authID Q4 2024 Earnings Call Transcript

There are 8 speakers on the call.

Operator

Good afternoon, everyone, and thank you for your participation in today's conference call to discuss AuthID Fourth Quarter and Full Year twenty twenty four financial results. I would now like to turn the call over to OAuth ID General Counsel, Graham Murad. Graham, please go ahead.

Speaker 1

Thank you, operator. Greetings and good afternoon. This is Graeme Radd, General Counsel at Ortho ID. Welcome to the Ortho ID fourth quarter and full year twenty twenty four earnings conference call. As a reminder, this conference is being recorded.

Speaker 1

With me on today's call are our CEO, Ron Deguro our CFO, Ed Salito and our Founder and CEO, Tom Zocchi. By now, you should have access to today's press release announcing our fiscal year twenty twenty four results. If you have not received this, the release can be found on our website at www.authid.ai under the Investor Relations section. Throughout this conference call, we will be presenting certain non GAAP financial information. This information is not calculated in accordance with GAAP and may be calculated differently from other companies similarly titled non GAAP information.

Speaker 1

Quantitative reconciliation of our non GAAP adjusted EBITDA information to the most directly comparable GAAP financial information appears in today's press release. Before we begin our formal remarks, let me remind everyone that part of our discussion today will include forward looking statements. Such forward looking statements are not guarantees of future performance and therefore you should not put undue reliance on them. These statements are subject to numerous risks and uncertainties that could cause actual results to differ materially from what we expect. Some of these risks are mentioned in today's press release.

Speaker 1

Others are discussed in our Form 10 ks and other filings, which are made available at www.sec.gov. I'd now like to introduce our CEO, Ron DeGuro.

Speaker 2

Thank you, Graham. And thank you all for joining us today to discuss our fourth quarter and full year twenty twenty four results. OFID is a biometric authentication company focused on knowing who's behind the device. While artificial intelligence has made incredible strides across many use cases within the last two years, it has also brought advances in deepfake capabilities, which make it increasingly difficult to verify a person's identity. I want to start off the call by sharing the statement which captures the role auth ID plays in today's world.

Speaker 2

Artificial intelligence is producing the most realistic, inauthentic content the world has ever seen. The only way to allow companies to ensure authenticity is to give them the capability to trust the physical presence of an individual human being. This is what auth ID delivers. I'm very proud of our 2024 growth, not only across our financial metrics, but also in the foundation we have built to be a dominant player in this rapidly expanding market. When I began my tenure as CEO, AuthID created a product that I believe had the potential to be a winner, but the team was down to bare minimum.

Speaker 2

The company was in financial strain. My mandate was to rebuild off ID to deliver strong financial and operational results and rebuild a company that lacked market credibility. So in eighteen months ago, we set ambitious goals not to just turn the business around, but to quickly grow by assembling a world class team, positioning the technology to be market leading in every category of biometric authentication. I am proud to say that we have quickly made great progress in positioning for aggressive growth and our business has improved across all key metrics. We built a proven go to market plan to execute a high growth year over year strategy where we centered our entire organization around 300 core accounts divided into three categories: fast high growth companies, large enterprise companies, and channel partners.

Speaker 2

We calibrated our sales pipeline to the rate of 9,000,000 a quarter and we closed many fast customers as we could, while nurturing large accounts for our 2025 pipeline. To this end, we assembled a team of identity domain experts that large companies can trust and feel confident to do business with. We also had to refine our software to be enterprise ready to service large brand name accounts. We did it all in just eighteen months' time, and here's what auth ID achieved in 2024. Let's start with booked ARR, which is the total of committed ARR plus estimated usage above committed ARR eighteen months from signing the contract.

Speaker 2

We set out to achieve a five year t two d three growth target, which is triple growth year one, triple growth year two, and double growth in years three, four, and five to get to $100,000,000 in ARR. For the first year, we originally targeted $3,000,000 in booked ARR over twelve months, but we achieved that target within six months, three million representing more than 3x in booked ARR from previous years. For 2024, we aim for our second 3x growth year targeting 9,000,000 and I'm very happy to report that we achieved that 3x goal of 9,000,000 this year. We also improved our remaining performance obligation or RPO by 3.5x from 4,000,000 to over 14,000,000. To reiterate, we have performed at least 3x in booked ARR and RPO.

Speaker 2

Despite our size, we have positioned ourselves to partner with very large customers, some of whom are in the late stages of our sales cycle. We expect to close multiple Fortune 500 and multinational customers in 2025. We have increased our pipeline generation activity with an open pipeline of over three x the 18,000,000 in bookings we are targeting. We are adding over 20,000,000 in bookings pipeline per quarter, which we will continue to ramp up. And we are also working diligently to bring our new customers live on the platform and convert our bookings to revenue.

Speaker 2

Moving to our fourth quarter highlights. AuthID closed the largest deal in the company's history in Q4, a $10,000,000 contract over three years with our next generation AI partner in India. We also expanded our relationship with Einstrong to enable a larger initiative to provide basic income payments to individuals and families in need around the world. This represents a satisfied customer who increased their usage of AuthID, a land and expand model we are working to replicate with more customers. We also added several new customers and partners in Q4, including TurboCheck, to help verify identity of job candidates Imperial Technologies, to support onboarding for new telecom customers a fintech for financing major recreational purposes, Verify to power reusable identities for onboarding and authenticating users across their portfolio of brands, and Sallis to report to support the automated underwriting of consumer microloans.

Speaker 2

We continue to build our partner ecosystem and seamlessly work with other platforms in order to leverage mutual market opportunities. These partnerships help us reach their existing customer bases as well as new verticals. In q four, we announced a partnership with Zendesk to enable their customers to seamlessly access auth ID through their customer support software and to better address call center use cases. We announced our membership in the Accountable Digital Identity Association or ADIA, which is a critical step as we work to advance the adoption of reusable digital identities and collaborate closely in the growth of ADIA's standardized framework and ecosystem, which is rooted in biometrics. The ADIA was founded by Ramesh Kesennupalli who also founded the FIDO Alliance, the most successful standards body solving for passwords.

Speaker 2

Our mutual goal is to validate every identity in an interoperable format controlled through biometrics. Auth ID is working with a major biometric hardware provider to showcase our reusable identity solution by deploying the first identity exchange between The United States and Japan. Our plan is to demonstrate this identity exchange between two different entities across two different countries, all based on the ADIA standard. This has never been done before. This addresses the challenges enterprises face in managing multiple identities for their global employee and contractor workforces.

Speaker 2

In addition, having a single trusted identity bound to a person's biometrics and reusable across business units and geographical territories reduces the cost of and time and unnecessary friction of onboarding individuals multiple times. Enterprises we talk to are excited about the release of the capability for reusable identities. On the technology side, in our four point zero release, we offer Privacy Key, which represents a quantum leap forward in biometric authentication, providing frictionless security while maintaining the highest standards of data privacy and protection. As we recently highlighted in a press release, the PRISM project conducted an independent analysis of auth ID's approach to privacy and compliance first biometric authentication, classifying auth ID as a luminary their highest level of distinction for our leading edge platform. I'm proud of the team's efforts and accomplishments in 2024.

Speaker 2

As I mentioned earlier, the rise of artificial intelligence is challenging identity verification solutions to contend with the most sophisticated fraud attacks that leverage deepfakes, public available AI models, and camera injection software. At AuthID, we are meeting this rising AI threat by combining the sophistication of biometric liveness and injection attack detection while also delivering speed, accuracy, and privacy to allow broad adoption for all organizations. The market has told us that there are three key pillars for adoption of biometric solutions and our foundation for differentiating auth ID in the market. Starting with speed, instead of traditional seven to ten seconds for our other vendors, AuthID can process new identities in a blazing seven hundred milliseconds for the best possible user experience or even faster at twenty five milliseconds for simple selfie biometric authentication. Next is accuracy, which we measure by false match rate, meaning the probability of matching a face to the wrong user account.

Speaker 2

No other vendor matches our one to 1,000,000,000 false match rate, which leads the market by at least four x. More importantly, even with our speed, there is no compromise to accuracy. The third key to adoption is privacy and compliance. Stringent legislation already exists in the form of CCPA, BIPA, QBI, and GDPR with new laws being enacted globally all the time. The potential liability for compliance failures around biometric data creates a tremendous amount of hesitation around the use of biometrics.

Speaker 2

With the introduction of Privacy Key, we are the first to offer biometric authentication without needing to store any biometrics. By leveraging public key technology, the baseline for all enterprise encryption and crypto, This helps auth ID customers implement biometrics with built in compliance. We also achieved an industry first with the ability to revoke biometrics to comply with corporate password rotation policies. It's a challenge in biometrics without requiring the person to effectively get a new face. This capability unlocks critical enterprise use cases where revocability is necessary in any company's IT compliance policy.

Speaker 2

This commitment to privacy and the market leading ability to deliver it further helps our customers eliminate the biggest hurdle in adoption the fear of biometric data being stolen. Identity verification technology is critical to corporations and governments. As AI continues to advance, auth ID offers a critical solution for our customers while also eliminating barriers to biometric adoption. Customers choose us because we fulfill the requirements of speed, accuracy, and data privacy. Before I turn to Ed to cover the financials, Dale will show you a three minute demo so you can see for yourselves how we help our customers combat AI generated fraud.

Speaker 3

So I'd love to talk about the type of fraud that our prospective customers experience. So across the top, we have examples of the same fraudster impersonating different victims. The victims are across the bottom. They steal someone's likeness either from social media, LinkedIn, Facebook, Instagram, find those likenesses, train a model, and overlay that likeness on top of themselves. And unfortunately, they can use this very effectively to bypass some of the legacy tools for account opening and authentication.

Speaker 3

Alright. So I wanted to show some of the the tooling that these fraudsters use to commit this type of fraud. So on the bottom left, we have my actual face, then we introduce a mapping of my face so we can track data points, then we load up our target model of the person we wish to impersonate, and then ultimately, we merge the two to create this likeness so that it appears live to be used for fraudulent purposes across digital account opening and biometric authentication. This type of tool is becoming more widespread and easily accessible, and these types of fraud attacks are what auth ID is well positioned to stop. Now to go through an example of how one would use this in practice for account opening, a fraudster would steal potentially the ID of the victim through a data breach.

Speaker 3

It could be legitimate or it could be some digitally rendered version of that ID credential. Then secondly, as you saw me do live, I can steal the likeness of my target victim, create a deepfake video feed or overlay their likeness onto a live version of myself to pass biometric and liveness detection. And ultimately, what the fraudster will then do is go through an account opening flow through a bank. Let's say that flows on the left, and on the right, the fraudster would have tooling that allows them to push in stolen copies of identities for this digital account opening. So here we see a fraudster pushing in a stolen copy of someone's ID digitally, both for the front and the back.

Speaker 3

And then secondly, they'll take that biometric that they've created through a deepfake or generative AI and use that biometric impersonation of that individual to pass a biometric match plus a liveness detection. Now unfortunately, this works with some of our competitors in the market. Thankfully, OF ID solution is well positioned to detect these types of fraud attacks.

Speaker 2

Thanks, Dale. We are very excited about our technology and our customers are equally excited. I'd like to pass the call to Ed Salido, our CFO.

Speaker 4

Thank you, Ron, and thank you all for joining us today. Looking at Slide nine, total revenue for the quarter was approximately $200,000 compared to $70,000 a year ago. For the year, total revenue was $890,000 compared with $190,000 a year ago and at the top of our expected range of $800,000 to $900,000 Operating expenses for Q4 were $4,900,000 compared with $3,300,000 last year. For the full year, operating expenses were $15,600,000 compared with $10,900,000 in 2023. The 2024 increase is primarily due to a one time noncash expense reversal in Q1 twenty twenty three of $3,400,000 of certain stock based compensation related to employee terminations, which was not repeated in 2024, as well as reinvestment in employees and contractors following the Q1 twenty twenty three restructuring.

Speaker 4

Net loss from continuing operations for the quarter was $4,600,000 of which noncash charges were $600,000 compared with a net loss of $3,200,000 a year ago of which noncash charges were $500,000 dollars For the full year, net loss from continuing operations was $14,300,000 including $2,800,000 in noncash charges. This compares to a net loss of $19,600,000 for the same period last year, which included $10,900,000 in noncash and one time severance charges with approximately $7,500,000 related to the exchange of convertible notes for common stock in 2023. Net loss per share for the quarter was $0.49 compared with $0.41 a year ago. For the full year, net loss per share improved to $1.4 compared with $3.19 last year. Next, let's turn to RPO on Slide 10.

Speaker 4

Remaining performance obligation, or RPO, provides a measure of the minimum revenue expected to be recognized from our signed contracts based on our customers' contractual commitments. As of 12/31/2024, our total RPO was $14,260,000 an increase of $10,430,000 over the prior quarter due to the impact of the large $10,000,000 contract secured in the fourth quarter. This compares favorably with the RPO at the same period last year, which was approximately $4,000,000 and is above our expectation of $13,000,000 to $14,000,000 We expect to recognize the full RPO of $14,260,000 over the entire life of the contracts, which are typically signed with a three year term. Onto our non GAAP results on Slide 11. Adjusted EBITDA loss was $4,100,000 for Q4 compared with a $2,700,000 loss for the same period last year.

Speaker 4

For the full year period, adjusted EBITDA loss was $11,900,000 compared with an $8,700,000 loss for the same period last year. The increase in EBITDA loss is primarily due to reinvestment in employees and contractors following the Q1 twenty twenty three restructuring. We also monitor and report on ARR or annual recurring revenue, which is defined as the amount of recurring revenue earned during the last three months of the relevant period as determined in accordance with GAAP multiplied by four. The amount of ARR as of q four is $800,000 compared to $1,000,000 of ARR as of Q3 and $300,000 of ARR for the same period last year. The temporary quarter over quarter decrease was driven by the accounting impact of the modification of a customer contract due to a delayed go live timeline as we previously discussed in Q3.

Speaker 4

Turning to bar or booked annual recurring revenue, which is the projected amount of annual recurring revenue we believe will be earned under contracted orders looking at eighteen months from the date of signing of each customer contract. The gross amount of bar signed in the fourth quarter of twenty twenty four was $7,130,000 up from $1,670,000 of gross bar a year ago. Our Q4 bar was driven by the large deal with our next generation AI partner in India. For the full year, 2024 gross bar was $9,010,000 up from $2,940,000 in 2023 and in line with our expectation. Net bar, which reflects the deduction in bar from contracts previously included in reported bar that were subject to attrition during the quarter, is approximately $6,860,000 compared with $1,670,000 of net bar signed in the fourth quarter of twenty twenty three.

Speaker 4

'20 '20 '4 net bar was $7,380,000 compared with $2,940,000 in 2023. The reduction from gross to net bar in 2024 is due to the impact from certain customers that have delayed their goal lives and expected usage ramp. As previously explained during our quarterly earnings call, BAR comprises two components, which we refer to as CAR and UAC. The Q4 twenty twenty four CAR or committed annual recurring revenue represents $3,680,000 with 2024 full year car representing $4,680,000 both approximately 52% of reported bar. UAC or estimated usage above commitment is an estimate of annual customer usage that will exceed contractual commitments.

Speaker 4

The UAC comprises the remaining 3,450,000 of Q4 bar and $4,330,000 of full year 2024 bar, both approximately 48% of reported bar. Turning to our revenue growth stages on Slide 12. I'll take a moment now to summarize our progress through the following revenue growth stages. The first milestone we use to monitor our growth is bookings as measured by BAR. In 2024, we realized a total gross BAR of $9,010,000 approximately a 3x increase over the same period in 2023.

Speaker 4

The next milestone is our remaining performance obligation or RPO. As I detailed earlier, as of the end of the year, we've secured approximately $14,300,000 in RPO, a $10,200,000 increase over the RPO secured by the end of twenty twenty three. Our third milestone is revenue recognized in accordance with GAAP. Our 2024 revenue is $890,000 grew approximately $700,000 over the same period in 2023. And as we've called out in prior earnings calls, we will increase our focus in monitoring our customer retention and expansion in 2025 as our customer contracts mature.

Speaker 4

We'll optimize our sales and support efforts to deepen our customer relationships and increase the value added by our services through renewals, usage growth, and customer expansions through additional use cases and product upsells. With that, operator, we would now like to open up for questions.

Operator

Thank you, sir. And to ask a question, you can submit your written questions through the webcast chat or by pressing 11 on your telephone and then wait for your name to be announced. It comes from the line of Ricky Solomon with Wilmot. Ricky, your line is open.

Speaker 5

Yes. Hey, Ron, in your sales conversations, what are the things that customers are looking at and why are they choosing off ID over other options?

Speaker 6

Thanks, Ricky. Can you hear me?

Operator

Yes.

Speaker 5

All right.

Speaker 6

Awesome. Thanks for the question. So what's really exciting with the last release of the software, we've been actually been placed in a lot of these large enterprise organizations POCs. So in these POCs, we are having use cases around new customer onboarding, workforce authentication, time and attendance, so people showing up to work and they don't want to log in, they just want to scan their face. Real big issues around download downloading sensitive documents like W2s, W2s, tax forms.

Speaker 6

The very big one right now that's really taking a lot by storm is this account takeover, where people are coming in and they're impersonating somebody else and they're kind of moving stuff around around personal data and money. Wire transfer is a big use case. Personal information changes, high risk transactions, even stuff like deleting databases. These are very critical things that they need really strong authentication. Single identity source of truth, so making sure that there's no duplicate Ricky Solomon inside anybody's identity database, so making sure everybody's unique.

Speaker 6

And then more recently, replication of biometrics. As these companies are actually looking to solve these use cases and looking at biometric providers, really they're centering their kind of like scorecard around kind of like three major pillars. First one, how fast can we do the biometric, so speed? Second one is how accurate is it? Because right now the NIST standard is only one in a hundred thousand false match rate where we're at one in a billion.

Speaker 6

And then the last piece is do I get in trouble for deploying biometrics because I'm not complying to law? And so we had the story around a Chief Compliance Officer saying, I'd love to use biometrics, but I just simply can't because I'm not a biometric expert and I don't want to subject myself to any liability. So we basically have to hit all three of these categories, which is speed, accuracy and privacy. So it's those scorecard items against those use cases is what our customers are looking at with us.

Speaker 5

Yes. And if you look at, let's say, privacy key and ADIA coming all together, I mean, how are customers looking at that? Like, could we be looking at something where a solution based on ADIA can be instead of like a business use cases you laid out like consumer facing where businesses trust one identification source for, say, if I log on to my Chase app or if I log on to my Fidelity app or like how do you see that going forward?

Speaker 6

Thank you, Guy. I love that question because there's actually two really big parts around ADIA. The first big part around ADIA is exactly how you described. Can an organization like Wells Fargo trust an identity that's been banking with Bank of America or trust an identity that's been banking with Chase? And so how does one bank be able to leverage the history and the activity and the longevity of that identity's behavior at a different institution as a form of knowing that that's Ricky Solomon as opposed to just doing a simple KYC check, which is what's your favorite color, what year car did you drive or what was your address ten years ago.

Speaker 6

They would rather trust another institution who has had history with you as opposed to just answering KYC questions. So that reusability has actually been requested of us and in fact many institutions have been trying to produce this. Name your favorite credit bureau, they're going to have this thing called their name plus the word ID right behind it. And they've been trying to a lot of organizations have been trying to create a unified ID. The problem is they were never built on a standard.

Speaker 6

So what ADIA does is create that standard that everybody can use. The beauty of that standard, it was founded by Ramesh Kesennapalli who founded the Fido Alliance. So that means that all 84 members of the Fido Alliance, including the major top five enterprise tech organizations, they're all part of it. And the hope and what we're starting to see is people are adopting that standard. So one, you got to have an adoption.

Speaker 6

Two, you have to have a standard that everybody can follow. And three, can you actually demonstrate it? So that's use case number one is company to company trust. The second more exciting use case is what we're seeing right now is like seeing an organization who has multiple business entities that they acquired over a period of time, but yet they did not integrate the business. I'll give you an example because this is my favorite company, Disney.

Speaker 6

Disney owns many brands, ESPN, all the way down to Marvel, all the way down to Hulu, all the way down to Pixar. And if you can imagine, they're not going to blend all of those companies together and have them all work in a unified system system or the same payroll system or the same identity system, they're actually each operating entity, but they're still part of the same family. So how does one manage an identity that where they onboard into Hulu, but they still need to log in to Pixar or they need to log in to Marvel or they need to log in to ESPN ESPN because they're also part of the same parent company. And so that same ADIA solution can work within an organization who has many entities or it can help us work with independent entities that have nothing to do without each other, but they could still trust that identity if they follow the standard. So that's the big opportunity, that's the holy grail for actually eradicating fraud completely and Op ID has been really focused on delivering that through ADIA because what we love about the standard is because this standard is rooted all in biometrics.

Speaker 6

And so we've been very active in that forefront and then obviously Privacy Key allows us and allows every organization that participates in ADIA to be fully, fully compliant around storage of biometrics and making sure that nobody is going to get in trouble for keeping people's biometrics stored. And again, we don't store it, so that helps with enterprises adopting the standard.

Speaker 5

Great. Thanks. One more question. I'll let someone else ask a question. So you mentioned closing Fortune I forget the language in the press release, but large enterprises this year.

Speaker 5

Like what gives you confidence that that's actually going to happen in the near future

Speaker 6

question. And that's what I'm super, super excited about. Because 2024, we did we made a bet early in the year saying, okay, what will allow large Fortune 500 companies adopt biometrics. And so that's why I was very specific saying, hey, what are the blockers? One was speed, we got that nailed.

Speaker 6

Second one was accuracy, we got that one nailed. Privacy and compliance was the third one, and we got that nailed. And it took us a little long longer in 2024 to do that. So we had set out back in April to say let's go solve this. We were trying to go into POCs with our customers and partners in the summer, but we're still delayed in building the TAC.

Speaker 6

We finalized the TAC, we got it into what I call MVP status that we got into beta that we got the beta program. So we kind of were a little bit later in the year to deliver it. But now that we're in PLCs with that technology, the results are just awesome right now. So we're in these very late stages of these sales cycles with a number of these major enterprises to date. It's only a matter of time before we sign them.

Speaker 6

The response to this to the outreach in regards to the performance and the privacy piece has just been phenomenal. So just super excited. I mean, privacy and compliance alone represent the biggest hurdles for these Fortune 500 accounts in terms of facing in terms of adopting biometrics and we've basically gotten rid of every single one of those. So and then we're starting to see that again we're in late stages of those particular deals. Was hoping that we would get a couple more right before this announcement, but we're very excited that we'll be able to close those this year.

Speaker 5

Awesome. Thank you.

Speaker 7

Thanks Ricky. Ron, we've actually had a couple of questions on the same subject from listeners on the webcast asking about these major contracts. And can you give a little bit more color about how long it takes to sign such a contract and then the sort of the time to bring them live and revenue generating? And also how long we might expect to see the length of those contracts?

Speaker 6

Well, the typical contract terms that we do with anything in cybersecurity and it also represented here in off ID is that usually contracts are two to three years. That's the typical timeframe for how long the contracts will hold and what we signed them up for. And also we don't want to sign them up for too long because it also limits off ID's ability to upsell and cross sell. We do give discounts early on obviously to acquire customers. We don't want to extend the discounts all the way through to the point where our cost of goods go up and go down.

Speaker 6

So we want to have flexibility for what's right for the business and what's right for the customer at that time. So that's typically two to three years. In terms of the large enterprise deals, if you think about like the just the example I just gave you with Disney, where there could be many multiple lines of businesses. And so some of these large enterprises have this thing called a core enterprise service, where they will standardize the security program across all the various entities or each division will have their own core security enterprises and then they have to individually figure out how to work with each other. So when we come into an enterprise, our goal is to capture the entire in the entire enterprise base.

Speaker 6

But obviously, we want to get in there with one use case. And typically what happens when you're in a large enterprise, they say, hey, we got to stop buying one vendor for each thing. So anytime you have a vendor that does something very special or very unique, you must run it by the cybersecurity committee and get approval and also share it because we don't wanna buy 13 different technologies. We don't wanna have 13 different vendor contracts, we don't have 13 different account teams. Do you want to be able to standardize on the best and make sure there's best practices across?

Speaker 6

So for example, we went into this very large payroll provider on the planet, largest payroll provider in the planet. They brought us into a particular use case around download downloading sensitive documents. And then when they shared it internally, another group that's been looking at biometrics had no idea that that was happening. But there was another group that was looking at biometrics and said, hey, well, what is that technology you're looking at? Can we speak to them?

Speaker 6

And then all of a sudden, they introduced this to them and then we're all we're in a different POC. And that keeps going and it keeps going. And and and and then sometimes their evaluations will go for three months, sometimes they'll go for one month. In our case, because biometrics is new, it's gotta go through several committees for approvals. But also at the same time, it's exposing off ID to all the various use cases that they have and it's allowing us to put together, we think, a very large deal.

Speaker 6

So we can go from a regional use case to now a multi state use case to now a full country use case and now even a global use case. And so it takes time and we've built that into the deal cycle, we say anywhere between six to nine months. We're right around that timeframe, six to nine months on some of these deals that were in late stage. We did have a little delay when we were releasing the privacy technology, but those weren't lost deals. We just had a little push in terms of a delay in delivering.

Speaker 6

But that's kind of like the DNA of these large deals. And it's no different than when I worked at Oracle or any other of these large enterprises where we are still trying to take down big cybersecurity initiatives.

Speaker 7

That's great. Thank you very much. Or you can ask a question by pressing the button on the webcast. Ron, we have another question. Can you talk a little bit more about the progress we're making with channel partners and how you see that moving forward in the future?

Speaker 6

Yes. Thanks for your question. Channel partners for us is just super special. There's two types of channel partners that we look at. One is the OEM partner who says, hey, listen, we know biometrics are going to be used.

Speaker 6

We are lacking biometrics in our platform. We're not going to go and buy one. And I'm sorry, we're not going to go buy a company and we're not going to go build one. So the best thing to do is partner with the best in the marketplace, integrated into our platform and offer it to all our customers. We love those deals because it doesn't require my sales team to go after them.

Speaker 6

It's built into their platform. They have their own sales team to go after them and then they can go and sell to their own customers. So for us, we love those opportunities and we have spun up several of those OEM opportunities including the India announcement that we just made. And we're about to sign up a couple more. So very excited about that OEM channel partner opportunity.

Speaker 6

On the other side of the partner channel is those that want to resell our technology and they refer customers and clients. So we've actually had several partners already start to turn in more of their clients into us, referring their clients into us saying, hey, this client wants to use the auth ID technology. They they go ahead and they set us up with their customer. They introduce us. Even this morning, we just had a phenomenal one, where partner introduced us to a client.

Speaker 6

Client, we got warmed intro because the client already had vetted the partner, the partner trust auth ID. So it was a very warm introduction. So the channel partnership business has been going very well and I think it's going to help lead to some of the larger big deals that we've been talking about.

Speaker 7

Okay. Well, thank you, Ron. That seems to be all the questions we have right now. So perhaps you'd like to wrap it up?

Speaker 6

Fantastic. Well, thank you everyone for joining us. We'd like to thank you all for listening today, listening to the call. Look forward to speaking with you all when we report our first quarter results for 2025. And again, thank you for joining us.

Speaker 6

Have a nice day.

Operator

Thank you. And ladies and gentlemen, this does conclude today's teleconference. You may disconnect your lines at this time. Thank you for your participation.

Earnings Conference Call
authID Q4 2024
00:00 / 00:00