What happens when your “verified” user is a deepfake? We talk with Authenticate’s Founder & Head of Sales about building identity that holds up under modern attacks, without breaking CX.
Identity is now both the front door and the backstop. Steve Ward, founder and Head of Sales of Authenticate, shares how his team is simplifying verification for product and operations leaders facing deepfakes, social engineering, and rising fraud costs. Authenticate rolls KYC and KYB, AML and watchlists, background checks, and consented re-checks into one platform. Teams can start with a no-code flow or wire it in by API. The aim is straightforward: raise assurance, cut manual work, and avoid multi-vendor sprawl.
We dig into patterns that hold up under pressure. A single link triggers a pre-configured journey, so call-center agents get to resolution faster. Friction is added only when signals warrant it, like device anomalies, location risk, or proxy use, so good customers move through quickly. Continuous monitoring replaces one-off audits and keeps watch between events.
Steve also opens up about a pricing decision. They are phasing out open-ended promotional credits in favor of a one-time onboarding incentive, with optional commitments for lower unit rates. It protects margin and gives customers a clear choice between flexibility and price, without locking anyone into multi-year contracts.
Use cases include fintech onboarding, short-term rentals with ID-to-card match and guest screening, age-gated communities, e-signature and remote notarization, and account recovery. The common thread is verifying the person behind the device and placing the right speed bumps where they matter.
Looking to the next 12 months, Authenticate plans to deepen in the verticals where it sees traction, expand marketplace integrations for discovery, and ship more device intelligence so risk engines stay ahead of new attacks.
Who should listen: CEOs, GMs, and leaders across fintech, marketplaces, hospitality, healthcare, and any business where trust and speed need to coexist.
Key moments
00:00 What Authenticate is and who it serves
03:54 Deepfakes, call-center flows, and purposeful friction
07:31 Configuring Medallion checks to match your risk
09:33 Short-term rentals: chargebacks and guest screening
18:35 Continuous monitoring vs periodic rechecks
19:56 Growth via marketplaces and device-signal roadmap
31:10 Pricing decision: promos to commitment options
42:51 Outbound engine, agency first, then hire
Links
Authenticate — https://authenticate.com/
Authenticate on LinkedIn - https://www.linkedin.com/company/authenticatedotcom/
Guest: Steve Ward — https://www.linkedin.com/in/stevenbward/
Host: Brad Pitts — https://www.linkedin.com/in/bradleypitts/
Inquiries: [email protected]