SlideShare a Scribd company logo
1 of 8
© Mobico Comodo Private Limited
Global Identity and Access Management System
truMe for Visitor Management
Security
Convenience
Present Challenges
Privacy
• Overwhelming dependence on manpower and legacy systems
• Need vigilant and trained workforce; therefore expensive
• Little flexibility to design access rules
• Half-baked methods to establish identity
• Poor visibility on visitors’ movement
• No tracking; No analytics
• Queues – Friction – Paperwork
• Obtrusive, Inconvenient and Insecure access management
• Time-consuming processes
• Unpleasant Entry Experience – Visitors feel unwelcome and hassled
• Visitors have to share an identity document at time of access
• Visitors have little visibility on or control over what happens to the
identity document shared with the establishment
The truMe Advantage
Security
• Controlled & secure access for visitors on the basis of pre-verified identity
• Phone number is OTP verified real-time, photograph, ID on record
• Host employee has option to invite, accept/ decline the visit request
• Tamper proof QR code printed pass for visitors without phone
• Real time visibility on a visitor’s entry & exit
• Access of unwanted elements can be blocked
• In-built Emergency Response System
Efficiency
• Unlimited number of users; unlimited number of transactions
• Building Manager (BM) has complete flexibility to devise access rules
• Power of analytics is available to the BM in real time
• BM can customize/ generate Access Reports on the relevant parameters
Convenience
• Guests feel welcome
• No queues – No paperwork – No wait time – No friction
• Multiple options to register/ invite visitors, avoiding pressure on
reception
• Live Access View from anywhere in the world
• Complete privacy for the visitors
Security
Features
Versatility
• Entire manual process automated, resulting in security for the building
& the people inside and privacy and convenience for the visitors
• Access Rules can be changed by the complex real-time
• Real-time visibility on visitor movement & throughput, enabling quick
and informed decision-making process
• Emergency Response System could address various real-time
communication needs
• Option to upgrade to Access Control for the visitors, vendors and
employees on the same platform
truMe: Robust, Secure, Versatile
• AES 256 bit encryption and data on AWS cloud behind a firewall
• End to end encryption ensures that data between truMe app and
server always travels in encrypted form
• truMe identity and doc, if any on user’s phone are also encrypted
and cannot be transferred to any other application/ device
• truMe identity and the supporting doc, if any on truMe platform are
stored on separate servers on the cloud
• The data remains with the organization; Mobico has no access to it
Limited
Personal Data
truMe Identity
• truMe flags a user’s organization-based identity as specific to only that
organization and does not recognize it for access to any other organization
unless the user specifically allows that
• truMe treats a particular identity as global only when the user specifically
opts to create one to access multiple establishments
• If an organization is using truMe to deal with its customers, all such
identities are deleted automatically after the relevant event
• Mobico is open to and encourages third party audit of truMe servers/
platform
truMe: Rock-solid Privacy Protection
• truMe does not track or record user’s access history. User’s access
details are available only to the organization at their location server
• truMe identity consists of user’s name, phone number, photograph and
email ID; Each of these identity attributes are already in public domain
• truMe identity and the supporting doc/s, if any are stored on different
servers on the cloud, fully protected by a firewall
• truMe identity and doc/s, if any on user’s phone are also encrypted and
cannot be transferred to any other application/ device
The People
• Pramod N Uniyal – Background in internal security, 23 years of
experience of creating and leading organizations, IIMA alumnus
• Babu Dayal - Serial entrepreneur, 24 years of experience in technology
space in US, Japan & India
• Lalit Mehta – Serial entrepreneur, 23 years of experience in technology
and finance, IIMA alumnus
The Team
The
Company
Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO
27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent
on truMe platform under section 11 A (3) of the Patents (Amendment) Act
2005. Mobico’s truMe platform is already under deployment with customers
like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
Thank You
© Mobico Comodo Private Limited

More Related Content

What's hot

truMe for establishments
truMe for establishmentstruMe for establishments
truMe for establishmentsAthulJojo1
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSSManish Mahapatra
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-releaseEric Koeppen
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student passSURFnet
 
role of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryrole of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryVinay Kumar
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 

What's hot (16)

truMe for establishments
truMe for establishmentstruMe for establishments
truMe for establishments
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Security login
Security loginSecurity login
Security login
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
AAA of security
AAA of securityAAA of security
AAA of security
 
role of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industryrole of information technology and use of PMS in hospitality industry
role of information technology and use of PMS in hospitality industry
 
Role of IT in Hospitality
Role of IT in HospitalityRole of IT in Hospitality
Role of IT in Hospitality
 
Layers of control
Layers of controlLayers of control
Layers of control
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 
Physical security
Physical securityPhysical security
Physical security
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 

Similar to truMe for visitor management

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access managementAthulJojo1
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutionsAthulJojo1
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildingsAthulJojo1
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosAmazon Web Services
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsRivetz
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 

Similar to truMe for visitor management (20)

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutions
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildings
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Information Security
Information SecurityInformation Security
Information Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 

Recently uploaded

Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 

truMe for visitor management

  • 1. © Mobico Comodo Private Limited Global Identity and Access Management System
  • 2. truMe for Visitor Management
  • 3. Security Convenience Present Challenges Privacy • Overwhelming dependence on manpower and legacy systems • Need vigilant and trained workforce; therefore expensive • Little flexibility to design access rules • Half-baked methods to establish identity • Poor visibility on visitors’ movement • No tracking; No analytics • Queues – Friction – Paperwork • Obtrusive, Inconvenient and Insecure access management • Time-consuming processes • Unpleasant Entry Experience – Visitors feel unwelcome and hassled • Visitors have to share an identity document at time of access • Visitors have little visibility on or control over what happens to the identity document shared with the establishment
  • 4. The truMe Advantage Security • Controlled & secure access for visitors on the basis of pre-verified identity • Phone number is OTP verified real-time, photograph, ID on record • Host employee has option to invite, accept/ decline the visit request • Tamper proof QR code printed pass for visitors without phone • Real time visibility on a visitor’s entry & exit • Access of unwanted elements can be blocked • In-built Emergency Response System Efficiency • Unlimited number of users; unlimited number of transactions • Building Manager (BM) has complete flexibility to devise access rules • Power of analytics is available to the BM in real time • BM can customize/ generate Access Reports on the relevant parameters Convenience • Guests feel welcome • No queues – No paperwork – No wait time – No friction • Multiple options to register/ invite visitors, avoiding pressure on reception • Live Access View from anywhere in the world • Complete privacy for the visitors
  • 5. Security Features Versatility • Entire manual process automated, resulting in security for the building & the people inside and privacy and convenience for the visitors • Access Rules can be changed by the complex real-time • Real-time visibility on visitor movement & throughput, enabling quick and informed decision-making process • Emergency Response System could address various real-time communication needs • Option to upgrade to Access Control for the visitors, vendors and employees on the same platform truMe: Robust, Secure, Versatile • AES 256 bit encryption and data on AWS cloud behind a firewall • End to end encryption ensures that data between truMe app and server always travels in encrypted form • truMe identity and doc, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device • truMe identity and the supporting doc, if any on truMe platform are stored on separate servers on the cloud • The data remains with the organization; Mobico has no access to it
  • 6. Limited Personal Data truMe Identity • truMe flags a user’s organization-based identity as specific to only that organization and does not recognize it for access to any other organization unless the user specifically allows that • truMe treats a particular identity as global only when the user specifically opts to create one to access multiple establishments • If an organization is using truMe to deal with its customers, all such identities are deleted automatically after the relevant event • Mobico is open to and encourages third party audit of truMe servers/ platform truMe: Rock-solid Privacy Protection • truMe does not track or record user’s access history. User’s access details are available only to the organization at their location server • truMe identity consists of user’s name, phone number, photograph and email ID; Each of these identity attributes are already in public domain • truMe identity and the supporting doc/s, if any are stored on different servers on the cloud, fully protected by a firewall • truMe identity and doc/s, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device
  • 7. The People • Pramod N Uniyal – Background in internal security, 23 years of experience of creating and leading organizations, IIMA alumnus • Babu Dayal - Serial entrepreneur, 24 years of experience in technology space in US, Japan & India • Lalit Mehta – Serial entrepreneur, 23 years of experience in technology and finance, IIMA alumnus The Team The Company Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO 27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent on truMe platform under section 11 A (3) of the Patents (Amendment) Act 2005. Mobico’s truMe platform is already under deployment with customers like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
  • 8. Thank You © Mobico Comodo Private Limited