""
Entersekt is backed by companies like Silicon Valley-based Accel-KKR, one of the world’s top private equity firms, serves FIs around the world, and holds 120+ patents for its security innovations.
Our fraud prevention solutions cover authentication for digital banking transactions, payment authentication and 3-D Secure payments.
EMV 3DS provides a layer of security to online payments and chip cards provide a layer of security to transactions where the card and cardholder are present for the transaction. Both follow the protocols of EMVCo, the global technical body that manages and develops specifications and programs for card-based payments.
Financial institutions in Europe and the UK are required to follow SCA and implement two-factor authentication (2FA) for digital payments.
Entersekt’s Digital QR Payments solution enables fast, low-friction payments, across peer-to-peer and peer-to-merchant payments. It provides a secure and user-friendly proximity scanning experience, allowing in-app QR code scanning at checkout (available in South Africa only).
Yes, customers can include both cards and bank accounts in the digital payment solution (South Africa only), and can select which one to pay with.
Multi-factor authentication (MFA) is a form of authentication that helps prevent unauthorized access by requiring users to provide two or more authentication factors to verify their identity. These can include the knowledge factor (something you know, like a password), the possession factor (something you have, like a mobile phone) or the inherence factor (something that uniquely identifies a person, such as their fingerprint).
Biometric authentication is a security process that relies on the unique biological characteristics of an individual to verify that they are who they say they are. Biometric authentication systems compare physical traits to stored, confirmed, authentication data. If both samples of the biometric data match, authentication is confirmed. Since biometric authentication uses unique characteristics for verification, they are difficult to replicate, making this authentication method more secure, and convenient. Traditional authentication methods, such as usernames, passwords or ID cards, are not as secure as they can be easily stolen or guessed by fraudsters.
Read more of our case studies here.