Operations //

Identity & Access Management

2/13/2019
11:05 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GBG acquires Atlanta-based IDology for $300 Million

The acquisition will expand UK-based GBG's global identity verification and fraud prevention capability in a key growth market.

LONDON, Feb. 11, 2019 /PRNewswire/ -- GBG, the UK-headquartered Identity Data Intelligence specialist, announces that it has conditionally agreed to acquire the entire issued share capital of IDology, a US-based provider of identity verification and fraud prevention services, for $300m (£233m) in an all-cash transaction.

IDology is a fast-growing provider of identity verification services that helps remove friction both in onboarding customers and in the detection of fraud. Its market-leading US identity verification and fraud prevention services, led by its ExpectID product range, are the perfect strategic complement to GBG's identity verification solutions.

GBG can quickly validate and verify the identity and location of 4.4 bn people globally and accesses a breadth of data from over 200 global partners to establish trust between businesses and their customers. Having completed 11 acquisitions since 2011, GBG's $300m acquisition of IDology is its largest to date.

GBG has seen strong growth in the US market. Its existing US identity business has grown organically with customers across technology, payments and retail verticals. Meanwhile Loqate, its location intelligence solution, has offices in New York City and San Francisco and has seen high demand from household names like Abercrombie and Fitch, Oracle and Nordstrom.  The acquisition will strengthen GBG's broader portfolio and enhance the business' product capability and customer reach.

Over the course of 2018, IDology delivered revenues of $38.2m at a CAGR of 16%, and EBITDA of $16.3 million.  The company will retain its entire senior management team and the employee base of IDology will join GBG. 

Today, IDology has established itself as the market leader in domestic identity verification and authentication which enables fraud prevention across multiple sectors. The acquisition will strengthen GBG's portfolio, enhancing the business' product capability and customer reach.

GBG and IDology have a history of working together in partnership and share a similar culture with a strong emphasis on people and talent.  IDology's US customer base currently accounts for 99% of its revenue, which will provide GBG with geographic scale and help to position GBG as a global leader in electronic identification verification. 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...
CVE-2019-9942
PUBLISHED: 2019-03-23
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
CVE-2018-20165
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
CVE-2019-1716
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
CVE-2019-1763
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...