4.7
14 Reviews (All time)
Review weighting

Browse Regula Reviews

Regula is present in 2 markets with 2 products. Regula has 14 reviews with an overall average rating of 4.7.

Identity Verification

Gartner defines identity verification as the combination of activities during a remote interaction that brings a real-world identity claim within organizational risk tolerances. Identity verification capabilities, delivered as SaaS or on-premises, provide the assurance that a real-world identity exists and that the individual claiming the identity is its true owner and genuinely present during a remote interaction. The purpose of identity verification is to establish confidence in the identity of a person during a remote interaction when curated credentials do not exist, are not available or do not provide sufficient assurance. Identity verification is used for a variety of business purposes, such as: - Compliance (e.g., know-your-customer obligations) - Onboarding (e.g., customer registration, remote workforce hiring and employee onboarding processes) - Account security (e.g., support for credential management processes, such as credential enrollment and account recovery) - Mitigating fraud risk (e.g., preventing fraudulent registrations using stolen or synthetic identities, enabling remote proctoring/invigilation, and securing high-risk transactions) - Trust and safety (e.g., improving accountability in marketplaces, providing assurance in the gig economy and establishing trust in larger identity networks)

Regula has 1 product in Identity Verification market

User Authentication

Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.

Regula has 1 product in User Authentication market