HR Execs on the Move


 
iProov creates digital trust with biometric authentication. We ensure that online users are genuinely present in uncontrolled environments, combining face biometrics and anti-spoofing. Our unique approach to spoof prevention (covered by 12 granted patents), world-class deep learning technologies and focus on sustainable security have given us an unrivalled global reputation. We detect and prevent all known identity spoof attack vectors including masks, replay attacks, compromised devices, and - critically - the emerging threat of Deep Fake artificial video. Customers in Financial services and Enterprise markets have adopted our systems for online logon, step-up authentication, and for remote identity verification based ...
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.iproov.com
  • Research Park Drive
    Catonsville, MD USA 21228
  • Phone: 231.201.6944

Executives

Name Title Contact Details
Nicole Rowe
Chief Marketing Officer Profile

Similar Companies

nSoln

nSoln is a Germantown, MD-based company in the Software and Internet sector.

Universal Fiber Optics

Universal Fiber Optics is a Sarasota, FL-based company in the Software and Internet sector.

Ellington

Ellington is a Lawrence, KS-based company in the Software and Internet sector.

Before Networks

Before Networks is a Elmwood Park, NJ-based company in the Software and Internet sector.

Traceable AI

Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.