Sumsub Features
Intelligence (4)
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Risk Assessment
Flags suspicious transactions and either alerts administrators or declines transaction.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Detection (7)
Fraud Detection
Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Payment Verification
Requires verification of credit card, debit card, and money transfers prior to accepting payments
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Real-Time Monitoring
Constantly monitors system to detect anomalies in real time.
Alerts
Alerts administrators when fraud is suspected or transactions have been declined.
Response (4)
Device Tracking
Keeps records of geographic location and IP addresses of fraud suspects.
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Blacklisting
Prevents previous committers of fraud from future transactions.
Bot Mitigation
Monitors for and rids systems of bots suspected of committing fraud.
Analysis (3)
ID Analytics
Stores data from external or internal sources related to fake accounts, evaluating users for risk.
Intelligence Reporting
Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud.
Incident Reports
Produces reports detailing trends and vulnerabilities related to payments and fraud.
Administration (6)
Fraud Markers
Tags users suspected of committing fraud and identifies them upon return.
Transaction Scoring
Rates each transaction's risk based on specific factors and their benchmarked scores.
Blacklisting
Prevents previous committers of fraud from future transactions.
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Management (2)
Scheduled Data Checks
Schedule periodic (weekly, monthly, etc.) checks on existing address data to verify correctness and formatting.
Reporting
Produce reports and data visualization regarding address verification actions.
Functionality (4)
Address Verification
Checks address data against an authoritative address database (usually government).
Automation
Verify addresses automatically on the data source as new entries are added.
Cleansing
Purge or update incorrect data through corrective processes like fuzzy matching.
International Verification
Checks address data against authoritative databases from two more more countries.
Integration (4)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Workforce Authentication
Integrates with identity and access management (IAM) solutions to manage workforce authentication.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Functionalities (6)
Authentication Methods
Offers age authentication via methods such as document or identification card verification, telephone number checks, matching against consumer records or other similar methods.
Online Age Verification
Is primarily used to verify a person's identity online for e-commerce purposes.
Age Estimation
Offers age estimation functionality.
Integrations and SDKs
Offers integrations or software development kits (SDKs) for websites, applications, mobile apps, point-of-sale (POS) solutions, and kiosks
In-person Age Verification
Is primarily used to verify a person's identity in-person, such as at a bar, restaurant, event venue, or other similar places.
Liveness Check
Has a liveness check using selfies or other photograph technology to ensure the person being verified is real.
Fraud Detection (5)
Name Matching
The solution uses intelligent algorithms like fuzzy matching to identify potential risks.
Watch List
Create watchlists that can include sanctions lists (e.g., Dow Jones, WorldCheck, WorldCompliance, and Accuity).
Scoring
Score persons and organizations based on their history and risk potential.
E-filing
Pool data from various sources to auto-populate e-filing of Suspicious Activity Report (SAR) or Currency Transaction Reports (CTR) forms.
Workflows and Alerts
Standard workflows to assign workload and to alert users based on predefined triggers.
Compliance (3)
Due Dilligence
Manage due dilligence processes such as Customer Due Diligence and Know Your Customer.
Regulations and Jurisdictions
Comply with regulations from multiple jurisdictions such as OFAC, UN, EU, OSFI, UK and AUSTRAC or FATCA.
Internal Policies
Compliance with fraud and risk management policies created by the company using the solution.
Monitoring (5)
Models
Create behavior models that can be used to detect suspicious behavior.
Simuation
Simulate and validate scenarios to address multiple types of risks.
Transaction Monitoring
Real-time transaction screening to immediately identify potential risks.
Segmentation
Allows users to segment and manage lists of suspicious persons and organizations.
QA
Evaluate the quality and performance of the anti-money laundering activities.
Reporting (3)
Compliance Reports
Ability to generate standard reports for compliance purposes such as FATCA/CRS, SARS/STR and SWIFT.
Suspicious Activity
Display suspicious activity by period, risk type, person or organization.
Real-Time Dashboards
Dashboards to provide real-time data on suspicious transactions, persons, or organizations.
Generative AI (1)
AI Image-to-Text
Converts images into a textual description, identifying key elements.
Generative AI - Anti Money Laundering (2)
Risk Scoring
Has integreated AI features to assess and assign risk scores to transactions and customer profiles, enabling prioritized investigations based on potential threat levels.
Pattern Recognition
Uses AI algorithms to identify complex patterns and anomalies in transaction data that may indicate money laundering.
Agentic AI - Anti Money Laundering (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Fraud Detection (3)
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Identity Verification Functions - Identity Verification (5)
Multi-Method Verification
Supports multi-method identity verification including documents, biometrics, and database cross-checks.
AI Document Check
Performs automated document authentication using OCR and AI/ML.
Biometric Face Match
Conducts biometric face matching (selfie-to-ID verification).
Integration Options
Offers identity verification functionality via API, SDK, or hosted interface.
Workflow Orchestration
Provides configurable identity verification workflows and logic-based orchestration.
Risk & Fraud Prevention - Identity Verification (3)
Liveness Detection
Offers liveness detection to prevent spoofing and presentation attacks.
AI Risk Scoring
Generates real-time identity risk scores using AI/ML or rule-based logic.
Document Forensics
Detects fraudulent or tampered documents through forensic analysis.
Compliance & Governance - Identity Verification (3)
Standards Compliance
Supports compliance with NIST Identity Assurance Levels (IAL2, IAL3).
AML/PEP Screening
Integrates AML, PEP, and sanctions list screening into the identity verification process.
Global Coverage
Supports global identity document verification across multiple countries and regions.





