Start with identity.
Secure your organisation.

Use a trusted digital identity to authenticate users, whether they’re walking through a door or logging in to applications.



Go passwordless, cardless,
PINless, everythingless…

Free your teams from passwords, swipe cards and PINs.
Embrace non-negotiable security measures that don’t
get in the way of people doing their jobs.

How It Works

A complete digital identity solution.

Prove identity and collect attributes


Prove identity and
collect attributes.

Collect biometric data and identity attributes from trusted documents to prove the
person’s identity.

Couple attributes to credentials


Couple attributes
to biometrics.

Enrol the person’s biometrics and bind them to the verified identity attributes to create a digital identity.

Integrate with existing security systems


Connect to
technology stack.

Integrate the digital identity with your existing security and access management systems through open APIs.

Authenticate with assurance.


Authenticate with

Use the digital identity to
control access across any device, channel or location.


Safer for users.
Safer for organisations.

Cybersecurity is a war of attrition, and weak credentials
are a vulnerability in the majority of attacks.

We’re proud to help organisations secure their assets.
Customers include:

  • Australian
  • Critical
  • ASX-listed
  • Nasdaq-listed


of data breaches are due to weak credentials.

$6 trillion

is the annual cost
of cyber crime.

every 11s

business are attacked by ransomware.

$3 million

is the average cost
of a cyber attack.


Why are we different?

  • No need to rip and replace
    Agile solution and open APIs allow seamless
    integration with your existing systems.
  • Our approach to standards
    Our technology is built according to ISO, GDPR,
    CCPA and NIST frameworks, plus ASD Essential 8
    Maturity 3 controls.
  • We support multiple modalities
    Including face, iris and finger – to suit your security
    and user experience needs.

IDentity Today is your shortcut to the latest industry insights – free from BS. Whether you like to listen, read or watch, there’s something here for you.

Alethe Denis

Social engineering: threat or secret weapon?

Alethe Denis, social engineer and Senior Consultant at Critical Insight, was awarded a Black Badge at DEF CON 27, the world’s largest hacking conference. She joins the podcast to chat about psychology, trust and human biases, what a successful social engineering campaign looks like, and why she thinks women (generally) make better social engineers.  

Shamane Tan, Chief Growth Officer at Privasec & DroneSec

SHAMANE TAN: Incognito War Stories

Infiltration and ethical hacking are all part of a day’s work for Privasec’s Chief Growth Officer, Shamane Tan. In this episode, we look at cybersecurity through the lens of penetration testing and uncover what organisations need to look out for when it comes to auditing and protecting their assets.

Let’s talk identity.