Endpoint

7/3/2018
08:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Miteks Mobile Verify Selected by New Cryptocurrency Trader, DXE

Automated ID Verification Solution Speeds Compliance

SAN DIEGO, CALIF. and LONDON, UK, July 3, 2018 - Mitek (NASDAQ: MITK), a global leader in digital identity verification solutions, today announced it will provide automated ID verification for new cryptocurrency trading platform, DXE. Mitek’s Mobile Verify solution will help DXE provide KYC-compliant identity verification for all customers from the platform’s go live date, as part of DXE’s ambition to stay ahead of future regulatory requirements. Mitek’s technology is part of DXE’s efforts to provide compliant customer onboarding ahead of the enforcement of the revised Anti-Money Laundering Directive (AMLD5), which has been extended to cryptocurrency wallets and exchanges.

DXE’s vision is to provide a service that makes cryptocurrency trading more accessible for its customers. Aimed at those less proficient in digital currencies, Netherlands-based DXE will simplify the process of buying and selling cryptocurrency for its customers. Also part of DXE’s goal is to ensure proper due-diligence and KYC processes are adhered to. The anonymity of cryptocurrency has put it in danger of being seen as the newest form of “shadow banking” – attracting the attention of regulators. With increasing regulatory pressure in the industry, DXE has enlisted the help of Mitek in its efforts to ensure the company can be as transparent and compliant as possible right from the launch date.

Using Mobile Verify, which employs advanced AI and machine learning algorithms, DXE can verify all new customers that register for the platform in real-time. New applicants can capture an image of their ID documents using the camera on their smartphone. Mitek’s software provides data to allow our customers to authenticate the documents submitted to them. This enables fast, frictionless on-boarding that helps DXE satisfy future KYC onboarding regulations.

“We wanted to partner with Mitek to demonstrate that we are a platform that could be trusted, by both regulators and the public,” said Ernstjan Overduin, CEO, DXE. “We pride ourselves on making cryptocurrency trading simple and accessible for the everyday user. Mitek’s Mobile Verify offers a solution that helps us be both compliant with future regulations and is compatible with our vision for a simple customer experience.”

“As cryptocurrency continues to become mainstream there is a greater responsibility for legitimate businesses to adopt the KYC processes used in other regulated markets,” said René Hendrikse, Managing Director for EMEA, Mitek. “Pressure from regulators is growing fast so companies like DXE are right to get everything “above board” with measures in place to verify the identity of their customers. At Mitek we want to ensure that the introduction of secure identity verification is seamless for the customer to speed up the registration process.”

About Mitek

Mitek (NASDAQ: MITK) is a global leader in digital identity verification solutions built on the latest advancements in AI and machine learning. Mitek’s identity verification solutions allow an enterprise to verify a user’s identity during a digital transaction. This enables financial institutions, payments companies and other businesses operating in highly regulated markets to mitigate financial risk and meet regulatory requirements while increasing revenue from digital channels. Mitek also reduces the friction in the users’ experience with advanced data prefill and automation of the onboarding processes. Mitek’s innovative solutions are embedded into the apps of more than 6,100 organizations and used by more than 80 million consumers. For more information, visit www.miteksystems.com or www.miteksystems.co.uk. (MITK-F)

Mitek Contact:

Nicole Louis

CCgroup for Mitek

[email protected] 

+44 203 824 9200

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11763
PUBLISHED: 2018-09-25
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
CVE-2018-14634
PUBLISHED: 2018-09-25
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerabl...
CVE-2018-1664
PUBLISHED: 2018-09-25
IBM DataPower Gateway 7.1.0.0 - 7.1.0.23, 7.2.0.0 - 7.2.0.21, 7.5.0.0 - 7.5.0.16, 7.5.1.0 - 7.5.1.15, 7.5.2.0 - 7.5.2.15, and 7.6.0.0 - 7.6.0.8 as well as IBM DataPower Gateway CD 7.7.0.0 - 7.7.1.2 echoing of AMP management interface authorization headers exposes login credentials in browser cache. ...
CVE-2018-1669
PUBLISHED: 2018-09-25
IBM DataPower Gateway 7.1.0.0 - 7.1.0.23, 7.2.0.0 - 7.2.0.21, 7.5.0.0 - 7.5.0.16, 7.5.1.0 - 7.5.1.15, 7.5.2.0 - 7.5.2.15, and 7.6.0.0 - 7.6.0.8 as well as IBM DataPower Gateway CD 7.7.0.0 - 7.7.1.2 are vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote atta...
CVE-2018-1539
PUBLISHED: 2018-09-25
IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 could allow remote attackers to bypass authentication via a direct request or forced browsing to a page other than URL intended. IBM X-Force ID: 142561.