Polyguard guarantees that who you see on your video call is who they really are. Our real-time, continuous verification system protects you from sophisticated impersonation attacks. Polyguard is currently available with Zoom, with support for Teams and Meet coming soon.
Threat Landscape: Attackers can generate deepfakes in real-time with ordinary computers, using personal data (photos, audio, etc.).
Targets: High and Ultra High Net Worth individuals, finance teams and professionals with authority over fund movements, advisors in real estate, institutional brokers, and wealth managers.
Non-Financial Impersonation Attacks include Kidnapping Scams targeting parents and grandparents, Romance Cons targeting lonely men through dating sites, Pig Butchering targeting cryptocurrency traders, and Political Attacks targeting military and diplomatic communications.
Risk: Attackers use pre-recorded deepfakes or clips for fraudulent purposes.
Solution: Polyguard warns you of pre-recorded content by popping out the sidebar and marking the user red.
Attackers can now generate deepfakes in real-time on ordinary computers, using personal data (photos, audio, etc.).
With Glass-to-Glass Verification, Polyguard makes it known if someone is perceptually modifying what their camera is capturing, causing the Polyguard App to pop open and highlighting that something isn't right.
How do you know WHO you're talking to?
Government ID proofing paired with cutting edge facial biometric detection, ensures that the name you see belongs to that person.
With Polyguard, your video call streams are continuously signed, ensuring "WHO You See Is WHO You Get" verification. Polyguard requires:
Participants can use any standard webcam. Within standard video conferencing apps like Zoom, Microsoft Teams or Google Meet, the Polyguard Bot verifies the signature for each participant. If there's any discrepancy between what was signed and what is displayed, you are immediately notified.
Data Minimization: If we don't have it, we can't lose it. Account information is only what's required to process commercial transactions.
Client and Call-Side Video Hashing: No storage of video or audio, only perceptual hashes.
Temporary Data Storage: Meeting participant names stored only for meeting duration.
Unknown Name: Name provided by Apple ID (unverified). No document verification completed.
Verified Name: User has verified themself against a government ID on this device.
Known-Bad Name: Something is not right. This is likely not the claimed user.
Unknown Biometrics: Biometric authentication has not yet been setup on this device.
Verified Biometrics: Biometric authentication has verified this to be the claimant's face.
No-Match Biometrics: The user you are seeing is not this device's authorized user.
Unknown Employer: User has not verified their place of work.
Verified Employer: User has been verified by [company x] as being an employee.
No-Match Employer: User has claimed to be an employee at [company x] - they are not.
Protecting businesses and professionals from AI-powered fraud, through industry-leading remote identity verification.