SlideShare a Scribd company logo
1 of 9
© Mobico Comodo Private Limited
Global Identity and Access Management System
truMe for Visitor Management
Security
Convenience
Present Challenges
Privacy
• Overwhelming dependence on manpower and legacy systems
• Need vigilant and trained workforce; therefore expensive
• Little flexibility to design access rules
• Half-baked methods to establish identity
• Obtuse differential access regime
• Poor visibility on visitors movement inside the premises
• No tracking; No analytics
• Obtrusive, Inconvenient and Insecure access management
• Queues – Friction – Paperwork
• Time-consuming processes
• Unpleasant Entry Experience – Visitors feel unwelcome and hassled
• Visitors have to share an identity document at time of access
• Visitors have little visibility on or control over what happens to the
identity document shared with the establishment
The truMe Advantage
Security
• Controlled & secure access on the basis of pre-verified identity
• Tamper proof QR code & NFC tags issued to visitors
• Complete real time visibility on a visitor from entry to exit
• Visitor/ temp staff can enter only the building he is authorized to enter
• Access of unwanted elements can be blocked
• Building Manager can get an alerts in r/o specific visitor/ location
Efficiency
• Configurable dynamic access control to cater for diversity
• Building Manager can decide and change access rules in real-time. The
system enforces the same without a time lag.
• Building Manager can generate detailed access reports on the relevant
parameters
• Power of analytics is available to the Building Manager in real time
Privacy
&
Convenience
• No queues – No paperwork – No wait time – No friction
• Invite for meeting from App itself
• Invited visitors enter in seamless manner
• Complete privacy for the invitees/ visitors
• Seamless ingress/ egress for authorized vehicles
Installation
Operation
• Invited visitors with truMe app on their phone enter seamlessly just by
scanning a QR code
• Invited visitors, without truMe app on phone get access basis QR code/
issued at the reception
• Walk-in visitors with truMe app on their phone can register themselves
without bothering the receptionist
• Walk-in visitors with truMe app on their phone can also be issued a pass
by the receptionist quickly
• Visitors can be issued duration based, day/time specific passes – NFC/
QR - for controlled access
• In all cases, host employee gets a notification
• Office complex installs truMe - Web User Interface and/ or tablet /
and truMe Controller
• truMe codes in the access rules as framed by the Building Manager
• Admin and staff is trained in managing the truMe platform
The truMe Platform
Security
Features
Versatility
• Entire manual process automated, resulting in enhanced security for
the building & the people inside and privacy and convenience for the
visitors
• Complete flexibility to devise access rules, including varying levels of
security
• Access rules can be changed by the complex with zero TAT
• Real time visibility on visitor movement & throughput, enabling quick
and informed decision-making process
• Emergency Response System could address various real-time
communication needs
• Real-time availability of the visitors’ data for business analytics
truMe: Robust, Secure, Versatile
• AES 256 bit encryption and data on cloud behind a firewall
• End to end encryption ensures that data between truMe app, AGCs
and server always travels in encrypted form and can be read only by
the truMe application
• truMe identity and doc, if any on user’s phone are also encrypted
and cannot be transferred to any other application/ device
• truMe identity and the supporting doc, if any on truMe platform are
stored on separate servers on the cloud
• The data remains with the organization; Mobico has no access to it
Limited
Personal Data
truMe Identity
• truMe flags a user’s organization- based identity as specific to only that
organization and does not recognize it for access to any other organization
unless the user specifically allows that
• truMe treats a particular identity as global only when the user specifically
opts to create one to access multiple establishments
• If an organization is using truMe to deal with its customers, all such
identities are deleted automatically after the relevant event
• Mobico is open to and encourages third party audit of truMe servers/
platform
truMe: Rock-solid Privacy Protection
• truMe does not track or record user’s access history. User’s access
details are available only to the organization at their location server
• truMe identity consists of user’s name, phone number, photograph and
email ID; Each of these identity attributes are already in public domain
• truMe identity and the supporting doc/s, if any are stored on different
servers on the cloud, fully protected by a firewall
• truMe identity and doc/s, if any on user’s phone are also encrypted and
cannot be transferred to any other application/ device
The People
• Pramod N Uniyal – Background in internal security, 23 years of
experience of creating and leading organizations, IIMA alumnus
• Babu Dayal - Serial entrepreneur, 24 years of experience in technology
space in US, Japan & India
• Lalit Mehta – Serial entrepreneur, 23 years of experience in technology
and finance, IIMA alumnus
The Team
The
Company
Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO
27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent
on truMe platform under section 11 A (3) of the Patents (Amendment) Act
2005. Mobico’s truMe platform is already under deployment with customers
like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
Thank You
© Mobico Comodo Private Limited

More Related Content

What's hot

truMe for Private Platforms
truMe for Private PlatformstruMe for Private Platforms
truMe for Private PlatformsAthulJojo1
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSSManish Mahapatra
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-releaseEric Koeppen
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student passSURFnet
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 

What's hot (18)

truMe for Private Platforms
truMe for Private PlatformstruMe for Private Platforms
truMe for Private Platforms
 
truMe
truMe truMe
truMe
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Security login
Security loginSecurity login
Security login
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Simple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theftSimple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theft
 
System 6000
System 6000System 6000
System 6000
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Physical security
Physical securityPhysical security
Physical security
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
PROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEMPROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEM
 
Layers of control
Layers of controlLayers of control
Layers of control
 

Similar to truMe for visitor access management

truMe visitor management system
truMe visitor management systemtruMe visitor management system
truMe visitor management systemAthulJojo1
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutionsAthulJojo1
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildingsAthulJojo1
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsRivetz
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01Walter Sinchak,
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementNeeraj Taneja
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
10. Kanchan verma (Unit 3) E-security systems.pptx
10. Kanchan verma (Unit 3)  E-security systems.pptx10. Kanchan verma (Unit 3)  E-security systems.pptx
10. Kanchan verma (Unit 3) E-security systems.pptxAdityaSwami23
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 

Similar to truMe for visitor access management (20)

truMe visitor management system
truMe visitor management systemtruMe visitor management system
truMe visitor management system
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutions
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildings
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access Management
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
10. Kanchan verma (Unit 3) E-security systems.pptx
10. Kanchan verma (Unit 3)  E-security systems.pptx10. Kanchan verma (Unit 3)  E-security systems.pptx
10. Kanchan verma (Unit 3) E-security systems.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 

Recently uploaded

Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Onlineanilsa9823
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 

Recently uploaded (20)

Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 

truMe for visitor access management

  • 1. © Mobico Comodo Private Limited Global Identity and Access Management System
  • 2. truMe for Visitor Management
  • 3. Security Convenience Present Challenges Privacy • Overwhelming dependence on manpower and legacy systems • Need vigilant and trained workforce; therefore expensive • Little flexibility to design access rules • Half-baked methods to establish identity • Obtuse differential access regime • Poor visibility on visitors movement inside the premises • No tracking; No analytics • Obtrusive, Inconvenient and Insecure access management • Queues – Friction – Paperwork • Time-consuming processes • Unpleasant Entry Experience – Visitors feel unwelcome and hassled • Visitors have to share an identity document at time of access • Visitors have little visibility on or control over what happens to the identity document shared with the establishment
  • 4. The truMe Advantage Security • Controlled & secure access on the basis of pre-verified identity • Tamper proof QR code & NFC tags issued to visitors • Complete real time visibility on a visitor from entry to exit • Visitor/ temp staff can enter only the building he is authorized to enter • Access of unwanted elements can be blocked • Building Manager can get an alerts in r/o specific visitor/ location Efficiency • Configurable dynamic access control to cater for diversity • Building Manager can decide and change access rules in real-time. The system enforces the same without a time lag. • Building Manager can generate detailed access reports on the relevant parameters • Power of analytics is available to the Building Manager in real time Privacy & Convenience • No queues – No paperwork – No wait time – No friction • Invite for meeting from App itself • Invited visitors enter in seamless manner • Complete privacy for the invitees/ visitors • Seamless ingress/ egress for authorized vehicles
  • 5. Installation Operation • Invited visitors with truMe app on their phone enter seamlessly just by scanning a QR code • Invited visitors, without truMe app on phone get access basis QR code/ issued at the reception • Walk-in visitors with truMe app on their phone can register themselves without bothering the receptionist • Walk-in visitors with truMe app on their phone can also be issued a pass by the receptionist quickly • Visitors can be issued duration based, day/time specific passes – NFC/ QR - for controlled access • In all cases, host employee gets a notification • Office complex installs truMe - Web User Interface and/ or tablet / and truMe Controller • truMe codes in the access rules as framed by the Building Manager • Admin and staff is trained in managing the truMe platform The truMe Platform
  • 6. Security Features Versatility • Entire manual process automated, resulting in enhanced security for the building & the people inside and privacy and convenience for the visitors • Complete flexibility to devise access rules, including varying levels of security • Access rules can be changed by the complex with zero TAT • Real time visibility on visitor movement & throughput, enabling quick and informed decision-making process • Emergency Response System could address various real-time communication needs • Real-time availability of the visitors’ data for business analytics truMe: Robust, Secure, Versatile • AES 256 bit encryption and data on cloud behind a firewall • End to end encryption ensures that data between truMe app, AGCs and server always travels in encrypted form and can be read only by the truMe application • truMe identity and doc, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device • truMe identity and the supporting doc, if any on truMe platform are stored on separate servers on the cloud • The data remains with the organization; Mobico has no access to it
  • 7. Limited Personal Data truMe Identity • truMe flags a user’s organization- based identity as specific to only that organization and does not recognize it for access to any other organization unless the user specifically allows that • truMe treats a particular identity as global only when the user specifically opts to create one to access multiple establishments • If an organization is using truMe to deal with its customers, all such identities are deleted automatically after the relevant event • Mobico is open to and encourages third party audit of truMe servers/ platform truMe: Rock-solid Privacy Protection • truMe does not track or record user’s access history. User’s access details are available only to the organization at their location server • truMe identity consists of user’s name, phone number, photograph and email ID; Each of these identity attributes are already in public domain • truMe identity and the supporting doc/s, if any are stored on different servers on the cloud, fully protected by a firewall • truMe identity and doc/s, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device
  • 8. The People • Pramod N Uniyal – Background in internal security, 23 years of experience of creating and leading organizations, IIMA alumnus • Babu Dayal - Serial entrepreneur, 24 years of experience in technology space in US, Japan & India • Lalit Mehta – Serial entrepreneur, 23 years of experience in technology and finance, IIMA alumnus The Team The Company Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO 27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent on truMe platform under section 11 A (3) of the Patents (Amendment) Act 2005. Mobico’s truMe platform is already under deployment with customers like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
  • 9. Thank You © Mobico Comodo Private Limited