Face Check With Microsoft Entra Verified ID Is Now Generally Available, Microsoft

Microsoft announced that Face Check with Microsoft Entra Verified ID is now generally accessible.

It is available standalone and as part of the Microsoft Entra Suite, a comprehensive identity solution that combines network access, identity protection, governance, and identity verification features to provide Zero Trust access.

Notably, earlier this year, the business provided a public preview of Face Check with Microsoft Entra Verified ID.

The Face Check feature, which is the first premium capability of Microsoft Entra Verified ID, respects privacy by using face matching for high-assurance identification verifications. 

Microsoft Entra Verified ID is built on open standards, allowing enterprises to verify a wide range of credentials with a simple API.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Verified ID works with a number of the top verification partners to validate identity features (such as a driver’s license and a liveness match) for individuals across 192 countries. 

Identity Verification Is More Crucial

In 66% of attack pathways, bad actors employ insecure credentials, increasing the danger of impersonation and account takeover.

Further, deepfakes and other sophisticated impersonation techniques are becoming more popular as generative AI advances.

Numerous companies frequently provide a remote help desk and remote onboarding for new hires.

Hence, the enterprises do not know who is using these digital interactions if there is no robust identity verification.

Common verification techniques, such as asking you which street you grew up on or counting the number of bicycles on a CAPTCHA, are easily evaded by impersonators.

Hundreds of enterprises now utilize Verified ID for self-service recovery and remote onboarding of new users, helping to lower fraud. 

Face Check Enhances Identity Verification

Face Check, which is powered by Azure AI services, matches a user’s real-time selfie with the photo on their Verified ID—typically a photo from a reliable source like a passport or driver’s license—to add a crucial degree of confidence. 

“By sharing only match results and not any sensitive identity data, Face Check strengthens an organization’s identity verification while protecting user privacy”, Microsoft.

To completely protect users’ identities, it can recognize and reject a variety of spoofing attempts, including deepfakes.

Also, the functionality increased customer issue resolution efficiency by 90%. 

“Security is always great when you apply it in layers, and this verification is an additional layer that we’ll be able to provide to our customers. It’s one more way we can help them feel secure.” – Jose Castelan, Support and Managed Services Team Lead, BEMO.

To find out more about how your company can use Face Check with Microsoft Entra Verified ID.

There are two ways you may activate Face Check and begin confirming after setting up your Verified ID tenant:

  • Begin the Entra Suite free trial, which includes 8 Face Check verifications per user per month.
  • Enable Face Check within Verified ID and pay $0.25 per verification.

Organizations can increase Verified ID’s functionalities to offer an array of verification options suitable for your company’s unique requirements.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Acces

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

1 day ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

1 day ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

1 day ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

1 day ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

1 day ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago