Published onÂ
October 22, 2024
The 10 Best Identity Verification Software Solutions for 2024
In this story
Accelerate AML Compliance: Meet Regulatory Demands with 80% Less Setup Time
Choosing identity verification software with a high return on investment (ROI) is crucial for businesses aiming to streamline operations, enhance security, and improve customer experiences while maximizing profitability. According to Juniper Research, the number of digital identity verification checks will surpass 70 billion in 2024.
By investing in powerful identity verification solutions, businesses can significantly reduce manual verification costs, minimize the risk of fraud and identity theft, and ensure compliance with regulatory requirements. Also, efficient identity verification processes lead to faster onboarding and smoother user experiences, ultimately driving customer satisfaction and retention.
List Of The Best Identity Verification Software
Companies in highly regulated industries often turn to identity proofing solutions to ensure their customers are who they claim to be before granting access to sensitive services. These identity proofing solutions are comprehensive systems that use various verification methods such as biometric checks and document validation to confirm a person's identity.
Here is a list of the best ID verification systems:
What is Identity Verification Software?
Identity verification software is a tool, or a set of tools used to confirm that an individual is who they claim to be. It employs various methods and technologies to authenticate a person's identity based on the information provided. These ID verification solutions are often utilized by businesses and organizations in processes such as customer onboarding, account opening, financial transactions, and access control.
How Does ID Verification Software Work?
ID verification solutions typically involves the following steps:
Step #1 Document Verification: It involves scanning and verifying government-issued identification documents such as passports, driver's licenses, or national ID cards. The ID Verification Software checks for security features, validity, and consistency of the information presented.
Step #2 Biometric Authentication: Many identity verification companies now offer digital identity verification solutions that combine AI and biometric checks for enhanced fraud prevention.
This includes using biometric data such as fingerprints, facial recognition, or voice recognition to confirm a person's identity. Biometric authentication adds an extra layer of security as it is difficult to forge or replicate.
Step #3 Data Verification: The ID verifications systems may cross-reference the information provided by the individual against various databases to verify its accuracy and legitimacy. This can include checks on addresses, phone numbers, and social security numbers.
Step #4 Behavioral Analytics: Some advanced identity verification software employs behavioral analytics to assess whether the behavior of the user matches their expected patterns. This can help detect suspicious activities or potential fraud.
Step #5 The Use of ML in AI algorithms: Machine learning algorithms are often used to continuously improve the accuracy of identity verification by learning from patterns and adapting to new fraud techniques.
When scaling a business that requires strict security, customer identification software helps ensure every user is verified without slowing down the onboarding process.
Comply quickly with local/global regulations with 80% less setup time
The 10 Best Identity Verification Software Solutions
When comparing identity verification software vendors, evaluating them based on various aspects is essential to ensure they meet your specific needs and requirements. We have compiled the top 10 vendors for your verification needs and are evaluating them in terms of the following:
- Coverage and Compliance
- Ease of Integration
- User Experience
- Security and Fraud Prevention
- Scalability and Performance
- Cost and Pricing Model
- Customer Support
1. FOCAL
1. Accuracy and Reliability
FOCAL leverages native integration with official national databases and trusted data providers for ID verification, ensuring accuracy.
FOCAL ensures precise identity verification by leveraging native integration with official national databases and trusted data providers for key data points such as IBAN, Address, ID Number/Iqama, and CR check. This comprehensive approach guarantees the accuracy of verified identities.
2. Coverage and Compliance
- The platform supports verification across multiple regions and jurisdictions by integrating with authoritative identity data providers.
- Compliance with regulations such as GDPR, KYC, AML, and others is ensured through native integrations with trusted sources like Yakeen and Wathq.
3. Ease of Integration
- FOCAL offers flexible API integration options, allowing seamless integration with existing systems or adopting their user-friendly UI for instant functionality.
4. User Experience
- The platform emphasizes intuitive onboarding processes, utilizing AI to eliminate human error and enhance operational efficiency.
- Customizable platform capabilities enable tailored verification solutions to meet clients' unique needs and risk profiles.
5. Security and Fraud Prevention
- FOCAL employs AI technology to cross-check customer data with trusted sources, enhancing security and fraud prevention measures.
6. Scalability and Performance
- The platform offers scalability, allowing businesses to accommodate different sizes and use cases.
- The platform ensures rapid response times, with an average of less than 50ms, catering to high-volume transactions. Additionally, our batch upload option facilitates seamless handling of large-scale data inputs."
7. Cost and Pricing Model
- Businesses can request a demo and discuss pricing tailored to their unique needs.
- The flexibility in pricing and scalability suggests potential accommodation for different business sizes and use cases.
8. Customer Support
- FOCAL has a positive reputation for excellent customer support, with support available 24/7 through multiple channels. You can reach FOCAL team by phone, email, or live chat.
- Overall, FOCAL provides a comprehensive identity verification solution suitable for fast user onboarding while ensuring security and compliance. However, potential users should contact FOCAL directly for pricing details.
2. Onfido
1. Accuracy and Coverage
- Onfido boasts an extensive coverage of 2,500 document types from 195 countries, indicating a broad scope of verification capability.
- The combination of biometrics and document verification suggests a strong approach to identity verification, which may enhance accuracy.
2. Ease of Integration
- Easy to integrate, requiring minimal effort.
3. User Experience
- The use of biometrics, including video selfie verification, suggests a modern and user-friendly verification process.
4. Security and Fraud Prevention
- Onfido's combination of biometrics and document verification, coupled with machine learning analysis and possible manual review, indicates a comprehensive approach to security and fraud prevention.
- The suitability for fraud and compliance, including KYC and AML checks, underscores its emphasis on security.
5. Scalability and Performance
- Onfido offers scalability and performance suitable for high-volume transactions and peak usage periods.
6. Cost and Pricing Model
- Onfido's pricing is available upon request, which means you'll need to reach out to them to get a clear understanding of the cost structure and whether it aligns with your budget and requirements.
7. Customer Support
- According to the reviews of Onfido’s customers, their customer support team is helpful and quick.Â
3. iDenfy
1. Accuracy and Reliability
- iDenfy offers advanced identity verification capable of handling over 2,500 ID documents from 190+ countries.
- The platform includes features such as facial recognition, liveness detection, Know Your Business (KYB), and AML screening.
- The absence of device fingerprinting might limit the identity verification systems’ ability to verify users with higher accuracy.
2. Coverage and Compliance
- iDenfy's verification products cover a wide range of ID documents and verification methods, supporting users from various regions and jurisdictions.
- It offers AML screening and compliance checks, indicating a focus on regulatory requirements.
3. Ease of Integration
- iDenfy provides customizable onboarding and verification flows, allowing businesses to build tailored solutions.
4. User Experience
- The platform is customizable, allowing businesses to design user-friendly onboarding and verification processes.
5. Security and Fraud Prevention
- iDenfy offers risk scoring per verified individual, providing fraud prevention capabilities.
- The absence of device fingerprinting may limit the platform's ability to detect fraudulent activities based on hardware or software anomalies.
6. Scalability and Performance
- iDenfy offers scalability, ensuring an unlimited number of ID verifications can be processed quickly.
- The platform guarantees zero downtime, indicating reliability and high performance even during periods of high demand or increased verification volumes.
7. Cost and Pricing Model
- Pricing is based on a pay-per-approved-user model, providing convenience for businesses.
- However, specific pricing details are not provided, requiring businesses to contact iDenfy for more information.
8. Customer Support
- iDenfy's customer support team receives positive reviews for its responsiveness and assistance.
4. Ondato
1. Accuracy and Reliability
- Ondato's identity verification service claims to offer high accuracy, with 99.8% accuracy rate.Â
2. Coverage and Compliance
- Ondato supports verification across multiple regions and jurisdictions, allowing businesses to adapt to regulations based on different countries' requirements. It meets compliance requirements for financial institutions, making it suitable for KYC and AML purposes.
3. Ease of Integration
- Ondato offers easy integration via a software-as-a-service (SaaS) model. It provides APIs and SDKs for seamless integration into existing systems or applications.
4. User Experience
- Ondato offers a variety of verification methods, including assisted identity verification via video calls, manual identity verification through document uploads, NFC-based verification, and automated photo-based verification. The platform aims to provide a user-friendly experience with fast onboarding.
5. Security and Fraud Prevention
- Ondato implements security measures such as liveness detection, spoofing checks, and governmental registry checks to prevent identity fraud. It utilizes biometric and face-match technology for enhanced security.
6. Scalability and Performance
- Ondato's identity verification service is scalable and can handle large volumes of verifications. The average verification time is less than 60 seconds, depending on the process used.
7. Cost and Pricing Model
- Pricing for Ondato's identity verification service varies depending on the plan. The growth plan starts at 0.95€ per verification PLUS 259€ License fee per month.
8. Customer Support
- Ondato’s customer support is quick and responsive.Â
5. Veriff
1. Accuracy and Reliability
- Veriff utilizes AI-powered verification processes, which can contribute to high accuracy.
2. Coverage and Compliance
- Veriff boasts coverage of over 11,000 different government-issued identity documents in over 230 countries and territories and in 45 languages, indicating strong global coverage.
- The service is compliant with GDPR, SOC 2 Type II, ISO 27001, and other relevant regulations, ensuring data security and privacy.
3. Ease of Integration
- Veriff offers simple UI and API integration, minimizing training requirements and facilitating seamless integration into existing systems.
4. User Experience
- Positive reviews highlight the intuitive UI and step-by-step guidance, enhancing user experience for both administrators and end-users.
5. Security and Fraud Prevention
- Veriff prioritizes security with encryption protocols and compliance with industry standards.
- Advanced features like biometric authentication contribute to fraud prevention.
6. Scalability and Performance
- Veriff's adaptable software architecture allows for scalability according to business needs, ensuring performance even during high-volume transactions and peak usage periods.
7. Cost and Pricing Model
- Pricing plans are based on the number of monthly verifications, with customizable options available for different business needs.
8. Customer Support
- Veriff provides highly responsive customer support.
6. SEON
1. Accuracy and Reliability
- SEON offers end-to-end anti-fraud prevention and passive identity verification.
2. Coverage and Compliance
- SEON's technology covers real-time data enrichment from over 50 online networks and platforms, including social media.
- The system is GDPR compliant and follows ISO/IEC 27001 and PCI DSS regulations.
3. Ease of Integration
- SEON offers a simple API for integration with existing systems.
4. User Experience
- SEON's API integrates with most systems, and the fraud detection process is convenient once set up.
- Customizable verification processes allow businesses to tailor the solution to their needs.
5. Security and Fraud Prevention
- SEON is GDPR compliant and adheres to ISO/IEC 27001 and PCI DSS regulations.
- Regular security assessments are conducted by third-party auditors to ensure data security.
- Features like reverse social media lookup and machine learning for risk scoring contribute to fraud prevention.
6. Scalability and Performance
- As an AWS cloud-based platform, SEON offers scalability according to customer needs.
7. Cost and Pricing Model
- SEON offers both free and pro options. The pro option starts at $599, however the free version is available with limited API calls.
8. Customer Support
- SEON’s customer support team is helpful and quick.
7. ID.me
1. Accuracy and Reliability
- D.me meets NIST 800-63-3 IAL2 and AAL2 standards, indicating a high level of accuracy and reliability in identity proofing and authentication.
- It aligns with federal standards for consumer authentication, suggesting a commitment to accuracy and reliability.
2. Coverage and Compliance
- ID.me is US-based and primarily focused on verifying US-based customers, which may limit its coverage for businesses with international customers.
- It complies with federal standards and meets EPCS standards, demonstrating compliance with relevant regulations.
3. Ease of Integration
- ID.me offers interoperable login, allowing users to verify their identity once and use it across any organization where ID.me is integrated, which enhances ease of integration for businesses.
4. User Experience
- ID.me emphasizes simplicity in proving identity online, which suggests a focus on user experience.
5. Security and Fraud Prevention
- ID.me utilizes mobile network operator SIM verification, document verification, and facial recognition with liveness detection for biometric matching, indicating a comprehensive approach to security and fraud prevention.
- It meets NIST standards for identity proofing and authentication, further enhancing security.
6. Scalability and Performance
- ID.me offers flexible verification paths, allowing users to complete identity proofing through the most convenient method, which suggests scalability according to user needs.
7. Cost and Pricing Model
- Pricing information is not available without contacting the ID.me team, indicating a potentially customized pricing model based on business needs.
8. Customer Support
- According to customers’ reviews, there are controversial reviews regarding customer support.Â
8. Token of Trust
1. Accuracy and Reliability
- Token of Trust offers various verification methods, including government ID verification, electronic ID verification, document scanning, biometrics, and age, address, or social verification.
2. Coverage and Compliance
- Token of Trust provides a wide range of verification services, including government ID verification and document verification.
3. Ease of Integration
- Token of Trust offers its services via API and even provides a WordPress plugin, making integration easier for businesses.
- However, customer feedback suggests that it may not be fully plug-and-play, and some effort may be required to integrate its tools into existing systems.
4. User Experience
- Token of Trust's wide range of tools and availability via API and WordPress plugin could provide flexibility and customization options for businesses.
5. Security and Fraud Prevention
- Token of Trust's services include age verification, AML screening, authoritative database checks, document verification, and government ID verification, which can contribute to security and fraud prevention.
6. Scalability and Performance
- Token of Trust is scalable according to business needs and growth and it supports high-volume transactions and peak usage periods.
7. Cost and Pricing Model
- The pricing model includes a monthly fee starting at $160, plus an additional cost per verification, $1.22 per verification.
8. Customer Support
- According to customers’ reviews on the GetApp website, there are controversial opinions regarding the customer support team of Token of Trust.Â
9. Jumio
1. Accuracy and Reliability
- The platform offers an analysis of 5,000 document types from over 200 jurisdictions, which indicates a comprehensive coverage that may enhance reliability.
2. Coverage and Compliance
- Jumio supports verification across a wide range of regions and jurisdictions, covering more than 200 countries.
- The platform offers bank-grade security and compliance features, making it suitable for heavily regulated industries.
- It allows checking custom watchlists and databases for KYC and AML purposes, enhancing compliance capabilities.
3. Ease of Integration
- Jumio offers APIs or SDKs for seamless integration into existing systems or applications.
4. User Experience
- Jumio prides itself on providing a good user experience, which could lead to reduced churn for businesses.
- According to a customer’s review on G2, integration is not a simple plug-and-play.
5. Security and Fraud Prevention
- Jumio emphasizes bank-grade security features, indicating a strong commitment to protecting sensitive user data.
- The platform calculates fraud risk and makes risk-based decisions, suggesting advanced fraud prevention capabilities.
6. Scalability and Performance
- Jumio offers a scalable solution capable of handling large volumes of transactions.
7. Cost and Pricing Model
- Pricing details are available upon request.
8. Customer Support
- According to G2 reviews, Jumio offers good support to customers.
10. Ekata
1. Accuracy and Reliability
- Ekata's identity verification solutions are powered by sophisticated data science and machine learning, suggesting a high level of accuracy.
2. Coverage and Compliance
- Ekata's solutions aim to enable businesses to combat fraud worldwide, indicating broad coverage.
- Compliance with international standards such as GDPR, CCPA, and PCI DSS demonstrates a commitment to regulatory requirements.
- Integration with other software platforms and APIs suggests the potential for accessing government databases or third-party identity verification services, enhancing coverage.
3. Ease of Integration
- Ekata offers multiple products with APIs for seamless integration into existing workflows and systems.
- The customer service team assists with onboarding and integration, ensuring a smooth process for businesses.
4. User Experience
- Customizable verification solutions and integration options suggest a tailored approach to meet specific user requirements.
5. Security and Fraud Prevention
- Ekata prioritizes security and compliance with measures such as advanced encryption, authentication protocols, and regular security assessments.
- The platform's infrastructure is designed to protect against data breaches and unauthorized access.
6. Scalability and Performance
- Ekata's software is easily scalable and capable of handling large volumes of queries and transactions, offering flexibility and customization.
- Integration with other software platforms and APIs enhances scalability and performance.
7. Cost and Pricing Model
- Pricing is available upon request.
8. Customer Support
- Ekata offers 24/7 customer support.
12 Common Identity Verification Software Features
The efficiency of customer identification software lies in its ability to streamline the verification process while reducing the risk of fraud.
The top common identity verification software features provide a powerful framework for ensuring secure and efficient identity authentication processes. Here's a breakdown of these features and the benefits they offer:
1. Document Verification
This feature enables the verification of various identity documents like passports, driver's licenses, and national ID cards, ensuring their authenticity and validity. ID verification systems help prevent identity fraud by confirming the legitimacy of documents provided by users.
2. Biometric Authentication
By integrating biometric authentication methods such as facial recognition and fingerprint scans, the software enhances security by verifying users' unique physical characteristics. This reduces the risk of impersonation and ensures that only legitimate individuals gain access.
3. Data Verification
Cross-referencing user-provided information against multiple databases helps verify its accuracy and legitimacy, including details like addresses and phone numbers.
4. Real-time Verification
Instantaneous verification processes allow businesses to swiftly onboard customers or authenticate identities during transactions without causing delays. This improves operational efficiency and enhances the user experience by providing a seamless verification process.
Read more: How Aseel reduced onboarding time by more than 87% using FOCAL
5. Compliance
Compliance with regulatory requirements such as KYC, AML, and GDPR ensures that the identity verification process meets legal standards, thereby, identity verification systems prevent fraud and financial crimes.
6. User Experience
Intuitive interfaces for both customers and administrators streamline the verification process, reducing complexity and ensuring a smooth user experience. This improves customer satisfaction and encourages user adoption of the verification system.
7. Fraud Prevention
Advanced fraud detection algorithms and machine learning capabilities help detect suspicious activities, fraudulent documents, and unusual behavior patterns.Â
8. Customization and Integration
Flexibility to customize verification workflows and seamless integration with existing systems through APIs or SDKs cater to specific business needs. This adaptability improves operational efficiency and ensures compatibility with existing infrastructure.
9. Scalability
The ability to handle verification processes for a large volume of users or transactions ensures scalability as businesses grow or experience fluctuations in demand. This scalability ensures the software can accommodate increasing verification needs without compromising performance.
10. Audit Trails and Reporting
Comprehensive audit trails and reporting functionalities provide detailed logs of verification activities, ensuring transparency and compliance with regulatory requirements. This enables businesses to track verification processes and maintain accountability.
11. Data Security
Implementation of strong security measures such as encryption, data anonymization, and secure storage practices protects sensitive user information and prevents unauthorized access or data breaches.
12. Customer Support
Access to responsive customer support services addresses any issues or queries related to the verification process promptly. This ensures smooth operation and helps resolve user concerns effectively, fostering trust and confidence in the software.
Read more: The Best 10 KYC Software Solutions in 2024 Reviewed
Automated vs Human-Supervised ID Verification
When comparing automated vs human-supervised identity verification, both methods offer distinct advantages depending on the needs of the business. The effectiveness of ID verification systems depends heavily on their ability to balance automation with human oversight, particularly for high-risk scenarios.‍
Here is the distinction:
- Automated ID verification uses AI and machine learning to instantly verify identity documents and biometrics with minimal human intervention. It is highly scalable and cost-effective, making it ideal for high-volume businesses. Automated systems can quickly detect fraud by comparing user-submitted data to large databases of documents and biometric templates, but they can struggle with more complex cases, such as poor image quality or edge cases that require nuanced judgment.
- Human-supervised ID verification, on the other hand, combines automation with human oversight, ensuring accuracy by having KYC specialists review the results of AI-based verifications. This hybrid approach is more thorough, especially for cases where automated systems might fail or flag suspicious activity that needs further investigation.
Identity Verification Vs Know Your Customer: What’s The Difference?
Identity verification and Know Your Customer (KYC) are closely related concepts, but they have distinct purposes and scopes within identity management and regulatory compliance.
1. Identity Verification
What is it?
Identity verification is the process of confirming that an individual is who they claim to be. It focuses on authenticating the identity of a person based on the information provided.
What does it involve?
Identity verification typically involves verifying identity documents such as passports, driver's licenses, or national ID cards, along with biometric authentication methods such as facial recognition or fingerprint scans.
What is its goal?
The primary goal of identity verification is to ensure that the person engaging in a transaction or accessing a service is indeed the legitimate owner of the identity being presented.
2. Know Your Customer (KYC)
What is it?
KYC is a broader regulatory requirement that mandates financial institutions and certain businesses to verify the identity of their customers or clients.
What does it involve?
KYC involves collecting and verifying specific information about customers, including their identity, address, occupation, and source of funds.
What is its goal?
The purpose of KYC is not only to confirm the identity of customers but also to assess their risk profile and detect and prevent money laundering, terrorist financing, and other financial crimes.
KYC regulations vary by jurisdiction but are typically enforced by government agencies and regulatory bodies to ensure the integrity of financial systems and prevent illicit activities.
Read more: What is Know Your Customer Risk Rating? How Does It Work?
Identity Verification Use Cases
Identity verification finds applications across various industries and sectors, each with unique use cases tailored to their specific needs. Here are some common use cases for identity verification:
1. Financial Services
- Account Opening: Verify the identity of individuals opening new bank accounts, investment accounts, or applying for loans or credit cards to comply with KYC regulations and prevent fraud.
- Transaction Verification: Authenticate users before processing high-value transactions or sensitive financial operations to ensure security and prevent unauthorized access.
2. Ecommerce and Retail
- Customer Onboarding: Verify the identity of new customers during the registration process to prevent fraudulent accounts, unauthorized access, and identity theft.
- Age Verification: Confirm the age of users purchasing age-restricted products such as tobacco to comply with legal requirements and prevent underage sales.
3. The Cryptocurrency Industry
- Transaction Monitoring: Enables effective monitoring of transactions, helping detect and prevent suspicious activities.
- Regulatory Compliance: Ensures adherence to KYC and AML regulations, preventing money laundering and illicit activities.
Read more: Cryptocurrency Transaction Monitoring: Regulations, and Best Practices
Choose The Right Identity Verification Software For Your Business
Choosing the best Identity Verification tool for your business requires careful consideration of several factors to ensure that it meets your specific needs and requirements. Consider the following to choose the right and best fit for you and your business:
1. Identify Needs: Define your requirements for identity verification, considering verification volume, security levels, compliance, and integration.
2. Evaluate Features: Review identity verification tools for essential features like document verification, biometric authentication, real-time verification, compliance, scalability, and customization.
3. Consider User Experience: Prioritize user-friendly identity verification tools to enhance adoption and satisfaction among customers and administrators.
4. Assess Security: Ensure strong security measures, including encryption, data anonymization, and compliance with industry standards, to protect sensitive information.
5. Evaluate Accuracy: Look for tools employing advanced technologies like machine learning to improve verification accuracy and reduce false positives.
6. Check Compliance: Verify regulatory compliance, such as KYC, AML, and GDPR, to avoid legal risks and penalties.
7. Consider Integration: Choose tools offering seamless integration via APIs or SDKs to incorporate verification into existing systems.
8. Assess Scalability: Ensure tools can scale to handle growing verification needs efficiently.
9. Review Support: Select vendors offering responsive customer support to address issues promptly.
10. Evaluate Cost: Consider the cost in relation to features and benefits to ensure good value for money.
Conclusion
In conclusion, selecting the most suitable identity verification software for your business demands thorough research and consideration. Keep in mind that what works best for another company may not necessarily be the ideal fit for you.
Also, when selecting an ID verification service, consider the system's ability to integrate seamlessly with your existing infrastructure to streamline operations. f you're handling sensitive data for your business, choosing the right ID verification service is key to preventing fraud and ensuring compliance with regulations.
Please note that the information provided in this review of identity verification software is derived from online research rather than direct experimentation with each tool. Should you need updates or detect any discrepancies, feel free to contact us for further explanation or adjustments.
Frequently Asked Questions Related To Identity Verification
Q1. What is identity verification?
Identity verification confirms someone's identity through various methods like document checks and biometric scans.
Q2. Who requires an ID verification solution?
Businesses needing to verify the identities of customers or users typically require an ID verification solution.
Q3. Where is identity verification applicable?
Identity verification is applicable across industries such as finance, ecommerce, healthcare, and government services.
Q4. What are the typical costs of identity verification providers?
Costs vary based on factors like verification volume and features needed. Contact the FOCAL team to learn more.Â
Q5. Which features are essential in IDV software?
Identity verification providers offer different features. Essential features include document verification, biometric authentication, real-time verification, compliance with regulations, scalability, and user-friendly interfaces.
Streamline Compliance: Achieve 80% Faster Setup for Fraud Prevention
How Aseel reduced onboarding time by more than 87% using FOCAL
Learn how FOCAL empowered Aseel to achieve new milestones.
Mastering Fraud Prevention: A Comprehensive Guide for KSA and MENA Businesses
51% of organizations fell victim to fraud in the last two years, don't be caught off guard, act proactively.
Comments
Leave a Reply
Comment policy: We love comments and appreciate the time that readers spend to share ideas and give feedback. However, all comments are manually moderated and those deemed to be spam or solely promotional will be deleted.