Audience

AML solution for businesses wanting to verify users

About Alibaba eKYC

Supports mainstream public cloud bases and private deployment and allows you to customize AI capabilities to meet your business requirement. Allows you to customize the eKYC process, which involves document verification, optical character recognition (OCR), similarity check, and liveness detection based on comprehensive algorithms provided by Alibaba Group. It only identifies masked feature data and does not store the data. This ensures data security. Protects against most fake documents and Presentation Attacks (PA) to ensure the authenticity of ID Verification.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Alibaba Cloud
Founded: 2008
China
www.alibabacloud.com/es/product/ekyc

Videos and Screen Captures

Alibaba eKYC Screenshot 1
Other Useful Business Software
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Webinars
Videos
Support
Phone Support
Online

Alibaba eKYC Frequently Asked Questions

Q: What kinds of users and organization types does Alibaba eKYC work with?
Q: What languages does Alibaba eKYC support in their product?
Q: What kind of support options does Alibaba eKYC offer?
Q: What type of training does Alibaba eKYC provide?

Alibaba eKYC Product Features

AML

Transaction Monitoring
Watch List
Identity Verification
Case Management
Behavioral Analytics
Risk Assessment
PEP Screening
SARs
Investigation Management
Compliance Reporting

KYC