Start with identity.
Secure your organisation.
Secure your organisation.
Use a trusted digital identity to authenticate users, whether they’re walking through a door or logging in to applications.
OUR PARTNERS













Go passwordless, cardless,
PINless, everythingless…
PINless, everythingless…
Free your teams from passwords, swipe cards and PINs.
Embrace non-negotiable security measures that don’t
get in the way of people doing their jobs.
How It Works
A complete digital identity solution.
VERIFY
Prove identity and
collect attributes.
Collect biometric data and identity attributes from trusted documents to prove the
person’s identity.
BIND
Couple attributes
to biometrics.
Enrol the person’s biometrics and bind them to the verified identity attributes to create a digital identity.
INTEGRATE
Connect to
technology stack.
Integrate the digital identity with your existing security and access management systems through open APIs.
AUTHENTICATE
Authenticate with
trust.
Use the digital identity to
control access across any device, channel or location.

Safer for users.
Safer for organisations.
Safer for organisations.
Cybersecurity is a war of attrition, and weak credentials
are a vulnerability in the majority of attacks.
We’re proud to help organisations secure their assets.
Customers include:
- Australian
federal
government.
- Critical
national
infrastructure.
- ASX-listed
security
organisations.
- Nasdaq-listed
enterprise.
80%
of data breaches are due to weak credentials.
$6 trillion
is the annual cost
of cyber crime.
every 11s
business are attacked by ransomware.
$3 million
is the average cost
of a cyber attack.
A better way of doing business.
While our core mission is to improve the security posture of our customers, this work is underpinned by the creation of a business that has purpose beyond profit.
We’re proud to be a Certified B Corp, which means we’re part of the global community of organisations that meet the highest standards of social and environmental responsibility.
As well as building a first-of-its-kind technology, we’re taking a first-of-its-kind approach to business in the cybersecurity sector as we expand our ability to make an impact for good.
START WITH IDENTITY
Why are we different?
- No need to rip and replace
Agile solution and open APIs allow seamless
integration with your existing systems.
- Our approach to standards
Our technology is built according to ISO, GDPR,
CCPA and NIST frameworks, plus ASD Essential 8
Maturity 3 controls.
- We support multiple modalities
Including face, iris and finger – to suit your security
and user experience needs.
IDentity Today is your shortcut to the latest industry insights – free from BS. Whether you like to listen, read or watch, there’s something here for you.

Fighting financial crime: identity verification for organisations
Emma Poposka, CEO and Co-founder at bronID, discusses the challenges of verifying organisations and complex entities, including defining what a complex entity is, and how technology like machine learning and artificial intelligence is advancing identity verification.

SHAMANE TAN: Incognito War Stories
Infiltration and ethical hacking are all part of a day’s work for Privasec’s Chief Growth Officer, Shamane Tan. In this episode, we look at cybersecurity through the lens of penetration testing and uncover what organisations need to look out for when it comes to auditing and protecting their assets.