sumsub_magicquadrant_gartner
sumsub_magicquadrant_gartner
The growing identity verification market helps deliver security, compliance and trust
across onboarding and other use cases. This Magic Quadrant evaluates 11 vendors to
help IAM leaders select the best choice to meet their core requirements and offer
lasting value.
Market Definition/Description
Identity verification is used for a variety of business use cases, such as:
Mandatory Features
The mandatory features for this market include:
Common Features
• Support for video calls during the identity verification process, so that agents
can interact with people to assess their identity claims (as required by
regulation in some markets). The vendor may either supply the agents or
simply provide platform features that enable organizations to use their own
agents.
Magic Quadrant
1Kosmos is a Niche Player in this Magic Quadrant. Its BlockID Verify product can be
sold individually or bundled with its BlockID Workforce or BlockID Customer digital
identity wallet and passwordless authentication solutions. Its operations are mostly
focused in North America and APAC, and its clients tend to be large organizations in
financial services, healthcare and telecom, with a small percentage in government.
About one-third of clients use 1Kosmos for workforce use cases.
Recently added features include expanded coverage of more document types and the
ability to configure more granular policies governing data retention. 1Kosmos’
roadmap items include development of a database of fraudulent identity data and the
addition of a live-agent video call to resolve exceptions in the IDV process.
Strengths
• Its IDV solution is tightly integrated with its digital identity wallet, which is
widely deployed in both workforce and customer use cases. Its digital identity
wallet offering is highly mature.
• The option to bundle provides additional features beyond IDV, including digital
identity wallet and passwordless authentication solutions. Bundling makes it
an effective solution for workforce use cases, such as onboarding and account
recovery.
Cautions
AU10TIX
AU10TIX is a Visionary in this Magic Quadrant. Its IDV product is aimed solely at
customer use cases. Its operations are geographically diversified, and its clients tend
to be large organizations in financial services, cryptocurrency and the sharing
economy.
Recent product developments include partnering with Microsoft (via the Microsoft
Entra verified ID product) to deliver a reusable digital identity solution and introducing
Serial Fraud Monitor to check presented identity data against previous identity
presentations. AU10TIX’s roadmap items include enhanced deepfake detection and
enhanced tools for administrators.
Strengths
• Its customer base has a diverse geographic spread. It also has a highly diverse
list of top document types processed in 2023, and it supports a wide range of
character sets and languages for document OCR.
Cautions
• It was unable to provide granular insights into user experience (UX) metrics,
such as the number of image retakes that were due to poor quality. It may,
therefore, lack sufficient data to address UX issues, should they arise.
• It had few examples of features that are industry-specific, and it was ineffective
at demonstrating how its sales and marketing teams are structured to address
different industry requirements.
Entrust
Recently added features include the Studio no-code visual workflow editor tool and
new Motion liveness detection solution. Entrust’s roadmap items include enhanced
deepfake detection and adding connections to government electronic identification
(eID) schemes globally.
Strengths
• Its Studio no-code visual workflow editor easily allows customers to drag and
drop “tasks” within the IDV journey and apply conditional logic to the outputs
of those tasks. The interface is intuitive and enables users to create a single,
flexible IDV journey definition.
• Customers surveyed for this Magic Quadrant gave it a high score for customer
satisfaction. It provides granular data on how it measures customer
satisfaction and how this has changed over time. It can candidly identify areas
for continual improvement of customer satisfaction.
Cautions
• The percentage of its IDV checks requiring a final decision from a human to
drive up pass rates is high — even considering some markets’ regulatory
requirements for human involvement. In some cases, human involvement
addresses shortcomings in its automated processing. For example, it does not
offer full automation of OCR in non-Latin character sets. This high use of
human involvement drives up average processing time.
• The pricing is higher for a global spread of documents than for U.S. documents
only. This variance is unusual, and is likely due to its reliance on human
involvement for document types it sees less often and with non-Latin character
sets.
• Its discount offers for customers signing multiyear deals are low, which likely
contributed to the low rate of customers signing multiyear deals in 2023.
GB Group
GB Group (GBG) is a Niche Player in this Magic Quadrant. Its IDScan product can be
sold stand-alone or bundled with other services, such as its compliant onboarding
solution ID3Global. Its operations are mostly focused in North America and Europe,
and clients tend to be organizations of varying size in financial services, gambling and
travel, mainly for customer use cases.
Strengths
• The IDV solution is part of the identity division within the larger GB Group and
is, thus, highly viable. Although it does not generate high revenue specifically
from IDV, it has a large number of customers using its IDV solution. In addition,
it had a high renewal rate in 2023.
• It offers quality image capture and verification, which reflects rigor in
document capture and face matching. Notably it provides a credible, detailed
explanation regarding its process for training and evaluating the machine
learning (ML) models used for document assessment.
Cautions
• Its VPAT showed that people with disabilities would find it hard or impossible to
use the IDV solution, automated accessibility checks yielded poor results, and
its SDK does not support assistive technology (e.g., voice assistance for users
with impaired vision). These findings may be a concern as accessibility
becomes an increasingly important requirement, and in some markets, a
regulatory obligation.
Incode Technologies
Incode Technologies is a Leader in this Magic Quadrant. Its IDV product is aimed
mainly at customer use cases, with a modest percentage of clients using it in
workforce use cases. Its operations are largely focused in North America and Latin
America; clients are large organizations in financial services, travel and government.
Recently added features include its Workflows no-code orchestration tool and its age-
estimation product. Incode’s roadmap items include enhancing injection attack
detection and building turnkey IDV features specifically for workforce use cases.
Strengths
• Its solution is easy to configure, with a clean and intuitive interface. This
usability is largely driven by its Workflows no-code IDV journey editor, which
allows users to drag and drop components of the IDV process and use
conditional logic to control the user journey and potential step-up fraud
checks.
• It offers a novel pricing model, with SLAs linked to conversion rate and fraud
outcomes. Failure to meet the SLAs results in heavy discounts. This strategy is
a potentially disruptive alternative to the standard per-verification pricing,
which is decoupled from performance outcomes.
Cautions
Jumio
Jumio is a Leader in this Magic Quadrant. Its IDV product is primarily targeted at
customer use cases, with a small percentage of clients using it for workforce use
cases. Its operations are geographically diversified; clients are large organizations in
financial services, cryptocurrency and gambling, among others.
Strengths
• It can clearly articulate how its acquisitions have enhanced its IDV business
and how market disruptors — such as government eID schemes, portable
digital identity and the convergence of IDV with cybersecurity — will impact it.
• It has a clear sales methodology and shows strong alignment between the
sales and product teams via an in-depth field enablement program. It has one
of the most globally distributed direct sales teams, and it had a high deal-
closing ratio in 2023.
Cautions
• The percentage of its IDV checks requiring a final decision from a human to
drive up pass rates is high — even considering some markets’ regulatory
requirements for human involvement. In some cases, human involvement
addresses shortcomings in its automated processing, such as unsupported
document types. This high use of human involvement drives up processing
time.
• The pricing is higher for a global spread of documents than for U.S. documents
only. This variance is unusual, and is likely due to its reliance on human
involvement for document types it sees less often.
Mitek Systems
Mitek Systems is a Visionary in this Magic Quadrant. Its Mitek Verified Identity
Platform (MiVIP) product is aimed primarily at customer use cases, with a small
percentage of clients using it for workforce use cases. Its operations are focused
mainly in Europe and North America; clients are mostly large organizations in financial
services, gambling and travel.
Recently added features include enhanced deepfake and injection attack detection
and duplicate identity detection. Mitek Systems’ roadmap items include adding the
ability to issue verifiable credentials in its existing reusable identity wallet product, as
well as improving the configurability and speed of its products.
Strengths
Cautions
• Its business focuses on North America and Europe, with very minor activity in
Latin America and no direct or indirect sales presence in any other regions. It
processed identity documents from a limited range of countries in 2023 and
supports relatively few character sets and languages for OCR.
Persona
Persona is a Challenger in this Magic Quadrant. Its IDV product is aimed mainly at
customer use cases. Its operations are focused primarily in North America, with
clients of varying sizes in financial services, marketplaces, social media and other
areas.
Recent product developments include its Dynamic Flow no-code visual workflow
editor and its Graph tool for linking and investigating identity data. Persona’s roadmap
items include enhanced deepfake detection and a self-service query and analytics
tool.
Strengths
• It offers strong fraud and risk controls, as well as native capabilities, such as
location intelligence, device profiling and behavioral analysis, to provide
contextual risk and trust signals. It also offers detailed insights via its Graph
network feature and granular policy control, giving customers flexibility as to
how they leverage the data.
• Its prices are low, and it does not offer multiyear contracts because it wants
clients to renew by choice each year. It makes a contractual commitment to
not increase pricing at renewal time. In addition, it offers a permanent free tier
(as opposed to a free trial) for low-volume customers with simple
requirements.
Cautions
• Its availability is below average; however, its uptime for 2023 was within its
SLA. Its SaaS solution is hosted in Google Cloud Platform, and its uptime SLA
was in line with the market average. The provided uptime data included legacy,
shared tenancy deployments; however, new deployments can now be on more
resilient single tenancy infrastructure.
• It is North America-focused. Most of its customers are in the U.S., and it has no
sales presence outside North America or Mexico. Its strategy for acquiring
customers in other countries is nascent. However, it did process a reasonably
diverse set of global identity documents in 2023.
Socure
Socure is a Leader in this Magic Quadrant. Its Predictive DocV product is aimed
primarily at customer use cases, with a small percentage of clients using it for
workforce use cases. Its operations are focused mainly in North America, where it is
used by large organizations, but it also has some presence in Europe and Latin
America, with smaller organizations via channel partners. Clients tend to be in
financial services and marketplaces.
Recently added features include a new IDV forensic engine via its acquisition of
Berbix. Socure’s roadmap items include adding user authentication, by means of
selfie reverification, and extracting unstructured data from documents, such as bank
statements.
Strengths
• It offers strong fraud risk and controls. Its Digital Intelligence module gathers
contextual signals related to location, device and user behavior. These data
points can be assessed alone or checked against the SocureID identity graph,
with the results then combined with the IDV check to reach an overall decision.
• It serves a wide range of industries, and its sales and marketing structure has a
vertical focus, with a range of product features tailored to different verticals,
such as reverification of delivery drivers. It is close to achieving Federal Risk
and Authorization Management Program certification to serve U.S. public-
sector customers.
Cautions
• Although it reports that about one-third of its customers are outside the U.S.,
almost all its processed documents are North American. It supports a wide
range of character sets and languages for OCR, but it was unable to
demonstrate actual experience in processing a diverse set of global identity
documents at scale.
Sumsub is a Leader in this Magic Quadrant. Its IDV product is aimed primarily at
customer use cases, with a small percentage of clients using it for workforce use
cases. Its operations are geographically diversified with clients of varying sizes in
financial services, cryptocurrency and gambling, among others.
Strengths
• It showed high diversity in the locations of its customer base and the top
document types processed in 2023. It supports a wide range of character sets
and languages for document OCR and offers out-of-the-box versions of its
administrative portal in English, Spanish, Portuguese and Chinese. In addition,
it has built a broad range of connections to authoritative government identity
sources in different countries.
Cautions
• It has not submitted its proprietary face-matching algorithms to the U.S. NIST
for testing, stating that it prefers to rely on its own benchmarking.
• It delivered numerous IDV-specific features in 2023, but its stated roadmap for
2024 focuses more on IDV-adjacent features, such as AML and payment
source verification, which lack relevance beyond compliance use cases. In
addition, it failed to articulate a clear product strategy for portable digital
identity.
• While an automated accessibility check showed strong results, it declined to
provide a VPAT, which would have yielded more detailed insights. This finding
may be a concern as accessibility becomes an increasingly important
requirement, and in some markets, a regulatory obligation.
ZOLOZ
ZOLOZ is a Niche Player in this Magic Quadrant. Its IDV product is aimed only at
customer or citizen use cases. Its operations are focused in China and other APAC
markets with clients of varying sizes in financial services, marketplaces and
government.
Recently added features include its ID Network identity graph product, to uncover
fraud rings, and connectivity to the Chinese Ministry of Public Security’s authoritative
identity database. ZOLOZ’s roadmap items include mobile app security assessments
and being able to support on-premises deployments.
Strengths
• All of its customers are in APAC, with approximately half in China. Clients with
a strong APAC focus may benefit from its expertise with APAC document types,
regulation and — in particular — connectivity to authoritative government
sources, such as the Chinese Ministry of Public Security.
Cautions
We review and adjust our inclusion criteria for Magic Quadrants as markets change.
As a result of these adjustments, the mix of vendors in any Magic Quadrant may
change over time. A vendor's appearance in a Magic Quadrant one year and not the
next does not necessarily indicate that we have changed our opinion of that vendor. It
may be a reflection of a change in the market and, therefore, changed evaluation
criteria, or of a change of focus by that vendor.
Added
Dropped
To qualify for inclusion in this Magic Quadrant, vendors had to meet the following
must-have capabilities (also found in the identity
verification Market Definition section):
• At least $40 million in identity verification revenue in fiscal year 2023, and at
least 15% year-over-year growth when compared to fiscal year 2022
• At least $30 million in identity verification revenue in fiscal year 2023, and at
least 30% year-over-year growth when compared to fiscal year 2022
Honorable Mentions
Daon: Daon has a global customer base and offers IDV capability as part of its
broader identity life cycle and authentication platform. The IDV capability can be
deployed stand-alone, or it can be tightly coupled with other authentication
capabilities, such as face and voice biometrics and FIDO/UAF passkeys. In addition to
its SaaS offering, Daon has a software offering that’s both cloud-based and self-
managed, and extensive experience deploying it to meet complex implementation
requirements. Daon did not meet the revenue inclusion criteria.
ID-Pal: ID-Pal is headquartered in Ireland, with a focus on the U.K., the U.S. and
Europe, serving small, midtier and enterprise businesses. ID-Pal differentiates
through its approach to privacy and ensuring user data can be decrypted and
accessed only by its customers. ID-Pal did not meet the revenue inclusion criteria.
IDWise: IDWise is a newer vendor, founded in 2020 and headquartered in the U.K.,
which has built its IDV solution to focus on use cases in emerging markets globally. Its
solution focuses on handling legacy devices, diverse and low-quality ID documents,
accuracy with non-Latin character sets and strict data residency requirements.
IDWise did not meet the revenue inclusion criteria.
Intellicheck: Intellicheck is a U.S.-focused IDV vendor that specializes in verifying U.S.
drivers’ licenses. Intellicheck is differentiated from other IDV vendors through its
unique status as the sole “courtesy verification provider” for U.S. Departments of
Motor Vehicles, which gives it privileged information regarding security features within
the bar codes on U.S. drivers’ licenses. Intellicheck did not meet the revenue inclusion
criteria.
Nametag: Nametag is a newer IDV vendor, founded in 2020 and headquartered in the
U.S. It differentiates itself in the market with a cryptographic approach to preventing
injection attacks, and by focusing only on the account recovery use case for workforce
and customers. It has built deep integrations with a range of access management and
IT service management platforms to enable turnkey deployment. Nametag did not
meet the revenue inclusion criteria.
Regula: Regula is headquartered in Latvia and its core business for decades has been
manufacturing hardware and technology for document verification. It also has a
complete IDV solution for remote verification. It is unusual in the IDV market for not
having a SaaS platform and offering its solution only as software, which can meet
requirements for customers who don’t want their users’ data being handled by a third
party. Many other IDV vendors partner with Regula to leverage some or all of their IDV
capabilities. Regula did not meet the revenue inclusion criteria.
Veridas: Veridas is headquartered in Spain. Its IDV platform features face and voice
biometrics. Its IDV is also integrated with its own hardware for biometric physical
access control. It offers its own reusable digital identity solution, as well as a patented
biometric-within-a-QR-code solution. Veridas did not meet the revenue inclusion
criteria.
Evaluation Criteria
Product or Service: Core product that competes in the defined IDV market, which can
be offered natively or by using OEM components as defined in the market definition
and inclusion criteria. Includes the following subcriteria:
• UX and accessibility
Overall Viability: The organization’s overall financial health, as well as the success of
the IDV business unit if it is a subset of a larger organization. Examines the likelihood
of continued investment in the IDV product and the significance of the IDV product
within the vendor’s broader portfolio. Includes the following subcriteria:
• General
• IDV business-specific
Sales Execution/Pricing: The vendor’s capabilities in presales and sales activities. This
includes pricing strategies to support different IDV use cases and overall efficacy of
the sales channel when selling IDV to different industries with different IDV
requirements. Additional subcriteria include:
• Sales execution
• Pricing
• Scenarios
Market Responsiveness and Track Record: The ability to respond to evolving customer
needs for IDV, market and regulatory changes, and competitor activities.
Operations: The ability to use people, processes and technology to meet goals and
commitments in delivering an IDV solution. Includes acquisitions and divestitures
that may impact delivery of the vendor’s IDV product.
Ability to Execute
Enlarge Table
Operations Med
Market Understanding: The ability to understand the needs of IDV buyers and
translate these into IDV products and services. Includes processes for extracting
insight from customer and sales data.
Marketing Strategy: The creation of clear and differentiated messaging about IDV and
the vendor’s IDV product. Includes metrics used to measure the impact of marketing
activities.
Sales Strategy: The use of direct and indirect channels closely aligned with marketing
to drive revenue and business growth.
• Roadmap
• General
Business Model: The design, logic and execution of the vendor’s business proposition
to achieve continued growth and success.
Vertical/Industry Strategy: The strategy to direct investment and resources to meet the
needs of IDV buyers in specific industry segments. Includes the following subcriteria:
• Strategy
Geographic Strategy: The approach to meeting the needs of IDV buyers and their
specific needs in geographies outside the vendor’s home market. These include
differing regional requirements for storing personally identifiable information (PII),
handling of document types specific to different regions and emerging market needs,
such as the need to support legacy mobile devices.
Enlarge Table
•
Innovation High
Quadrant Descriptions
Leaders
Leaders deliver a broad and comprehensive IDV product that addresses a wide range
of use cases and customer needs. They have successfully built a significant installed
customer base and revenue stream. Leaders demonstrate a superior vision that goes
beyond simply doing more of the same at a larger scale. They also demonstrate strong
execution to bring that vision to fruition. They anticipate IDV requirements and in
some ways help shape the market.
Challengers
Challengers show strong execution, complete and specialized product features, and
have significant customer bases. They tend to have sales and brand presence within a
particular region or industry. However, Challengers do not have the same breadth of
vision as Leaders. Due to Challengers’ smaller size, some potential buyers may have
concerns regarding their long-term viability. Challengers have not yet demonstrated
the same maturity, scale of deployment or vision for IDV as Leaders. Rather, their
vision tends to be more focused on — or restricted to — specific geographies,
industries or use cases.
Visionaries
Visionaries provide products that meet many IDV customer requirements, but they
may not have the market penetration or maturity to execute as Leaders do. Visionaries
are noted for their innovative approaches to addressing IDV challenges. They may
have unique features, more so than vendors in other quadrants. Visionaries are often
innovation leaders in maturing markets such as IDV, and enterprises that seek the
latest solutions often look to Visionaries.
Niche Players
Niche players provide IDV technology that is a good match for specific use cases.
They may focus only on certain geographic regions or provide IDV as part of a broader
platform where it can be tightly coupled with complementary capabilities. They can
outperform many competitors in their specific area of focus. They do not always
compete purely on IDV capabilities. Brand awareness of them only as an IDV vendor is
usually low relative to vendors in other quadrants. Vision and strategy entirely from an
IDV perspective may not extend much beyond feature improvements to current
offerings to keep pace with the market. However, inclusion in this quadrant does not
reflect negatively on the vendor’s value in the more narrowly focused spectrum. Niche
solutions can be very effective in their areas of focus.
Context
The following commentary gives context and insight to support interpretation of the
Magic Quadrant.
Comparing vendors’ accuracy in the IDV process is very challenging. Instead, buyers
should seek data from vendors that is specific to:
• Their expectation or need for either fully automated flows or human agent
involvement
In most cases, testing a vendor against live production data for the target population
and use cases is the only way to obtain the reassurances buyers seek.
• The number of document types — Even for a given vendor, accuracy varied
across different document types due to their relative volumes. ML models
thrive on data and are typically more accurate for document types with larger
datasets.
• Inconsistent use of human agents — Many vendors offer the ability to use
human agents to make the final determination in an IDV check. The optional
nature of this capability further complicates any measurement of accuracy, as
the use of human agents would vary by customer of any given vendor.
However, there are some promising developments in this area. For example, the FIDO
Alliance has introduced its Document Authenticity (DocAuth) Certification Program
for Remote Identity Verification. Similarly, the U.S. Department of Homeland Security
launched its 2023 Remote Identity Validation Technology Demonstration. Both
programs have invited vendors to submit their technologies for testing. At the time of
this assessment, neither had published any results.
However, iBeta’s testing simply creates a baseline that all vendors meet and does not
facilitate further quantitative vendor comparison.
iBeta’s testing allows a generous false nonmatch rate (FNMR) (see Note 2). It was
previously unconstrained, then set at 20%, then reduced to 15%. In reality, few (if any)
IDV customers would tolerate 15% of their genuine users being declined in error. To
demonstrate that they go over and above the requirements of the iBeta ISO/IEC
30107-3 conformant testing, vendors use widely varying internal testing approaches,
which render comparison largely worthless.
In addition, ISO/IEC 30107-3 and other test regimens, such as NIST FATE PAD testing,
focus on presentation attacks alone. The threat landscape now also involves injection
attacks, and there are currently no standards for assessing injection attack detection
(see Note 1). However, the current development of European standard FprCEN/TS
18099 for biometric data injection attack detection holds some promise for future
standardized benchmarking in this area.
Buyers are often surprised to learn that many IDV vendors offer varying degrees of
human agent involvement behind the scenes to make a final decision after automated
processes are complete. For example, vendors may offer:
• Full automation for some document types — Some vendors may offer fully
automated flows on only some document types but rely on human agents for
others. Typically, human agents are used for less common document types
with fewer security features, or for documents containing character sets that
the vendor does not support.
• Human involvement for higher accuracy — Some vendors may offer a fully
automated flow for all document types but acknowledge that, for some
document types, the use of human agents can improve accuracy without
reducing pass rates. Customers of such a vendor must decide between
automation with lower accuracy or the use of human agents for supposedly
higher accuracy.
• Human involvement for regulatory compliance — Some vendors may offer the
use of human agents, not to improve accuracy or pass rates but to help
customers meet regulatory obligations. In some markets, notably within
Europe, a human agent must review any automated decision involving IDV,
particularly for financial services use cases.
• Human involvement for exception handling — Some vendors may offer a fully
automated solution across -all document types, with a claim of consistently
high accuracy, but also offer human agents to handle exceptions. For example,
human agents may step in if an invalid identity document is presented or if
images are low-quality.
Even vendors who do not offer any human agent capability still provide case
management systems that allow customers to use their own agents to drive up pass
rates, comply with regulation, or for exception handling. Thus, in today’s market, to
varying degrees, IDV is still a process that melds machine and human.
The use of vendor-provided human agents has several implications buyers should
consider:
• Concerns about protecting users’ PII — Vendors will need to demonstrate that
appropriate controls are in place to prevent human agents from abusing their
access to user PII. Requirements to keep user PII within certain geographic
regions are more difficult to meet if that data is sent to human agents operating
in a globally diversified model.
Attacks against the IDV process are not new. A range of “analog” presentation attack
vectors have been known for years (see Note 1), and IDV vendors have developed
defenses against them. However, now IDV vendors must also defend against more
“digital” approaches, such as injection attacks (see Note 2).
With the rapid evolution of generative AI, the risk of deepfake images and videos — of
documents and/or faces — has become greater. In response, many IDV vendors have
increased their investments in deepfake and injection attack detection. However,
buyers remain uncertain whether vendors can keep up with attackers.
• Location — Vendors can assess the location of a user’s device and correlate it
against the presented identity data. They can also look for anomalies in
repeated locations across different identity presentations.
• Device — Vendors can profile a user’s device to uniquely identify it and look for
anomalies, such as the same device being used for different identity
presentations.
The traditional approach to configuration gives customers a static menu where they
can toggle options on and off and set thresholds. Customers may need to repeat this
process several times to create different possible journeys, and there is little scope for
flexibility or conditional logic.
All vendors in this Magic Quadrant deliver IDV in a SaaS model, and most offer only a
SaaS model. However, vendors are attempting to offer flexibility with their SaaS
offerings. Most are hosted in Amazon Web Services (AWS), Microsoft Azure or GCP
across several regions as the default option. If customers require SaaS processing in a
given region only, some vendors are willing to set up new SaaS instances in those
regions — though they may increase prices to justify the investment.
A small minority of vendors can also deploy their IDV solutions as software for
customers to install and manage in their on-premises or private cloud environments.
Customers may prefer this method to satisfy regulations that require them to keep
user data within their infrastructure or within their geographic region. However,
vendors that do offer software deployments express a strong caveat that it is not the
preferred option. Besides the usual barriers to maintaining software (e.g., operational
costs, managing upgrades and updates, support), IDV delivered via software lacks
certain benefits, such as the updating of ML models in (near) real time with fraud
attack vectors or correlation of IDV data against identity graphs.
The goal of these questions and tests was to assess compliance with the Web
Content Accessibility Guidelines (WCAG), Version 2.1, Level “AA.” The results showed
large variations among vendors. Some declined to provide VPAT reports, some
believed they were compliant but testing results showed otherwise, and some openly
acknowledged they were deficient in this area. Several vendors performed reasonably
well.
IDV buyers should be clear about their own expectations regarding accessibility given
that, from an end-user perspective, the IDV process will be seen as part of the
organization’s interface and offering. With many vendors demonstrating barriers to
accessibility, buyers must consider how this will impact user experience, their brand
and their own regulatory obligations. To learn more, see 3 Digital Accessibility Steps
to a More Inclusive User Experience.
Market Overview
This Magic Quadrant was produced in response to market conditions for IDV,
including the following trends.
The market of vendors is growing. Gartner has observed that the number of vendors in
the IDV market continues to grow, and is currently tracking over 100 vendors. While
the core IDV process offered by them all is seemingly similar, there are many
differences between vendors. IDV product capabilities aside, the most notable
differentiation stems from geographic or industry focus. To add further complexity for
buyers, IDV is also being offered as part of broader platforms. Many stand-alone IDV
vendors focus on IDV alone. However, some vendors now offer IDV as part of an AM
tool, or as part of a broader biometric authentication tool. Finally, future market
consolidation is likely as IDV vendors consider acquiring competitors to buy market
share in new geographies or gain a foothold in new industries.
IDV is being applied to broader use cases. Historically, the dominant use case for
deploying IDV has been part of the customer onboarding process for regulated
organizations to meet their know your customer (KYC) use-case obligations. However,
Gartner has observed end-user organizations buying IDV solutions for an ever broader
range of use cases, including fraud detection, trust and safety in marketplaces,
workforce onboarding, age verification and account recovery. The latter example of
account recovery, particularly in the workforce context, has seen a surge of interest
since late 2023. A common requirement is to secure the account recovery process for
users with privileged access, or for regular users when multifactor authentication
(MFA) is not possible (e.g., the user has lost their device or token) to improve security
and reduce the operational burden on IT help desks.
Some IDV vendors are now connecting to such eID schemes and authoritative
sources to complement their standard IDV checks and add a further layer of defense
against identity impersonation and to provide different options to customers.
IDV is transitioning to digital identity. The IDV market is entering a period of transition,
as a broad and differing range of portable digital identity initiatives either mature,
enter the market or undergo large-scale pilot programs. No single “winner” is likely to
emerge in this race for portable digital identity adoption; what is more likely is a
patchwork of competing and complementary schemes for many years to come. These
solutions may or may not involve a dedicated digital identity wallet application for
mobile devices. As the adoption of portable digital identity grows over time, the total
addressable market for identity verification vendors will intuitively decrease as
discrete identity verification events are replaced with events in which users present
their already verified identity. An opportunity will still exist since most portable digital
identity solutions will be bootstrapped by an initial automated identity verification
event, which may also play a role in account recovery. However, today’s identity
verification vendors will need to strategically evolve their offerings to remain relevant
in this changing market.
This is Gartner’s first version of the Magic Quadrant for Identity Verification, replacing
the Market Guide for Identity Verification.
Evidence
• An extensive RFP questionnaire inquiring how each vendor delivers against the
fifteen evaluation criteria and eight critical capabilities defined for this market.
Additional evidence:
1
Relevant legislation:
• Virtual cameras
• JavaScript injection
• Smartphone emulators
The false nonmatch rate (FNMR), also referred to as the bona fide presentation
classification error rate (BPCER), is the percentage of genuine presentations during
liveness testing that is wrongly classified as attacks. This value should be as low as
possible. A higher value results in more genuine users being wrongly declined.
A VPAT is a document that helps buyers of IT products make informed decisions about
a product’s accessibility. The Information Technology Industry Council (ITIC) created
the VPAT template to help vendors document how their products meet the
accessibility standards of Section 508 of the Rehabilitation Act and other accessibility
standards, such as the Web Content Accessibility Guidelines (WCAG). For further
information see VPAT — Information Technology Industry Council.
Evaluation Criteria Definitions
Ability to Execute
Product/Service: Core goods and services offered by the vendor for the defined
market. This includes current product/service capabilities, quality, feature sets, skills
and so on, whether offered natively or through OEM agreements/partnerships as
defined in the market definition and detailed in the subcriteria.
Sales Execution/Pricing: The vendor's capabilities in all presales activities and the
structure that supports them. This includes deal management, pricing and
negotiation, presales support, and the overall effectiveness of the sales channel.
Marketing Execution: The clarity, quality, creativity and efficacy of programs designed
to deliver the organization's message to influence the market, promote the brand and
business, increase awareness of the products, and establish a positive identification
with the product/brand and organization in the minds of buyers. This "mind share" can
be driven by a combination of publicity, promotional initiatives, thought leadership,
word of mouth and sales activities.
Operations: The ability of the organization to meet its goals and commitments.
Factors include the quality of the organizational structure, including skills,
experiences, programs, systems and other vehicles that enable the organization to
operate effectively and efficiently on an ongoing basis.
Completeness of Vision
Market Understanding: Ability of the vendor to understand buyers' wants and needs
and to translate those into products and services. Vendors that show the highest
degree of vision listen to and understand buyers' wants and needs, and can shape or
enhance those with their added vision.
Sales Strategy: The strategy for selling products that uses the appropriate network of
direct and indirect sales, marketing, service, and communication affiliates that extend
the scope and depth of market reach, skills, expertise, technologies, services and the
customer base.
Business Model: The soundness and logic of the vendor's underlying business
proposition.
Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to
meet the specific needs of geographies outside the "home" or native geography, either
directly or through partners, channels and subsidiaries as appropriate for that
geography and market.