operations to reduce fraud risk and secure third-party access.
    • Press Release
    < 1 minute read
    CORAL GABLES, Fla. and CENTREVILLE, Va., September 23, 2025 – ID Dataweb and IDMWORKS launched a managed service to secure third-party access, embedding adaptive identity proofing into IAM operations to reduce fraud risks.
    • Media Coverage
    < 1 minute read
    ID Dataweb VP Spencer Crane authored a feature in Hospitality Tech explaining how hotels can move beyond one-time logins to establish continuous digital trust.
    • Media Coverage
    < 1 minute read
    ID Dataweb COO Matt Cochran authored a Hotel Online article on balancing cybersecurity with seamless service, highlighting zero trust and loyalty fraud protection.
    • Media Coverage
    < 1 minute read
    ID Dataweb CEO David Coxe shares how hotels can defend loyalty programs, call centers, and vendor systems from cyber threats through identity verification.
    • Media Coverage
    < 1 minute read
    ID Dataweb CEO Dave Coxe was featured on The Security Podcasts from Security Magazine, discussing how to make sound security decisions in chaotic environments.

    Recent case studies

    Case study

    A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

    Case study

    Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

    Case study

    See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

    Case study

    Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

    Case study

    Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

    Case study

    Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

    The ID Dataweb Blog

    4 minute read
    Some of the most disruptive breaches in recent years began with nothing more than a compromised credential. Organizations that continue to focus primarily on perimeter controls and point-in-time authentication are defending against an outdated threat model.
    4 minute read
    When we talk about cyber threat intelligence in 2026, the perimeter that matters most is identity. Intelligence enterprises need to defend against identity-based attacks looks different from the traditional threat feeds most security operations centers rely on.
    4 minute read
    This blog examines how traditional identity verification and access management controls are increasing risk for state and local government agencies. It also explains how identity threat detection and risk mitigation can strengthen existing defenses and better protect public sector systems.
    4 minute read
    With compromised credentials now reported as the most common attack vector, Identity and Access Management (IAM) has become central to enterprise cybersecurity. This guide outlines 6 key considerations for an IAM program to succeed.
    3 minute read
    Authentication that relies on static personal information cannot stop modern account takeover chains. Organizations now need ongoing identity threat detection and risk mitigation layered around verification processes.
    3 minute read
    Stale credentials, outdated phone numbers, and orphaned accounts may be unglamorous, but they routinely undermine otherwise robust identity fraud and security defenses. Read more about the role of data hygiene in identity security.

    Secure your business today