{"id":42256,"date":"2022-09-29T16:43:34","date_gmt":"2022-09-29T16:43:34","guid":{"rendered":"https:\/\/veridas.com\/?p=42256"},"modified":"2024-02-12T09:16:11","modified_gmt":"2024-02-12T09:16:11","slug":"back-end-anti-fraud-security","status":"publish","type":"post","link":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/","title":{"rendered":"5 reasons to invest in back end anti-fraud technology"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42256\" class=\"elementor elementor-42256 elementor-42246\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e87061 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e87061\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-286383e\" data-id=\"286383e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7535c0 elementor-widget elementor-widget-text-editor\" data-id=\"f7535c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">The use of mobile devices has become widespread in recent years as a substitute for the laptop when performing multiple daily activities.\u00a0<\/span><\/p><p><span style=\"font-weight: 300;\">Viewing our social networks, sending a WhatsApp or reading the news are activities that we regularly perform from our smartphone. Sometimes we use a native APP. On other occasions, when the use is occasional, we access the web from the cell phone to carry out the corresponding management.<\/span><\/p><p><span style=\"font-weight: 300;\">This way of relating to the digital world through our mobile device also extends to cases in which we perform operations that require a higher level of security. For example, <\/span><a href=\"https:\/\/veridas.com\/success-stories\/bbva-case-digital-onboarding\/\"><span style=\"font-weight: 300;\">since 2017 it has been possible to open a bank account remotely in Spain<\/span><\/a><span style=\"font-weight: 300;\">. It is also possible to <\/span><a href=\"https:\/\/veridas.com\/success-stories\/acciona-mobility-your-motorbike-in-1-minute\/\"><span style=\"font-weight: 300;\">rent a car<\/span><\/a><span style=\"font-weight: 300;\"> or <\/span><a href=\"https:\/\/veridas.com\/success-stories\/staymyway-100-digital-and-remote-check-in\/\"><span style=\"font-weight: 300;\">book a hotel room<\/span><\/a><span style=\"font-weight: 300;\">.<\/span><\/p><p><span style=\"font-weight: 300;\">More and more processes require incorporating an identity verification process, with which we can guarantee that the person behind the screen is who they say they are. These processes usually incorporate multiple Artificial Intelligence algorithms to <\/span><a href=\"https:\/\/veridas.com\/global-document-verification\/\"><span style=\"font-weight: 300;\">verify the authenticity of the person&#8217;s identity document<\/span><\/a><span style=\"font-weight: 300;\">, as well as to carry out a <\/span><a href=\"https:\/\/veridas.com\/face-biometric-authentication\/\"><span style=\"font-weight: 300;\">biometric comparison<\/span><\/a><span style=\"font-weight: 300;\"> to ensure that the person executing the process is the same person who appears on the document. Not to mention the proof-of-life technologies used to ensure that the identity is not impersonated.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d29b719 elementor-widget elementor-widget-spacer\" data-id=\"d29b719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56660fa elementor-widget elementor-widget-heading\" data-id=\"56660fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security in the backend or front end?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54d1929 elementor-widget elementor-widget-text-editor\" data-id=\"54d1929\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Veridas, as a manufacturer of biometric identity solutions, must decide where these algorithms are implemented: <\/span><b>should they be run on the user&#8217;s own mobile device (front end), or is it more appropriate to run them on a server (back end)?<\/b><\/p><p><span style=\"font-weight: 300;\">This question has a high impact on the security of the processes and even on the end-user experience.\u00a0<\/span><\/p><p><span style=\"font-weight: 300;\">Although there are different types of implementations among manufacturers of biometric technologies, <\/span><b>at Veridas we bet on the processing of security algorithms in the backend. And we do so for these 5 reasons:<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81bab46 elementor-widget elementor-widget-spacer\" data-id=\"81bab46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be36c59 elementor-widget elementor-widget-heading\" data-id=\"be36c59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The 5 keys to betting on the backend.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdf59be elementor-widget elementor-widget-text-editor\" data-id=\"cdf59be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ol><li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">Security<\/span><\/li><li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">Omnichannel<\/span><\/li><li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">Agility<\/span><\/li><li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">Unbiased security<\/span><\/li><li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">Auditability<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b93d286 elementor-widget elementor-widget-spacer\" data-id=\"b93d286\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f5a6a elementor-widget elementor-widget-heading\" data-id=\"93f5a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e64b8a elementor-widget elementor-widget-text-editor\" data-id=\"8e64b8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">At Veridas we understand that the execution of any security process must be carried out in an environment (i.e., on a machine) that is controlled (i.e., secured) by us. This is only possible when the execution of algorithms is performed on the backend.<\/span><\/p><p><b>The execution of algorithms on the front end is much more exposed to attacks, <\/b><span style=\"font-weight: 300;\">such as rooting the mobile device, which allow the attacker to make changes to some predefined settings of the device. Through this control, an attacker can modify the result of a processing run on the front end, thus enabling spoofing.<\/span><\/p><p><br \/><br \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a6d204 elementor-widget elementor-widget-spacer\" data-id=\"6a6d204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ba993a elementor-widget elementor-widget-heading\" data-id=\"4ba993a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Omnichannel<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01bd994 elementor-widget elementor-widget-text-editor\" data-id=\"01bd994\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">While it is true that the implementation of algorithms on the front end allows taking advantage of the resources of each mobile device, the deployment of algorithms on the backend allows achieving omnichannel in a very efficient way.\u00a0<\/span><\/p><p><span style=\"font-weight: 300;\">When we talk about omnichannel we mean that the deployment of the same algorithm in the backend can serve processes executed in different channels. The 3 main channels are the web channel, native iOS APPs and native Android APPs.<\/span><span style=\"font-weight: 300;\">In other words, <b>deploying algorithms in the backend allows the same technology to be used for all channels.<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df09b2f elementor-widget elementor-widget-spacer\" data-id=\"df09b2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f0d1da elementor-widget elementor-widget-heading\" data-id=\"4f0d1da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Agility<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58e038c elementor-widget elementor-widget-text-editor\" data-id=\"58e038c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Veridas develops identity technologies and solutions where security is the fundamental motivation. Biometric technologies, based on Artificial Intelligence, evolve continuously and at high speed.\u00a0<\/span><\/p><p><span style=\"font-weight: 300;\">For this reason, it is essential that customers and end users always use the latest versions of the technology. In short, it is essential that they are up to date.<\/span><\/p><p><b>By deploying security algorithms on the backend, customers and users have to do absolutely nothing to enjoy the benefits of these updates.<\/b><span style=\"font-weight: 300;\"> This is not the case where identity solutions are processed on the front end, as they usually require an update of the mobile APPs, both by the company that owns the APP and by the user.<\/span><\/p><p><span style=\"font-weight: 300;\">Ultimately, <\/span><b>processing algorithms on the backend allows for reduced time to market for security-enhancing algorithms and technologies.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbbbd5c elementor-widget elementor-widget-spacer\" data-id=\"dbbbd5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-819476c elementor-widget elementor-widget-heading\" data-id=\"819476c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Unbiased security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a7174d elementor-widget elementor-widget-text-editor\" data-id=\"6a7174d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Implementing security algorithms on the front end makes security dependent on the mobile device itself. The processing of an algorithm depends on the device&#8217;s CPU and available memory, among other things. The better the performance of the device, the better the algorithm processing speed. Or even, the greater the capacity to process an algorithm with higher computational requirements on the front end.<\/span><\/p><p><b>At Veridas, we believe that security in the digital world is a universal right, which cannot depend on the user having a high-end mobile device. <\/b><span style=\"font-weight: 300;\">Any person, anywhere in the world, and with any mobile device, should be able to verify their identity with the same level of security as those who have the latest generation of smartphones.<\/span><\/p><p><span style=\"font-weight: 300;\">For that reason, and to avoid bias, backend algorithm processing allows security to be the same for everyone, regardless of the mobile device used.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e18c3b3 elementor-widget elementor-widget-spacer\" data-id=\"e18c3b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5570493 elementor-widget elementor-widget-heading\" data-id=\"5570493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Auditability<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef35fef elementor-widget elementor-widget-text-editor\" data-id=\"ef35fef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Finally, it is important to note that <\/span><b>running algorithms on the backend makes the process easier to audit if necessary.<\/b><span style=\"font-weight: 300;\"> If the security decision (is or is not the claimed identity) is executed on the backend, there can be a record that this operation was performed. This is not the case when security processes are performed on the front end, especially when they are performed without an Internet connection.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef7f601 elementor-widget elementor-widget-spacer\" data-id=\"ef7f601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9085612 elementor-widget elementor-widget-heading\" data-id=\"9085612\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The importance of the Front end\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e972870 elementor-widget elementor-widget-text-editor\" data-id=\"e972870\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">The points made above do not imply that all processing related to identity and biometrics must be performed on the back end. There are some types of processing, not related to security, whose execution on the front end is highly recommended.<\/span><\/p><p><span style=\"font-weight: 300;\">We refer to those algorithms that have to do with<\/span><b> improving the user experience in the capture process.<\/b><span style=\"font-weight: 300;\"> For example, automatically detecting an identity document, classifying the type of document, detecting a face, guiding the user so that the positioning of the document and the face are appropriate, etc.<\/span><\/p><p><span style=\"font-weight: 300;\">The processing of such algorithms at the front end does not pose a risk from a security point of view, as they do not have a direct impact on the decision making about the identity of the person.<\/span><\/p><p><span style=\"font-weight: 300;\">In short, <\/span><b>it is essential to establish a clear policy on where to run biometric algorithms, especially those that have to do with security. <\/b><span style=\"font-weight: 300;\">At Veridas we are clearly committed to the execution of security processes in the back end, as we understand that it is a more secure and less vulnerable environment than the front end.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57bfe06 elementor-widget elementor-widget-spacer\" data-id=\"57bfe06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ea4718 elementor-widget elementor-widget-html\" data-id=\"2ea4718\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-601d590d-0511-4a37-afd8-7192267c79d6\"><span class=\"hs-cta-node hs-cta-601d590d-0511-4a37-afd8-7192267c79d6\" id=\"hs-cta-601d590d-0511-4a37-afd8-7192267c79d6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/601d590d-0511-4a37-afd8-7192267c79d6\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-601d590d-0511-4a37-afd8-7192267c79d6\" style=\"border-width:0px;\" height=\"348\" width=\"1280\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/601d590d-0511-4a37-afd8-7192267c79d6.png\"  alt=\"New call-to-action\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '601d590d-0511-4a37-afd8-7192267c79d6', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39619fc elementor-widget elementor-widget-spacer\" data-id=\"39619fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The use of mobile devices has become widespread in recent years as a substitute for the laptop when performing multiple daily activities.\u00a0 Viewing our social networks, sending a WhatsApp or reading the news are activities that we regularly perform from our smartphone. Sometimes we use a native APP. On other occasions, when the use is [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":32875,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":[252],"meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[190,72],"tags":[],"country":[],"resource":[293],"topic":[250,251],"industry":[],"solution":[232],"class_list":["post-42256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-prevention","category-identity-biometrics","resource-yes","format-article","topic-fraud-prevention","topic-identity","solution-identity-verification"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Back end anti-fraud security. 5 reasons why it matters | Veridas<\/title>\n<meta name=\"description\" content=\"Discover the 5 keys to the importance of incorporating security and anti-fraud measures in the backend of remote identity verification processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Back end anti-fraud security. 5 reasons why it matters | Veridas\" \/>\n<meta property=\"og:description\" content=\"Discover the 5 keys to the importance of incorporating security and anti-fraud measures in the backend of remote identity verification processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Veridas\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T16:43:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T09:16:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikel Sanchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikel Sanchez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\"},\"author\":{\"name\":\"Mikel Sanchez\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/e61398f9a409b55f031f8f0e7c83bb62\"},\"headline\":\"5 reasons to invest in back end anti-fraud technology\",\"datePublished\":\"2022-09-29T16:43:34+00:00\",\"dateModified\":\"2024-02-12T09:16:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\"},\"wordCount\":1064,\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg\",\"articleSection\":[\"Fraud Prevention\",\"Identity &amp; Biometrics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\",\"url\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\",\"name\":\"Back end anti-fraud security. 5 reasons why it matters | Veridas\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg\",\"datePublished\":\"2022-09-29T16:43:34+00:00\",\"dateModified\":\"2024-02-12T09:16:11+00:00\",\"description\":\"Discover the 5 keys to the importance of incorporating security and anti-fraud measures in the backend of remote identity verification processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg\",\"width\":2000,\"height\":1333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/veridas.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity &amp; Biometrics\",\"item\":\"https:\/\/veridas.com\/en\/category\/identity-biometrics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fraud Prevention\",\"item\":\"https:\/\/veridas.com\/en\/category\/identity-biometrics\/fraud-prevention\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"5 reasons to invest in back end anti-fraud technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"name\":\"Veridas\",\"description\":\"Just be you\",\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\",\"name\":\"Veridas\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"width\":2048,\"height\":1076,\"caption\":\"Veridas\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VeridasOfficial\",\"https:\/\/es.linkedin.com\/company\/veridas\",\"https:\/\/www.instagram.com\/veridas.life\/\",\"https:\/\/www.youtube.com\/@VeridasOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/e61398f9a409b55f031f8f0e7c83bb62\",\"name\":\"Mikel Sanchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/09\/Mikel-Sanchez-150x150.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/09\/Mikel-Sanchez-150x150.jpg\",\"caption\":\"Mikel Sanchez\"},\"description\":\"Global Sales Engineering Director\",\"url\":\"https:\/\/veridas.com\/en\/author\/mikel-sanchez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Back end anti-fraud security. 5 reasons why it matters | Veridas","description":"Discover the 5 keys to the importance of incorporating security and anti-fraud measures in the backend of remote identity verification processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/","og_locale":"en_US","og_type":"article","og_title":"Back end anti-fraud security. 5 reasons why it matters | Veridas","og_description":"Discover the 5 keys to the importance of incorporating security and anti-fraud measures in the backend of remote identity verification processes.","og_url":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/","og_site_name":"Veridas","article_published_time":"2022-09-29T16:43:34+00:00","article_modified_time":"2024-02-12T09:16:11+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg","type":"image\/jpeg"}],"author":"Mikel Sanchez","twitter_card":"summary_large_image","twitter_creator":"@VeridasOfficial","twitter_site":"@VeridasOfficial","twitter_misc":{"Written by":"Mikel Sanchez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#article","isPartOf":{"@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/"},"author":{"name":"Mikel Sanchez","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/e61398f9a409b55f031f8f0e7c83bb62"},"headline":"5 reasons to invest in back end anti-fraud technology","datePublished":"2022-09-29T16:43:34+00:00","dateModified":"2024-02-12T09:16:11+00:00","mainEntityOfPage":{"@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/"},"wordCount":1064,"publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"image":{"@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg","articleSection":["Fraud Prevention","Identity &amp; Biometrics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/","url":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/","name":"Back end anti-fraud security. 5 reasons why it matters | Veridas","isPartOf":{"@id":"https:\/\/veridas.com\/en\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage"},"image":{"@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg","datePublished":"2022-09-29T16:43:34+00:00","dateModified":"2024-02-12T09:16:11+00:00","description":"Discover the 5 keys to the importance of incorporating security and anti-fraud measures in the backend of remote identity verification processes.","breadcrumb":{"@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#primaryimage","url":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/04\/Veridas-Proceso-de-verificacion.jpg","width":2000,"height":1333},{"@type":"BreadcrumbList","@id":"https:\/\/veridas.com\/en\/back-end-anti-fraud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/veridas.com\/en\/"},{"@type":"ListItem","position":2,"name":"Identity &amp; Biometrics","item":"https:\/\/veridas.com\/en\/category\/identity-biometrics\/"},{"@type":"ListItem","position":3,"name":"Fraud Prevention","item":"https:\/\/veridas.com\/en\/category\/identity-biometrics\/fraud-prevention\/"},{"@type":"ListItem","position":4,"name":"5 reasons to invest in back end anti-fraud technology"}]},{"@type":"WebSite","@id":"https:\/\/veridas.com\/en\/pt\/#website","url":"https:\/\/veridas.com\/en\/pt\/","name":"Veridas","description":"Just be you","publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/veridas.com\/en\/pt\/#organization","name":"Veridas","url":"https:\/\/veridas.com\/en\/pt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","width":2048,"height":1076,"caption":"Veridas"},"image":{"@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VeridasOfficial","https:\/\/es.linkedin.com\/company\/veridas","https:\/\/www.instagram.com\/veridas.life\/","https:\/\/www.youtube.com\/@VeridasOfficial"]},{"@type":"Person","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/e61398f9a409b55f031f8f0e7c83bb62","name":"Mikel Sanchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/09\/Mikel-Sanchez-150x150.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/09\/Mikel-Sanchez-150x150.jpg","caption":"Mikel Sanchez"},"description":"Global Sales Engineering Director","url":"https:\/\/veridas.com\/en\/author\/mikel-sanchez\/"}]}},"_links":{"self":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/42256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/comments?post=42256"}],"version-history":[{"count":3,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/42256\/revisions"}],"predecessor-version":[{"id":49479,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/42256\/revisions\/49479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media\/32875"}],"wp:attachment":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media?parent=42256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/categories?post=42256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/tags?post=42256"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/country?post=42256"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/resource?post=42256"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/format?post=42256"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/topic?post=42256"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/industry?post=42256"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/solution?post=42256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}