SlideShare a Scribd company logo
1 of 8
© Mobico Comodo Private Limited
Global Identity and Access Management System
truMe for Visitor Management
Security
Convenience
Present Challenges
Privacy
• Overwhelming dependence on manpower and legacy systems
• Need vigilant and trained workforce; therefore expensive
• Little flexibility to design access rules
• Half-baked methods to establish identity
• Poor visibility on visitors’ movement
• No tracking; No analytics
• Queues – Friction – Paperwork
• Obtrusive, Inconvenient and Insecure access management
• Time-consuming processes
• Unpleasant Entry Experience – Visitors feel unwelcome and hassled
• Visitors have to share an identity document at time of access
• Visitors have little visibility on or control over what happens to the
identity document shared with the establishment
The truMe Advantage
Security
• Controlled & secure access for visitors on the basis of pre-verified identity
• Phone number is OTP verified real-time, photograph, ID on record
• Host employee has option to invite, accept/ decline the visit request
• Tamper proof QR code printed pass for visitors without phone
• Real time visibility on a visitor’s entry & exit
• Access of unwanted elements can be blocked
• In-built Emergency Response System
Efficiency
• Unlimited number of users; unlimited number of transactions
• Building Manager (BM) has complete flexibility to devise access rules
• Power of analytics is available to the BM in real time
• BM can customize/ generate Access Reports on the relevant parameters
Convenience
• Guests feel welcome
• No queues – No paperwork – No wait time – No friction
• Multiple options to register/ invite visitors, avoiding pressure on
reception
• Live Access View from anywhere in the world
• Complete privacy for the visitors
Security
Features
Versatility
• Entire manual process automated, resulting in security for the building
& the people inside and privacy and convenience for the visitors
• Access Rules can be changed by the complex real-time
• Real-time visibility on visitor movement & throughput, enabling quick
and informed decision-making process
• Emergency Response System could address various real-time
communication needs
• Option to upgrade to Access Control for the visitors, vendors and
employees on the same platform
truMe: Robust, Secure, Versatile
• AES 256 bit encryption and data on AWS cloud behind a firewall
• End to end encryption ensures that data between truMe app and
server always travels in encrypted form
• truMe identity and doc, if any on user’s phone are also encrypted
and cannot be transferred to any other application/ device
• truMe identity and the supporting doc, if any on truMe platform are
stored on separate servers on the cloud
• The data remains with the organization; Mobico has no access to it
Limited
Personal Data
truMe Identity
• truMe flags a user’s organization-based identity as specific to only that
organization and does not recognize it for access to any other organization
unless the user specifically allows that
• truMe treats a particular identity as global only when the user specifically
opts to create one to access multiple establishments
• If an organization is using truMe to deal with its customers, all such
identities are deleted automatically after the relevant event
• Mobico is open to and encourages third party audit of truMe servers/
platform
truMe: Rock-solid Privacy Protection
• truMe does not track or record user’s access history. User’s access
details are available only to the organization at their location server
• truMe identity consists of user’s name, phone number, photograph and
email ID; Each of these identity attributes are already in public domain
• truMe identity and the supporting doc/s, if any are stored on different
servers on the cloud, fully protected by a firewall
• truMe identity and doc/s, if any on user’s phone are also encrypted and
cannot be transferred to any other application/ device
The People
• Pramod N Uniyal – Background in internal security, 23 years of
experience of creating and leading organizations, IIMA alumnus
• Babu Dayal - Serial entrepreneur, 24 years of experience in technology
space in US, Japan & India
• Lalit Mehta – Serial entrepreneur, 23 years of experience in technology
and finance, IIMA alumnus
The Team
The
Company
Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO
27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent
on truMe platform under section 11 A (3) of the Patents (Amendment) Act
2005. Mobico’s truMe platform is already under deployment with customers
like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
Thank You
© Mobico Comodo Private Limited

More Related Content

What's hot

truMe for establishments
truMe for establishmentstruMe for establishments
truMe for establishmentsAthulJojo1
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSSManish Mahapatra
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-releaseEric Koeppen
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student passSURFnet
 
role of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryrole of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryVinay Kumar
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 

What's hot (16)

truMe for establishments
truMe for establishmentstruMe for establishments
truMe for establishments
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Security login
Security loginSecurity login
Security login
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
AAA of security
AAA of securityAAA of security
AAA of security
 
role of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryrole of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industry
 
Role of IT in Hospitality
Role of IT in HospitalityRole of IT in Hospitality
Role of IT in Hospitality
 
Layers of control
Layers of controlLayers of control
Layers of control
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
Physical security
Physical securityPhysical security
Physical security
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 

Similar to truMe for visitor management

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access managementAthulJojo1
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutionsAthulJojo1
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildingsAthulJojo1
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosAmazon Web Services
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsRivetz
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 

Similar to truMe for visitor management (20)

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutions
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildings
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Information Security
Information SecurityInformation Security
Information Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 

Recently uploaded

2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Calllward7
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxDilipVasan
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfscitechtalktv
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsCEPTES Software Inc
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理cyebo
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group MeetingAlison Pitt
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxStephen266013
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理pyhepag
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理cyebo
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp onlinebalibahu1313
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfMichaelSenkow
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Jon Hansen
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictJack Cole
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理pyhepag
 
MALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptx
MALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptxMALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptx
MALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptxNidaFaviankaNawawi
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonPayment Village
 

Recently uploaded (20)

2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdf
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
Machine Learning for Accident Severity Prediction
Machine Learning for Accident Severity PredictionMachine Learning for Accident Severity Prediction
Machine Learning for Accident Severity Prediction
 
一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理一比一原版麦考瑞大学毕业证成绩单如何办理
一比一原版麦考瑞大学毕业证成绩单如何办理
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
 
MALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptx
MALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptxMALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptx
MALL CUSTOMER SEGMENTATION USING K-MEANS CLUSTERING.pptx
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prison
 

truMe for visitor management

  • 1. © Mobico Comodo Private Limited Global Identity and Access Management System
  • 2. truMe for Visitor Management
  • 3. Security Convenience Present Challenges Privacy • Overwhelming dependence on manpower and legacy systems • Need vigilant and trained workforce; therefore expensive • Little flexibility to design access rules • Half-baked methods to establish identity • Poor visibility on visitors’ movement • No tracking; No analytics • Queues – Friction – Paperwork • Obtrusive, Inconvenient and Insecure access management • Time-consuming processes • Unpleasant Entry Experience – Visitors feel unwelcome and hassled • Visitors have to share an identity document at time of access • Visitors have little visibility on or control over what happens to the identity document shared with the establishment
  • 4. The truMe Advantage Security • Controlled & secure access for visitors on the basis of pre-verified identity • Phone number is OTP verified real-time, photograph, ID on record • Host employee has option to invite, accept/ decline the visit request • Tamper proof QR code printed pass for visitors without phone • Real time visibility on a visitor’s entry & exit • Access of unwanted elements can be blocked • In-built Emergency Response System Efficiency • Unlimited number of users; unlimited number of transactions • Building Manager (BM) has complete flexibility to devise access rules • Power of analytics is available to the BM in real time • BM can customize/ generate Access Reports on the relevant parameters Convenience • Guests feel welcome • No queues – No paperwork – No wait time – No friction • Multiple options to register/ invite visitors, avoiding pressure on reception • Live Access View from anywhere in the world • Complete privacy for the visitors
  • 5. Security Features Versatility • Entire manual process automated, resulting in security for the building & the people inside and privacy and convenience for the visitors • Access Rules can be changed by the complex real-time • Real-time visibility on visitor movement & throughput, enabling quick and informed decision-making process • Emergency Response System could address various real-time communication needs • Option to upgrade to Access Control for the visitors, vendors and employees on the same platform truMe: Robust, Secure, Versatile • AES 256 bit encryption and data on AWS cloud behind a firewall • End to end encryption ensures that data between truMe app and server always travels in encrypted form • truMe identity and doc, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device • truMe identity and the supporting doc, if any on truMe platform are stored on separate servers on the cloud • The data remains with the organization; Mobico has no access to it
  • 6. Limited Personal Data truMe Identity • truMe flags a user’s organization-based identity as specific to only that organization and does not recognize it for access to any other organization unless the user specifically allows that • truMe treats a particular identity as global only when the user specifically opts to create one to access multiple establishments • If an organization is using truMe to deal with its customers, all such identities are deleted automatically after the relevant event • Mobico is open to and encourages third party audit of truMe servers/ platform truMe: Rock-solid Privacy Protection • truMe does not track or record user’s access history. User’s access details are available only to the organization at their location server • truMe identity consists of user’s name, phone number, photograph and email ID; Each of these identity attributes are already in public domain • truMe identity and the supporting doc/s, if any are stored on different servers on the cloud, fully protected by a firewall • truMe identity and doc/s, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device
  • 7. The People • Pramod N Uniyal – Background in internal security, 23 years of experience of creating and leading organizations, IIMA alumnus • Babu Dayal - Serial entrepreneur, 24 years of experience in technology space in US, Japan & India • Lalit Mehta – Serial entrepreneur, 23 years of experience in technology and finance, IIMA alumnus The Team The Company Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO 27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent on truMe platform under section 11 A (3) of the Patents (Amendment) Act 2005. Mobico’s truMe platform is already under deployment with customers like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
  • 8. Thank You © Mobico Comodo Private Limited