ClickCease

Synchrony Chief Strategy Officer Trish Mosconi Highlights Prove in Women in Retail

Yuka Yoneda
November 20, 2023

Trish Mosconi, Chief Strategy Officer at Synchrony, recently highlighted how the financial service leader’s partnership with Prove helps them stay one step ahead of the competition and consumer expectations. Featured in Women in Retail, the piece underscores the critical role of partnerships in meeting the ever-evolving expectations of today's consumers and sheds light on how collaboration with next-generation identity verification and authentication tech partners, like Prove, helps drive innovation.

“Synchrony leverages Prove’s Pre-Fill and Identity solutions to dramatically simplify its customer application and account opening processes by reducing the number of fields a customer must complete by 80% compared to previous application processes. With Prove’s identity verification and cryptographic authentication capabilities, Synchrony applicants can quickly verify their identities, and can have credit applications approved almost instantaneously, resulting in a uniquely improved customer experience,” writes Mosconi in the article for Women in Retail.

The article also calls out other important themes in the fintech landscape such as a shift in fintech strategy, the importance of easy integration, and what the future of retail could look like as virtual and metaverse shopping become more of a reality.

Thank you Trish for this informative piece and for spotlighting the work we’re doing together. We’re honored to be a part of Synchrony’s journey and to be collaborating with you to drive the fastest, easiest and most secure experiences for consumers. 

Check out the full article to learn more about how Prove's solutions are helping Synchrony and others stay at the forefront of the retail game. 

🔗 Read the full article here

Keep reading

See all blogs
Blog
Injection by Deception: How Fraudsters Are Hijacking Identity Verification Flows with Injection Attacks

Discover how injection attacks allow fraudsters to bypass identity verification by injecting malicious data, highlighting the critical threat of these sophisticated attacks on digital security flows. Learn to identify and defend against these evolving methods that hijack trust and compromise user accounts.

Ryan Alexander
June 11, 2025
Blog
Developer Blogs
Designing a Frictionless Onboarding Experience

Learn how to design a seamless user onboarding experience with best practices and real-world examples.

Matt Keib
June 11, 2025
Developer Blogs
Blog
The Age Gate is Closing: Texas Signals a New Era for Online Age Verification – Here’s Your Roadmap

New legislation is being proposed to use online age verification, requiring websites with adult content to implement "commercially reasonable" methods to verify user ages, signaling a significant shift in digital access and content regulation.

Mary Ann Miller
June 9, 2025
Blog