Plans & Pricing

Choose your matching plan, or contact us and get one tailor-made to suit all your needs.

Enterprise
Custom
Pricing just for you


Expansion
0.85
per verification
+
569€ License fee per month
Growth
0.95
per verification
+
259€ License fee per month
No annual commitment
No annual commitment
No annual commitment
Enterprise
Custom
Pricing just for you


No annual commitment
Enterprise plan
Benefits
Access to OS

Provides access to the Ondato operating system, where you can manage your customer data, set up monitoring, perform additional checks, and more.

Unlimited

Verify 10,000+ government issued IDs

Security functions such as hologram authenticity evaluation and spoof detection can be performed on over 10k+ document variants. Acceptable document types include but are not limited to:

  • Passports
  • ID cards
  • Driver licenses
  • Residence permits
  • Voter IDs
  • etc.
Supported languages and dialects
Our verification process is available in 20+ languages and dialects. Clients can request the implementation of a specific language or dialect through an enterprise plan.

Unlimited

Custom development available

Off-the-shelf solutions may not always deliver the best results if you have a complex process. As a result, our developers are ready to build custom adjustments to our OS. We can develop an additional button or a whole new feature to improve your experience.

Dedicated success manager

An account manager who stays in constant touch with your team and is committed to serving your interests.

Profesional consultation

Our team is ready to provide you with legal advice and assistance with architecture building. We also offer consultations on identity verification strategies, risk scoring, and other compliance issues.

Unlimited

Sandbox integration

A testing environment that allows you to test your verification process before going live.

Identity verfication (IDV) gateway

Monitor your entire user base on our OS by forwarding user information acquired from other identity verification services.

Verification flow
Document data extraction

Government-issued documents containing this personal information can be read and extracted using the OCR method.

First Name

Last Name

Gender

State

Date of birth

Date of expiry

Document Number

Date of issue

Personal number

Country of issue

Nationality

Document type

Address

KYC application form

KYC application forms allows to gather extra information required by AML regulation.

Custom branding and whitelabeling

Control the complete look and feel of the identity verification process. Use your own logo, colors, text strings, or even build your own UI/UX around our technology.

Omnichannel Support

Omnichannel Support allows the end-user to switch devices and complete the verification on another device without interrupting the process.

Assisted image capture

Real-time tips and support to ensure successful user onboarding.

Application signing

With the application signing solution, your customers will perform ID verification and sign the required application in a single process.

NFC chip reading via SDK

Near-field communication (NFC)-enabled devices can verify users’ identities by extracting data from chip-based identity documents. The process is facilitated by SDK.

Software Development Kit (SDK)

Ondato Software development kits are compatible with Android and iOS native, Flutter, and React Native frameworks.

Session video recording via SDK

When possible, the background video of the verification sessions is recorded. The process is facilitated by SDK.

Decision engine
Fraud/Spoofing detection engine

Protect your business using different types of technology that identify and block deep fakes, false device information, liveness imposters, fake documents, etc.

Biometric analysis

We use machine learning technology to compare a user’s document image with their selfie. We create a 3D face map of the customer and compare it to the 2D face in the document.

Liveness checks

Facial liveness detection biometrics refers to the use of computer vision technology to detect the harmless presence of a live user, rather than a representation such as a picture, a fake video, or a mask.

We use two different types of liveness detection: Active and passive. The techonology we use is ISO 30107-3 Level 1 and Level 2 certified.

Risk scoring

During the verification process, we gather and check relevant data about the user to evaluate the risk they may pose. The process is completed with a clearly defined risk score, ensuring compliance with international KYC regulations.

Document verification

Various KYC, AML rules algorithms, and technologies used will help you ensure the authenticity of documents. In addition to verifying the personal data in the document, the MRZ area, we also check other marks, such as holograms, watermarks, and more.

Machine Readable Zone (MRZ) validation

Machine Readable Zone or MRZ is a particular area in an ID document that encloses the document holder’s data. Ondato verifies that the data encrypted in the MRZ area matches the information on the document.

Duplicate check

Our system helps prevent attempts to duplicate accounts for the same person.

Multiple people detection in the background

Detects if the are any people in the background.

Network and device fingerprinting

We collect network and device fingerprinting to secure and protect your business against possible fraud. This data is used in the algorithms for risk assessment.

Email and IP risk analysis

IP and email analysis gather relevant data for a broader user overview that may be used for fraud prevention.

Geolocation determination

Determines the exact location of where the user currently is.

Operating system
Client cards

Comprehensive case management that presents all of the user’s information as cards. Each card includes relevant external documents and internal comments.

Live data access

Get a better understanding of the identity verification process with our analytics on verification results, user behavior, SLAs, etc.

User management

Create different roles with permissions based on your own company structure.

Audit log

The audit log provides information about who has accessed the system and what operations they have performed during a given period of time.

PDF Identity Report

Export customer cards in PDF format, containing information about the customer and the verification process.

Ongoing monitoring

Perform continuous monitoring for natural and business entities in your set timeframe for sanctions, PEPs, expiration dates, or other data.

Pricing depends on the number of clients

Data distribution
Session generation via API

Automated verification session generation using our API.

Media download via API

Download media of the verification session using our API.

Media upload via API/manual

Upload end-user document photos directly, without using the end-user flow.

Data retention (archive)

The amount of time that encrypted end-user data is stored in the archive.

Unlimited

Extras
PEP, sanctions checks and adverse media screening

The screening lets you check if your client appears on a sanctions or politically exposed person list. It also allows you to look for adverse media information about them.

+0.15€ per verification
Biometric authentication

The customer’s face is scanned during authentication, creating its 3D map. In milliseconds this data is then compared to already stored information, checking for spoofing methods and other alterations.

+0.15€ per check
Lost and stolen document check

The documents are checked against various international databases to verify that they have not been reported lost or stolen.

+0.30€ per verification
Proof of address check

Automatic extraction of data from the document submitted by a user as proof of address. Additional charges may apply.

+0.40€ per verification
Biometric age detection

Our system accurately estimates a client’s age range by mapping out the biometric data of their face.

+0.10€ per client
E.signatures

Sign legally binding contracts online with advanced or qualified signatures.

+0.10€ per signature
KYC application signing

The application signing solution includes advanced and qualified signatures.

+0.10€ per signature
Video call software for ID verification

Remotely verify your customers’ identities under the KYC agent’s supervision. Additional charges may apply.

+0.10€ per minute
Stop list

An internal database of known fraudsters is designed to increase security. It automatically adds users who attempt to utilize stolen or fabricated data. The list is fully customizable, and you can easily remove or include new individuals.

+0.05€ per identification
Expansion
0.85
per verification
+
569€ License fee per month
No annual commitment
Expansion plan
Benefits
Access to OS

Provides access to the Ondato operating system, where you can manage your customer data, set up monitoring, perform additional checks, and more.

5 users

Verify 10,000+ government issued IDs

Security functions such as hologram authenticity evaluation and spoof detection can be performed on over 10k+ document variants. Acceptable document types include but are not limited to:

  • Passports
  • ID cards
  • Driver licenses
  • Residence permits
  • Voter IDs
  • etc.
Supported languages and dialects
Our verification process is available in 20+ languages and dialects. Clients can request the implementation of a specific language or dialect through an enterprise plan.

20

Custom development available

Off-the-shelf solutions may not always deliver the best results if you have a complex process. As a result, our developers are ready to build custom adjustments to our OS. We can develop an additional button or a whole new feature to improve your experience.

Dedicated success manager

An account manager who stays in constant touch with your team and is committed to serving your interests.

Profesional consultation

Our team is ready to provide you with legal advice and assistance with architecture building. We also offer consultations on identity verification strategies, risk scoring, and other compliance issues.

3h per month

Sandbox integration

A testing environment that allows you to test your verification process before going live.

Identity verfication (IDV) gateway

Monitor your entire user base on our OS by forwarding user information acquired from other identity verification services.

Verification flow
Document data extraction

Government-issued documents containing this personal information can be read and extracted using the OCR method.

First Name

Last Name

Gender

State

Date of birth

Date of expiry

Document Number

Date of issue

Personal number

Country of issue

Nationality

Document type

KYC application form

KYC application forms allows to gather extra information required by AML regulation.

Custom branding and whitelabeling

Control the complete look and feel of the identity verification process. Use your own logo, colors, text strings, or even build your own UI/UX around our technology.

Omnichannel Support

Omnichannel Support allows the end-user to switch devices and complete the verification on another device without interrupting the process.

Assisted image capture

Real-time tips and support to ensure successful user onboarding.

Application signing

With the application signing solution, your customers will perform ID verification and sign the required application in a single process.

NFC chip reading via SDK

Near-field communication (NFC)-enabled devices can verify users’ identities by extracting data from chip-based identity documents. The process is facilitated by SDK.

Software Development Kit (SDK)

Ondato Software development kits are compatible with Android and iOS native, Flutter, and React Native frameworks.

Session video recording via SDK

When possible, the background video of the verification sessions is recorded. The process is facilitated by SDK.

Decision engine
Fraud/Spoofing detection engine

Protect your business using different types of technology that identify and block deep fakes, false device information, liveness imposters, fake documents, etc.

Biometric analysis

We use machine learning technology to compare a user’s document image with their selfie. We create a 3D face map of the customer and compare it to the 2D face in the document.

Liveness checks

Facial liveness detection biometrics refers to the use of computer vision technology to detect the harmless presence of a live user, rather than a representation such as a picture, a fake video, or a mask.

We use two different types of liveness detection: Active and passive. The techonology we use is ISO 30107-3 Level 1 and Level 2 certified.

Risk scoring

During the verification process, we gather and check relevant data about the user to evaluate the risk they may pose. The process is completed with a clearly defined risk score, ensuring compliance with international KYC regulations.

Document verification

Various KYC, AML rules algorithms, and technologies used will help you ensure the authenticity of documents. In addition to verifying the personal data in the document, the MRZ area, we also check other marks, such as holograms, watermarks, and more.

Machine Readable Zone (MRZ) validation

Machine Readable Zone or MRZ is a particular area in an ID document that encloses the document holder’s data. Ondato verifies that the data encrypted in the MRZ area matches the information on the document.

Duplicate check

Our system helps prevent attempts to duplicate accounts for the same person.

Multiple people detection in the background

Detects if the are any people in the background.

Network and device fingerprinting

We collect network and device fingerprinting to secure and protect your business against possible fraud. This data is used in the algorithms for risk assessment.

Email and IP risk analysis

IP and email analysis gather relevant data for a broader user overview that may be used for fraud prevention.

Geolocation determination

Determines the exact location of where the user currently is.

Operating system
Client cards

Comprehensive case management that presents all of the user’s information as cards. Each card includes relevant external documents and internal comments.

Live data access

Get a better understanding of the identity verification process with our analytics on verification results, user behavior, SLAs, etc.

User management

Create different roles with permissions based on your own company structure.

Audit log

The audit log provides information about who has accessed the system and what operations they have performed during a given period of time.

PDF Identity Report

Export customer cards in PDF format, containing information about the customer and the verification process.

Ongoing monitoring

Perform continuous monitoring for natural and business entities in your set timeframe for sanctions, PEPs, expiration dates, or other data.

Pricing depends on the number of clients

Data distribution
Session generation via API

Automated verification session generation using our API.

Media download via API

Download media of the verification session using our API.

Media upload via API/manual

Upload end-user document photos directly, without using the end-user flow.

Data retention (archive)

The amount of time that encrypted end-user data is stored in the archive.

Unlimited

Extras
PEP, sanctions checks and adverse media screening

The screening lets you check if your client appears on a sanctions or politically exposed person list. It also allows you to look for adverse media information about them.

+0.15€ per verification
Biometric authentication

The customer’s face is scanned during authentication, creating its 3D map. In milliseconds this data is then compared to already stored information, checking for spoofing methods and other alterations.

+0.15€ per check
Lost and stolen document check

The documents are checked against various international databases to verify that they have not been reported lost or stolen.

+0.30€ per verification
Proof of address check

Automatic extraction of data from the document submitted by a user as proof of address. Additional charges may apply.

+0.40€ per verification
Biometric age detection

Our system accurately estimates a client’s age range by mapping out the biometric data of their face.

+0.10€ per client
E.signatures

Sign legally binding contracts online with advanced or qualified signatures.

+0.10€ per signature
KYC application signing

The application signing solution includes advanced and qualified signatures.

+0.10€ per signature
Video call software for ID verification

Remotely verify your customers’ identities under the KYC agent’s supervision. Additional charges may apply.

+0.10€ per minute
Stop list

An internal database of known fraudsters is designed to increase security. It automatically adds users who attempt to utilize stolen or fabricated data. The list is fully customizable, and you can easily remove or include new individuals.

+0.05€ per identification
Growth
0.95
per verification
+
259€ License fee per month
No annual commitment
Growth plan
Benefits
Access to OS

Provides access to the Ondato operating system, where you can manage your customer data, set up monitoring, perform additional checks, and more.

3 users

Verify 10,000+ government issued IDs

Security functions such as hologram authenticity evaluation and spoof detection can be performed on over 10k+ document variants. Acceptable document types include but are not limited to:

  • Passports
  • ID cards
  • Driver licenses
  • Residence permits
  • Voter IDs
  • etc.
Supported languages and dialects
Our verification process is available in 20+ languages and dialects. Clients can request the implementation of a specific language or dialect through an enterprise plan.

20

Custom development available

Off-the-shelf solutions may not always deliver the best results if you have a complex process. As a result, our developers are ready to build custom adjustments to our OS. We can develop an additional button or a whole new feature to improve your experience.

Dedicated success manager

An account manager who stays in constant touch with your team and is committed to serving your interests.

Profesional consultation

Our team is ready to provide you with legal advice and assistance with architecture building. We also offer consultations on identity verification strategies, risk scoring, and other compliance issues.

Sandbox integration

A testing environment that allows you to test your verification process before going live.

Identity verfication (IDV) gateway

Monitor your entire user base on our OS by forwarding user information acquired from other identity verification services.

Verification flow
Document data extraction

Government-issued documents containing this personal information can be read and extracted using the OCR method.

First Name

Last Name

Gender

State

Date of birth

Date of expiry

Document Number

Date of issue

Personal number

Country of issue

Nationality

Document type

KYC application form

KYC application forms allows to gather extra information required by AML regulation.

Custom branding and whitelabeling

Control the complete look and feel of the identity verification process. Use your own logo, colors, text strings, or even build your own UI/UX around our technology.

Omnichannel Support

Omnichannel Support allows the end-user to switch devices and complete the verification on another device without interrupting the process.

Assisted image capture

Real-time tips and support to ensure successful user onboarding.

Application signing

With the application signing solution, your customers will perform ID verification and sign the required application in a single process.

NFC chip reading via SDK

Near-field communication (NFC)-enabled devices can verify users’ identities by extracting data from chip-based identity documents. The process is facilitated by SDK.

Software Development Kit (SDK)

Ondato Software development kits are compatible with Android and iOS native, Flutter, and React Native frameworks.

Session video recording via SDK

When possible, the background video of the verification sessions is recorded. The process is facilitated by SDK.

Decision engine
Fraud/Spoofing detection engine

Protect your business using different types of technology that identify and block deep fakes, false device information, liveness imposters, fake documents, etc.

Biometric analysis

We use machine learning technology to compare a user’s document image with their selfie. We create a 3D face map of the customer and compare it to the 2D face in the document.

Liveness checks

Facial liveness detection biometrics refers to the use of computer vision technology to detect the harmless presence of a live user, rather than a representation such as a picture, a fake video, or a mask.

We use two different types of liveness detection: Active and passive. The techonology we use is ISO 30107-3 Level 1 and Level 2 certified.

Risk scoring

During the verification process, we gather and check relevant data about the user to evaluate the risk they may pose. The process is completed with a clearly defined risk score, ensuring compliance with international KYC regulations.

Document verification

Various KYC, AML rules algorithms, and technologies used will help you ensure the authenticity of documents. In addition to verifying the personal data in the document, the MRZ area, we also check other marks, such as holograms, watermarks, and more.

Machine Readable Zone (MRZ) validation

Machine Readable Zone or MRZ is a particular area in an ID document that encloses the document holder’s data. Ondato verifies that the data encrypted in the MRZ area matches the information on the document.

Duplicate check

Our system helps prevent attempts to duplicate accounts for the same person.

Multiple people detection in the background

Detects if the are any people in the background.

Network and device fingerprinting

We collect network and device fingerprinting to secure and protect your business against possible fraud. This data is used in the algorithms for risk assessment.

Email and IP risk analysis

IP and email analysis gather relevant data for a broader user overview that may be used for fraud prevention.

Geolocation determination

Determines the exact location of where the user currently is.

Operating system
Client cards

Comprehensive case management that presents all of the user’s information as cards. Each card includes relevant external documents and internal comments.

Live data access

Get a better understanding of the identity verification process with our analytics on verification results, user behavior, SLAs, etc.

User management

Create different roles with permissions based on your own company structure.

Audit log

The audit log provides information about who has accessed the system and what operations they have performed during a given period of time.

PDF Identity Report

Export customer cards in PDF format, containing information about the customer and the verification process.

Ongoing monitoring

Perform continuous monitoring for natural and business entities in your set timeframe for sanctions, PEPs, expiration dates, or other data.

Pricing depends on the number of clients

Data distribution
Session generation via API

Automated verification session generation using our API.

Media download via API

Download media of the verification session using our API.

Media upload via API/manual

Upload end-user document photos directly, without using the end-user flow.

Data retention (archive)

The amount of time that encrypted end-user data is stored in the archive.

Unlimited

Extras
PEP, sanctions checks and adverse media screening

The screening lets you check if your client appears on a sanctions or politically exposed person list. It also allows you to look for adverse media information about them.

+0.15€ per verification
Biometric authentication

The customer’s face is scanned during authentication, creating its 3D map. In milliseconds this data is then compared to already stored information, checking for spoofing methods and other alterations.

+0.15€ per check
Lost and stolen document check

The documents are checked against various international databases to verify that they have not been reported lost or stolen.

+0.30€ per verification
Proof of address check

Automatic extraction of data from the document submitted by a user as proof of address. Additional charges may apply.

+0.40€ per verification
Biometric age detection

Our system accurately estimates a client’s age range by mapping out the biometric data of their face.

+0.10€ per client
E.signatures

Sign legally binding contracts online with advanced or qualified signatures.

+0.10€ per signature
KYC application signing

The application signing solution includes advanced and qualified signatures.

+0.10€ per signature
Video call software for ID verification

Remotely verify your customers’ identities under the KYC agent’s supervision. Additional charges may apply.

+0.10€ per minute
Stop list

An internal database of known fraudsters is designed to increase security. It automatically adds users who attempt to utilize stolen or fabricated data. The list is fully customizable, and you can easily remove or include new individuals.

+0.05€ per identification
Benefits
Access to OS

Provides access to the Ondato operating system, where you can manage your customer data, set up monitoring, perform additional checks, and more.

Unlimited

5 users

3 users

Verify 10,000+ government issued IDs

Security functions such as hologram authenticity evaluation and spoof detection can be performed on over 10k+ document variants. Acceptable document types include but are not limited to:

  • Passports
  • ID cards
  • Driver licenses
  • Residence permits
  • Voter IDs
  • etc.
Supported languages and dialects
Our verification process is available in 20+ languages and dialects. Clients can request the implementation of a specific language or dialect through an enterprise plan.

Unlimited

20

20

Custom development available

Off-the-shelf solutions may not always deliver the best results if you have a complex process. As a result, our developers are ready to build custom adjustments to our OS. We can develop an additional button or a whole new feature to improve your experience.

Dedicated success manager

An account manager who stays in constant touch with your team and is committed to serving your interests.

Profesional consultation

Our team is ready to provide you with legal advice and assistance with architecture building. We also offer consultations on identity verification strategies, risk scoring, and other compliance issues.

Unlimited

3h per month

Sandbox integration

A testing environment that allows you to test your verification process before going live.

Identity verfication (IDV) gateway

Monitor your entire user base on our OS by forwarding user information acquired from other identity verification services.

Verification flow
Document data extraction

Government-issued documents containing this personal information can be read and extracted using the OCR method.

First Name

Last Name

Gender

State

Date of birth

Date of expiry

Document Number

Date of issue

Personal number

Country of issue

Nationality

Document type

Address

First Name

Last Name

Gender

State

Date of birth

Date of expiry

Document Number

Date of issue

Personal number

Country of issue

Nationality

Document type

First Name

Last Name

Gender

State

Date of birth

Date of expiry

Document Number

Date of issue

Personal number

Country of issue

Nationality

Document type

KYC application form

KYC application forms allows to gather extra information required by AML regulation.

Custom branding and whitelabeling

Control the complete look and feel of the identity verification process. Use your own logo, colors, text strings, or even build your own UI/UX around our technology.

Omnichannel Support

Omnichannel Support allows the end-user to switch devices and complete the verification on another device without interrupting the process.

Assisted image capture

Real-time tips and support to ensure successful user onboarding.

Application signing

With the application signing solution, your customers will perform ID verification and sign the required application in a single process.

NFC chip reading via SDK

Near-field communication (NFC)-enabled devices can verify users’ identities by extracting data from chip-based identity documents. The process is facilitated by SDK.

Software Development Kit (SDK)

Ondato Software development kits are compatible with Android and iOS native, Flutter, and React Native frameworks.

Session video recording via SDK

When possible, the background video of the verification sessions is recorded. The process is facilitated by SDK.

Decision engine
Fraud/Spoofing detection engine

Protect your business using different types of technology that identify and block deep fakes, false device information, liveness imposters, fake documents, etc.

Biometric analysis

We use machine learning technology to compare a user’s document image with their selfie. We create a 3D face map of the customer and compare it to the 2D face in the document.

Liveness checks

Facial liveness detection biometrics refers to the use of computer vision technology to detect the harmless presence of a live user, rather than a representation such as a picture, a fake video, or a mask.

We use two different types of liveness detection: Active and passive. The techonology we use is ISO 30107-3 Level 1 and Level 2 certified.

Risk scoring

During the verification process, we gather and check relevant data about the user to evaluate the risk they may pose. The process is completed with a clearly defined risk score, ensuring compliance with international KYC regulations.

Document verification

Various KYC, AML rules algorithms, and technologies used will help you ensure the authenticity of documents. In addition to verifying the personal data in the document, the MRZ area, we also check other marks, such as holograms, watermarks, and more.

Machine Readable Zone (MRZ) validation

Machine Readable Zone or MRZ is a particular area in an ID document that encloses the document holder’s data. Ondato verifies that the data encrypted in the MRZ area matches the information on the document.

Duplicate check

Our system helps prevent attempts to duplicate accounts for the same person.

Multiple people detection in the background

Detects if the are any people in the background.

Network and device fingerprinting

We collect network and device fingerprinting to secure and protect your business against possible fraud. This data is used in the algorithms for risk assessment.

Email and IP risk analysis

IP and email analysis gather relevant data for a broader user overview that may be used for fraud prevention.

Geolocation determination

Determines the exact location of where the user currently is.

Operating system
Client cards

Comprehensive case management that presents all of the user’s information as cards. Each card includes relevant external documents and internal comments.

Live data access

Get a better understanding of the identity verification process with our analytics on verification results, user behavior, SLAs, etc.

User management

Create different roles with permissions based on your own company structure.

Audit log

The audit log provides information about who has accessed the system and what operations they have performed during a given period of time.

PDF Identity Report

Export customer cards in PDF format, containing information about the customer and the verification process.

Ongoing monitoring

Perform continuous monitoring for natural and business entities in your set timeframe for sanctions, PEPs, expiration dates, or other data.

Pricing depends on the number of clients

Pricing depends on the number of clients

Pricing depends on the number of clients

Data distribution
Session generation via API

Automated verification session generation using our API.

Media download via API

Download media of the verification session using our API.

Media upload via API/manual

Upload end-user document photos directly, without using the end-user flow.

Data retention (archive)

The amount of time that encrypted end-user data is stored in the archive.

Unlimited

Unlimited

Unlimited

Extras
PEP, sanctions checks and adverse media screening

The screening lets you check if your client appears on a sanctions or politically exposed person list. It also allows you to look for adverse media information about them.

+0.15€ per verification
Biometric authentication

The customer’s face is scanned during authentication, creating its 3D map. In milliseconds this data is then compared to already stored information, checking for spoofing methods and other alterations.

+0.15€ per check
Lost and stolen document check

The documents are checked against various international databases to verify that they have not been reported lost or stolen.

+0.30€ per verification
Proof of address check

Automatic extraction of data from the document submitted by a user as proof of address. Additional charges may apply.

+0.40€ per verification
Biometric age detection

Our system accurately estimates a client’s age range by mapping out the biometric data of their face.

+0.10€ per client
E.signatures

Sign legally binding contracts online with advanced or qualified signatures.

+0.10€ per signature
KYC application signing

The application signing solution includes advanced and qualified signatures.

+0.10€ per signature
Video call software for ID verification

Remotely verify your customers’ identities under the KYC agent’s supervision. Additional charges may apply.

+0.10€ per minute
Stop list

An internal database of known fraudsters is designed to increase security. It automatically adds users who attempt to utilize stolen or fabricated data. The list is fully customizable, and you can easily remove or include new individuals.

+0.05€ per identification
Enterprise
Custom
Pricing just for you


Expansion
0.85
per verification
+
569€ License fee per month
Growth
0.95
per verification
+
259€ License fee per month
No annual commitment
No annual commitment
No annual commitment
Enterprise
Sign up