Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

The solution to esports’ identity problem is as simple as a selfie

By Conor White
row of gaming chairs at long desk

Image via Unsplash

August 4, 2023

Esports has a problem. An identity problem.

While esports players and the emerging multi-billion-dollar industry certainly know who they are and who their audience is, their identity problem lies within the lack of effective digital identity security protocols many esports organizations have in place.

New account creation, tournament competition and monitoring player activity are being compromised by multi-accounting. 

Multi-accounting is, albeit unwittingly, enabled by esports organizations that lack a modern identity proofing and authentication system. When organizations rely on legacy security factors and outdated technology, they place their company and their players at risk of reputational and financial losses.

The solution to esports’ identity problem? Biometrics combined with AI-powered identity proofing and verification.

The risks of multi-accounting

While most organizations do their best to mitigate the impact and existence of multi-accountholders, their presence — no matter their number within a community — can have lasting and damaging effects on not only that organization, but on the entire industry. 

Multi-accounting is a form of fraud that has many faces. “Smurfing” is a type of multi-accounting wherein a player creates secondary accounts — often at skill levels below their own — to pass themselves off as someone else, win more money in tournaments and gain an unfair advantage in gameplay. “Griefing” or “Trolling” is another kind of multi-accounting where bad actors engage in disruptive behavior towards other players, often causing those players to abandon the game. And the list goes on.

These forms of fraud (and many others) can do a lot more than just turn the tide of a competition in the offending player’s direction for financial gain; they demoralize and insult other players, in turn ruining the experience for both fans and contestants and placing valuable esports sponsorship deals at risk.

Even in non-tournament play, or in situations without monetary rewards up for grabs, players have complained time and again about these multi-accountholders harassing them online — effectively unchecked. 

To make matters worse: an organization’s ability to keep these nefarious players in check is nonexistent if the player can simply open another account under different credentials after being banned.

But identity proofing and verification eliminates all of these risks and more, giving esports organizations the visibility into who is using their network so they can keep players in check — for the safety and enjoyment of everyone in their online communities.

Identity proofing

Identity proofing and verification (IDV) is a convenient yet sophisticated solution to the esports identity problem. 

When powered by biometrics, like facial recognition, IDV is fast and frictionless, giving gamers who are eager to get online a secure way to start playing in a matter of minutes. And when identity proofing and verification includes matching against existing registrations, companies can be assured each player only has one account. All the player is asked to do is scan an identity document and snap a selfie.

First, the player simply scans an ID, like a driver’s license or passport. The identity document is checked to ensure it is authentic and unaltered (not tampered with or forged) and demographic data, if present, can be compared with information the player provided (like address, email, and phone number) when first registering with the esports organization. 

Then, the image on the document is compared with a facial biometric captured when the player takes a selfie. During this step an AI-powered biometric algorithm can analyze the player’s face, ensuring they are truly the person they claim to be. In addition, liveness detection verifies that the player is “real” and not a fraudulent photo, video replay, deepfake, or other kind of manipulated content known as a presentation attack. Finally, biometrics is used to “bind” the player to that unique ID. 

Once approved, a player is verified and may only be asked to authenticate their identity at certain transaction points again in the future — like when entering a tournament or match — by snapping a selfie. The passwordless aspect of IDV is a huge selling point for user experience, especially for a tech-savvy group like gamers. 

IDV can be instrumental for esports organizations because it offers ease of buy-in and limited loss of users; organizations can gain maximum security with minimal effort. 

Some early adopters have made ID verification opt-in, offering players who choose to do so some kind of credit or even opportunities to play in special tournaments. Other organizations have chosen to take a layered approach to identity protection, where players can choose just the facial biometric without the ID match, giving them lower levels of access that still successfully prevent multi-accounting.

Identity proofing is built with Privacy By Design principles, meaning a player’s biometric template — not their actual face — is safely stored and rendered meaningless even if it is somehow accessed by a bad actor, as it’s nearly impossible, with market-leading IDV tech, to match a template to a specific player’s personal information. This eases any concerns a player may have about their identity being “stolen” or otherwise misused by the organization or a fraudster if a data breach were to occur.

From the organization’s standpoint, esports companies implementing IDV benefit from definitively knowing who every player is and enjoy the peace of mind that identity proofing eliminates any incentives a bad actor previously had under total anonymity.

To preserve the user experience players are accustomed to, even with these enhanced security measures in place, esports organizations can continue to give players the in-game anonymity they have always enjoyed.

Widespread adoption of identity proofing and verification in the esports industry would allow companies to engage with new and existing players confidently, reassured that they are authorized to play in a match and that the player is genuinely who they claim to be and not a fraudulent multi-accountholder. IDV fosters safer esports arenas and positive gaming experiences for all — something everyone can root for.

KEYWORDS: identity (ID) management tools identity verification online privacy online security scam

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Conor White is President of New Industries at Daon.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gaps in Cybersecurity Programs

    The perfect storm: How hardware security is getting weaker as the industry changes its cybersecurity models

    See More
  • malware-cyber-crime-freepik.jpg

    Malware-as-a-service is the growing threat every security team must confront today

    See More
  • user-freepik1170x658v50.jpg

    Protecting the user as a high-value asset to achieve a safer cyber world

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!