Contact Us

Ready to get independent testing for your IDV system? Have questions about our methodology? We'd love to hear from you.

Email Us

General inquiries and support

hello@arbitra.org

Call Us

Speak with our team directly

+1 (555) 123-4567

Visit Us

Our headquarters

San Francisco, CA

Send us a message

Fill out the form below and we'll get back to you within 24 hours.

Schedule a Call

Book a 30-minute consultation to discuss your IDV testing needs.

Schedule Your Consultation

30-minute call to discuss your IDV testing requirements

Quick Meeting Options

Choose the meeting type that best fits your needs

Quick Consultation

15 minutes

Brief discussion about our services

Standard Meeting

30 minutes

Detailed discussion about your IDV testing needs

Deep Dive Session

60 minutes

Comprehensive review of your requirements

Frequently Asked Questions

Quick answers to common questions about our services

How long does penetration testing take?

Depending on the scope, our pen testing takes 1-3 weeks. Quick Batch tests are completed in 2 weeks, Large Batch in 1 week, and Live Capture in 3 days.

Do you test international IDV providers?

Yes, we test providers globally. However, our penetration testing services are currently limited to US (CA, FL, TX) and Mexico due to regulatory requirements.

How do you ensure test data security?

All test data is encrypted, access-controlled, and deleted after testing. We maintain SOC 2 Type II compliance and undergo regular security audits.

Can vendors influence your benchmark results?

No. We maintain complete independence through our funding model and testing protocols. Vendors cannot pay for better ratings or influence our methodology.

What's included in badge certification?

Badge certification includes performance testing against our golden dataset, detailed scoring report, public badge display rights, and marketing assets for qualified algorithms.

Do you offer custom testing scenarios?

Yes, our Large Batch and Live Capture packages include custom attack scenarios tailored to your specific use case and threat model.