Endpoint

7/3/2018
08:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Miteks Mobile Verify Selected by New Cryptocurrency Trader, DXE

Automated ID Verification Solution Speeds Compliance

SAN DIEGO, CALIF. and LONDON, UK, July 3, 2018 - Mitek (NASDAQ: MITK), a global leader in digital identity verification solutions, today announced it will provide automated ID verification for new cryptocurrency trading platform, DXE. Mitek’s Mobile Verify solution will help DXE provide KYC-compliant identity verification for all customers from the platform’s go live date, as part of DXE’s ambition to stay ahead of future regulatory requirements. Mitek’s technology is part of DXE’s efforts to provide compliant customer onboarding ahead of the enforcement of the revised Anti-Money Laundering Directive (AMLD5), which has been extended to cryptocurrency wallets and exchanges.

DXE’s vision is to provide a service that makes cryptocurrency trading more accessible for its customers. Aimed at those less proficient in digital currencies, Netherlands-based DXE will simplify the process of buying and selling cryptocurrency for its customers. Also part of DXE’s goal is to ensure proper due-diligence and KYC processes are adhered to. The anonymity of cryptocurrency has put it in danger of being seen as the newest form of “shadow banking” – attracting the attention of regulators. With increasing regulatory pressure in the industry, DXE has enlisted the help of Mitek in its efforts to ensure the company can be as transparent and compliant as possible right from the launch date.

Using Mobile Verify, which employs advanced AI and machine learning algorithms, DXE can verify all new customers that register for the platform in real-time. New applicants can capture an image of their ID documents using the camera on their smartphone. Mitek’s software provides data to allow our customers to authenticate the documents submitted to them. This enables fast, frictionless on-boarding that helps DXE satisfy future KYC onboarding regulations.

“We wanted to partner with Mitek to demonstrate that we are a platform that could be trusted, by both regulators and the public,” said Ernstjan Overduin, CEO, DXE. “We pride ourselves on making cryptocurrency trading simple and accessible for the everyday user. Mitek’s Mobile Verify offers a solution that helps us be both compliant with future regulations and is compatible with our vision for a simple customer experience.”

“As cryptocurrency continues to become mainstream there is a greater responsibility for legitimate businesses to adopt the KYC processes used in other regulated markets,” said René Hendrikse, Managing Director for EMEA, Mitek. “Pressure from regulators is growing fast so companies like DXE are right to get everything “above board” with measures in place to verify the identity of their customers. At Mitek we want to ensure that the introduction of secure identity verification is seamless for the customer to speed up the registration process.”

About Mitek

Mitek (NASDAQ: MITK) is a global leader in digital identity verification solutions built on the latest advancements in AI and machine learning. Mitek’s identity verification solutions allow an enterprise to verify a user’s identity during a digital transaction. This enables financial institutions, payments companies and other businesses operating in highly regulated markets to mitigate financial risk and meet regulatory requirements while increasing revenue from digital channels. Mitek also reduces the friction in the users’ experience with advanced data prefill and automation of the onboarding processes. Mitek’s innovative solutions are embedded into the apps of more than 6,100 organizations and used by more than 80 million consumers. For more information, visit www.miteksystems.com or www.miteksystems.co.uk. (MITK-F)

Mitek Contact:

Nicole Louis

CCgroup for Mitek

[email protected] 

+44 203 824 9200

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20050
PUBLISHED: 2018-12-10
Mishandling of an empty string on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via the ONVIF GetStreamUri method and GetVideoEncoderConfigurationOptions method.
CVE-2018-20051
PUBLISHED: 2018-12-10
Mishandling of '>' on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via certain ONVIF methods such as CreateUsers, SetImagingSettings, GetStreamUri, and so on.
CVE-2018-20029
PUBLISHED: 2018-12-10
The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6.4.6 on Windows 10 allows local users to cause a denial of service (BSOD) because uninitialized memory can be read.
CVE-2018-1279
PUBLISHED: 2018-12-10
Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on ...
CVE-2018-15800
PUBLISHED: 2018-12-10
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.