SlideShare a Scribd company logo
1 of 52
Download to read offline
E
n this capricious business world, every individual is quite familiar with the term ’authentication’ and the necessity of
Iimplementing a secure authentication system. Authentication is the act of verification—in which—the identity of an
individual or commune has to be accurate with the datum, when analyzed.
Many industries have recognized that the traditional password method is not enough in order to secure the data as they are
more likely to be breached or can lead to data-leaks. Unlike those traditional methods, the real-time disruptive security
systems allow organizations with Multi especially Two-factor authentication (TFA). The TFA is method that identifies users
by means of a combination of two-distinctive components whereas multi-factor authentication can offer significant benefits to
an enterprise. Insights Success accentuates and feels pride to feature certain authentication solution providers that delivers
promising and reliable security systems to various enterprises.
Instead getting into the depth of the concept, let us acknowledge the three aspects—Why, When and Whom, to acquire better
understanding over the necessary security implementation.
Why to adapt! Technology is continuously evolving and so are the businesses. Due to the presence of huge processing units in
enterprises, it becomes easier for hackers and wormers to decipher codes leading confidential intelligence at the risk of being
compromised by system intruders. Some of these risks include cyber-crime, authentication attacks, data leaks, breaches,
application attacks, and the list goes on. Any of these attacks are detrimental to the growth business. This is where the need of
the authentication solution provider arises.
When to adapt! No organization must wait to get attacked or intrigued by any external sources. As a say, “prevention is better
than cure”, one must ensure the safety of organizations data and should implement integration of such systems prior any
incident.
Securing Businesses,
Securing World
Whom to approach! There are many security solution providers in the market yet one must ensure the facilitation before
indulging with any enterprise. As there is lot of threatening risks organizations face in the cyber world, it becomes essential to
rely on leading and assured service provider.
Through “Authentication Solution Providers 2019” issue, Insights Success takes an initiative in addressing some of the
finest organizations who stand forth in delivering best authentication solutions at one’s door. Here is the cover, i-Sprint
Innovations—the world class authentication solution provider, who deliberately proved itself on every turns in the industry.
Established in the year 2000, i-Sprint Innovations is a leading provider in Identity, Credential and Access Management
(ICAM) Solutions. It delivers trusty, versatile and strong authentication, and identity management platform to secure multiple
application delivery environments based on a common security platform. It is incorporating the latest Mobility/ Biometrics/
Cloud/ Identification technologies in the most effective and efficient manner to build trust and identity assurance. Its core
business is to ensure secure access and protection of data/ transaction/ asset among the four major IT forces (Cloud/ Social/
Mobile/ Information).
Let’s unveil such alike, inspiring interviews and stories of many such significant business flagships in this special edition and
spread a word about their contribution in making this world a better and secure place. Also, flip through the CXO standpoints
presented by some of the leading industry experts to taste the glimpse of industrial revolutions.
Happy Reading….!
Be it a two- or multi-factor authentication solution,
the need of its implementation in corporate
businesses has often become a necessity.
“ “
Bhushan Ghate
i-Sprint Innovations
BuildingTrust and
Identity Assurance
BEGINNING
Wireless Mobile
Technology: Scope for
Tremendous Opportunities
EDITOR’S PERSPECTIVE
How GPS is Enhancing
Fleet Management?
TECH CONCERN
5 Interesting Categories
of 'GPS Trackers'
to Trace Location
CXO Standpoint
Leverage Existing
SAP Solutions with
Cloud Procurement
VIRTUOSO’S VISION
The Shift that broke
the pendulum
MENTOR’S STANDPOINT
Leadership skills essential
for organizational
growth: Trust is key for
sustainable development
of organizations
Articles
18
28
40
24
34
46
08
Futurae Technologies:
Curbing Cyber Risks with Passwordless
Logins and Strong Authentication
That Without Bothering the User
CONTENTS
Hitachi ID Systems:
Deploying Solutions that Manage
Identities, Entitlements and Credentials
Janrain:
Making the World
Identity Digital
Signicat:
An Innovative Digital
Identity Service Provider
Pradotec:
Establishing Trust in an
Interconnected World
20
32
44
26
38
sales@insightssuccess.com
April, 2019
Editor-in-Chief
Co-designerSenior Sales Manager Business Development Manager
Marketing Manager
Technical Head
Technical Specialist Digital Marketing Manager
Research Analyst
Database Management Technology Consultant
Pooja M. Bansal
Managing Editor
Anish Miller
Executive Editor
Hitesh Dhamani
Assistant Editors
Jenny Fernandes
Bhushan Kadam
Visualizer
David King
Art & Design Director
Amol Kamble
Associate Designer
Shubham Mahadik
Passi D. Peter Collins
John Matthew
Sales Executives
David, Kevin, Mark, Avadhut
Business Development Executives
Steve, Joe, Alan, AnupJacob Smile
Aditya Marry D'Souza
SME-SMO Executive
Prashant Chevale Patrick James
Circulation Manager
Robert Brown Stella Andrew David Stokes
Shweta Ambilwade
Co-designer
Copyright © 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success.
Reprint rights remain solely with Insights Success.
Follow us on : www.facebook.com/insightssuccess/ www.twitter.com/insightssuccess
We are also available on :
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone - (614)-602-1754
Email: info@insightssuccess.com
For Subscription: www.insightssuccess.com
Insights Success Media and Technology Pvt. Ltd.
Off. No. 22 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk,
Pimple Saudagar, Pune, Maharashtra 411017
Phone - India: +91 7410079881/ 82/ 83/ 84/ 85
Email: info@insightssuccess.in
For Subscription: www.insightssuccess.in
i-Sprint Innovationsi-Sprint Innovations
BuildingTrust and Identity Assurance
i-Sprint provides a suite of integrated solutions to enable
organizations to implement strong authentication, single sign-on,
access control and identity management solutions.
“ “
Most Trusted
Authentication
1 Solution Providers 2019
The
Dutch Ng
CEO
There are many threatening risks organizations face
in the cyber world. Some of these risks include
cyber-crime, authentication attacks, data leaks,
breaches, application attacks, and the list goes on. Any of
these attacks are detrimental to the growth business. This is
where the need of the authentication solution provider
arises.
i-Sprint Innovations is the world class authentication
solution provider. It delivers trusty, versatile and strong
authentication, and identity management platform to secure
multiple application delivery environments based on a
common security platform.
Ensuring Secure Access and Protection of Data
i-Sprint Innovations (i-Sprint), established in the year 2000,
is a leading provider in Identity, Credential and Access
Management (ICAM) Solutions. It is incorporating the
latest Mobility/ Biometrics/ Cloud/ Identification
technologies in the most effective and efficient manner to
build trust and identity assurance. Its core business is to
ensure secure access and protection of data/ transaction/
asset among the four major IT forces (Cloud/ Social/
Mobile/ Information).
i-Sprint has built two R&D centers with 120 plus
engineers/experts to monitor the technology changes, it is
incorporating the latest trends such as block chain, mobile
security in its solutions, it developed its own IPs based on
the latest standard such as FIDO, cloud security ISO, it
understands the requirements from partners /customers and
provides the best solutions for them. Moreover, its eighteen
years proven experiences with bank graded standard further
enables it to remain the leading company in the industry.
Besides its strong presences in IAM market with over 200
global customers (more than half are finance service
institutions), it has expanded its core technology to provide
the new generation brand protection solution, which has
been highly demanded by manufacturing industry in recent
years.
Driven by Core Values
The name of the company (i-Sprint) itself represents its
core values
i - Identity Credential & Access Management Solution
(IAM)
S - Scalable
P - Partner & Customer Centric
R - Resilient
I - Innovative
N - Niche & Nimble
T – Teamwork
“Innovation” is one of i-Sprint’s core value and with 60%
of its manpower is technical and engineer people, it has
been able to innovate in the last eighteen years. Its other
core values have empowered the team to innovate more
effectively and to focus its development on IAM solution.
Over the years, i-Sprint has developed its own IP -
AccessMatrix suite from “on premise only”, in the
beginning to cloud offering as well as support mobile
workforce accessing the system across different platforms.
i-Sprint has enhanced its products as per the current and
future market needs.
i-Sprint’s knowledge and digital identity have enabled it to
excel its solutions in identity of thing (IDoT) and innovate a
new generation Brand Protection solution. This solution is
for anti-counterfeiting, track and trace and consumer
marketing with strong security backend and data collection.
For the past two years, its solution has been able to win
clients in publication, F&B, health products, automatics,
pharmaceutical and more.
Besides its own development and innovation, it has been
working with partners for advance technology to fuel its
growth.
Instrumental Leadership
As the Chief Executive Officer, Dutch Ng is instrumental
in providing strategic guidance on corporate technology and
security policies, network infrastructure, technology
platforms, business applications, products and services
strategies by establishing and managing financial and
business performance of the organization.
Pulling through Adversities
The initial stage of i-Sprint’s development, the year 2000
was particularly challenging period. It was essential to build
its own IP /technology and also required the fund to sustain
its existence. In order to support research and development
in the creation of its IAM solution suite, i-Sprint started off
doing system integration job for companies. Through these
projects, it learned more about the different multitude of
problems and preferences of companies experienced in the
area of IT deployment, which further emphasized its desire
to create a platform for consolidated IT security services.
The SARS (Severe Acute Respiratory Syndrome) epidemic,
which hit Singapore in 2003, was another challenging
period in the company’s history. Customer visits were
nearly impossible during that period, which led to a
significant toll on i-Sprint’s sales and finances. The team
was faced with the tough decision of whether to soldier on
through the lean times or to call it a day. Eventually, with
its determination, perseverance, and teamwork, it pulled
through the difficult period. Its business took off in 2005
with the successful launch of its AccessMatrix™ suite for
identity, credential and access management (ICAM).
Remarkably Secure Solutions
i-Sprint’s product offerings are in further divided into three
major categories:
1)AccessMatrix™ - Suite of Identity and Access
Management Solutions
2)YESsafe – Mobile Security Solution
3)AccessReal™ - The New Generation Brand Protection
solution
This prime i-Sprint’s products are admired by industry
leader for catering the diverse regulatory requirements.
Digital Identity and Access Protection
i-Sprint’s digital identity governs the verification of users’
identity and access protection. The AccessMatrix™ is the
solution suite that enterprises can implement strong
authentication, single sign-on, access control, identity
management and end-to-end encryption solutions to
safeguard asset, data, and transaction.
i-Sprint’s AccessMatrix™ featured patented technology is a
A Hierarchy Model. This hierarchy model, when
implemented, is capable of allowing security administrators
to centrally manage user and application security-related
attributes (authentication methods, access rights, privileges,
access control rules) and other application attributes.
i-Sprint’s AccessMatrix IAM Suite and YESsafe Suite of
Mobile Security solutions cover the security requirements
for the entire Identity and Access Management Cycle from
Smart User Provisiong/De-provisioning, Adaptive and
Contextual User Authentication, Multi-environment Secure
Single-Sign-On, flexible Access Control via coarse grained
and fine grained authorization policy. Its solutions have
been successfully deployed to address the security
requirements for multiple access channels: Desktop, Web,
Cloud, VDI and Mobile.
AccessMatrix™ Universal Authentication Server (UAS) is
a comprehensive and versatile authentication server that
enables organizations to centralize all its authentication
schemes in a single unified platform. It is a future-proof
authentication infrastructure that supports multiple
authentication mechanisms (such as passwords, OTP,
biometrics) for strong authentication and authorization
requirements. UAS is FIDO UAF (Universal Authentication
Framework) certified.
UAS offers the freedom for organizations to deploy various
authentication methods from different vendors under one
Photo by:Association of Small & Medium Enterprises, Singapore
platform, and manage it as a holistic security approach. This
means organizations will not be restricted or locked to a
specific hardware or software authentication solution. The
use of Pluggable Authentication Module (PAM) approach
also allows organizations to have ease of adding new
methods when available on top of their existing scheme.
AccessMatrix™ Universal Sign On™ (USO) provides a
non-intrusive approach to enable organizations to achieve
single sign-on to multiple web and client/ server
applications without any source code changes. USO
automates the single logon process to access applications,
enhances the authentication process, and enforces a unified
password management policy across multiple applications.
The solution combines sign-on and sign-off automation
with context management and fast user switching on
workstations to improve access to business information,
reduce operational errors and costs.
AccessMatrix™ Universal Access Management (UAM) is a
web service based integration platform with 4As security
components and agent technologies enable organizations to
strengthen application security and enforce fine grained
access control policy to manage users in accessing
confidential information and critical business transactions.
UAM provides Single-Sign-On capability to all web based
applications in the enterprise and all access control
decisions are made by the AccessMatrix Security Server.
AccessMatrix™ Universal Credential Management (UCM)
is a Web Based Privileged Account management solution
with multi-level approval flow empowers organizations to
manage the use of privileged User IDs and Passwords to
access confidential information and prevent information and
data leakage.
Comprehensive Mobile Security Management
YESsafe AppPortal+ is a comprehensive Enterprise Mobile
App Security Management Solution that creates a unified
security platform to help enterprises to deploy, secure and
run their mobile apps and authenticate their users.
YESsafe Token+ is a new generation all-in-one mobile
security token using One Time Password (OTP) and PKI /
Digital Certificate technologies for strong authentication
and transaction authorization. It not only provides
transaction signing to provide non-repudiation and data
integrity protection, it also leverages the advanced features
of mobile devices to offer security protection and ease of
use.
YESsafe Protect+ proactively protects mobile apps against
various risks and attacks, allowing mobile apps to run
securely even on highly infected devices. AppProtect+ also
provide callback APIs to fulfill user demands, such as to
collect and send the risks data to the server. Comparing
with the traditional Antivirus software, AppProtect+ can
protect app without virus database update or internet
connection; Comparing with the hardened app solution,
AppProtect+ can prevent passive attacks (like reverse
engineering, repackaging and source code modification),
and respond by taking necessary measures to if real-time
attacks are detected during app running.
i-Sprint’s YESsafe Android/ iOS Client and Authenticator
Combo has attained the new FIDO UAF Level 1 (L1)
Certification.
World Class Brand Protection
AccessReal™ is a world class brand protection solution for
anti-counterfeiting, track & trace and consumer marketing.
By providing a unique Identification coding tag (barcode,
QR code, clone-proof AR code RFID, NFC, etc.) for each
product, it allows companies to minimize counterfeiting
activity, perform product logistics tracking, link customers
To enable individuals, organizations and societies to build
trust and identity assurance for powering huge productivity
gain through digital identity and identity of things.
“ “
to product and provide business intelligence for better
business planning and direct interaction with customers.
Other than the bank-grade security features and data
analytics capabilities, AccessReal also provides a mobile
platform for consumers, distributors, resellers, and other
stakeholders in the supply chain to leverage mobile devices
to authenticate the products, receive news/ promotions and
establish direct communication.
Global Presence
i-Sprint’s clients include leading global and regional
financial service institutions, government agencies, public
utilities, manufacturing, healthcare, education, multi-
national corporations, and others.
Currently, i-Sprint has a direct presence and active
authorized partners across Singapore, China, Hong Kong,
Taiwan, Malaysia, Thailand, Japan and the United States.
Differentiation from Competitors
· Proven bank-grade technology with over 80 major
financial customers worldwide
· Solid foundation with 100% owned IPs with patented
technology
· Complete Suite of ICAM solution is available on-
premises and cloud offerings to ensure scalability,
flexibility, expendability
· Tailored and built a secured platform to support various
authentication mechanism. Therefore, choices of
authentication methods are maximized
· Recognized as the world leading ICAM Solution Provider
by many world leading IT organizations such as Gartner/
Cybersecurity Ventures/ Info Security Products Guide/
NetworkWorld Asia
Our Digital Identity governs the
verification of users’ identity
and access protection.
“ “
· Presence in Asia is exceptionally strong
Recent Awards/ Recognitions
The only ICAM (Identity, Credential and Access
Management) Vendor in Asia that has been featured in
Gartner Reports since 2006 (Gartner is an American
research and advisory firm providing information
technology-related insight for IT and other business leaders
located across the world)
· Since year 2015, listed in Cybersecurity 500 Directory
· 2018 NetworkAsia Readers’ Choice - Winner in Identity
Management Suite Category
· 2018 Information Management Awards – Winner in
Identity & Authentication Management Category
· 2018 Security Industry’s Global Excellence Award - 9
Awards
· 2017 Enterprise Innovation Awards, Technology
Innovator, Winner in Identity & Authentication
Management Category
· APAC CIO Outlook Top 25 Cyber Security Technology
Companies 2017
Insights into Future
i-Sprint Innovations plans to keep innovating its product
offerings for the needs of its customers. It is going to
continue to develop its technology to capture new
opplemortunity in the market. It is determined to cover
more markets in Asia and also expanding to US and Europe
countries. It is open to partnership in future with
competitors that have products that compent theirs to pitch
solution to customers
Photo by:Association of Small & Medium Enterprises, Singapore
Address :
Country :City : State : Zip :
Global Subscription
Date :Name :
Telephone :
Email :
READ
IT
FIRST
Never Miss an Issue
Yes I would like to subscribe to Insights uccess Magazine., S
SUBSCRIBE
T O D A Y
Che should be drawn in favor of:ck INSIGHTS SUCCESS MEDIA TECH LLC
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone (614)-602-1754,(302)-319-9947:
Email: info@insightssuccess.com
For Subscription: www.insightssuccess.com
CORPORATE OFFICE
C
ompanies that have already invested in SAP find
that they can achieve even better results from their
existing investment with cloud technology and
eProcurement. After the initial investment, companies find
certain roadblocks preventing mass user adoption and
diminishing cost savings. Issues such as inability to stay
connected, lack of insight into data, and complex and
fragmented business rules stop businesses from using the
full power of SAP. As cloud application technologies
advance, companies gain the benefits of rapid deployment
cycles, increased self-service tools, and faster performance.
Vroozi delivers on the promise and power of eProcurement
in the Cloud with seamless integration into SAP.
SAP users looking to the cloud generally face a few
questions, including:
· How can I benefit from using cloud procurement?
· Will my transition to the cloud be cost-effective?
· How will my business processes be affected by cloud
technology?
To understand the benefits of cloud technology to existing
SAP users, let’s evaluate three procurement strategies that
highlight the power of cloud procurement.
Value Realization
Return on Investment (ROI) is a central factor in any
procurement strategy. Buyers and trading partners of cloud
procurement solutions need to feel confident that solutions
will lead to cost savings and higher productivity and
efficiency. Users quickly see returns by focusing on user
adoption, compliance, and spend management. Spend
Management allows companies to visualize purchasing
spending patterns and usage and drives employees to
leverage preferred pricing with contract suppliers. To
increase user adoption and compliance, the cloud empowers
a mobile workforce with the right resources and experience
so everyone stays connected and available so that business
is not disrupted. As user adoption and compliance
frameworks increase with cloud-based systems,
organizations gain immediate cost savings in procurement
by decreasing transaction costs and preventing spend
leakage with your supply chain.
Efficiencies
Process efficiency is key for a successful, healthy business.
Cloud technology enables better processes by keeping
everyone connected through a mobile experience and
automating transaction tasks through the use of machine
learning and pattern matching. With a centralized, unified
system, cloud automation can yield immediate benefits in
requisition to invoice and payment business processes and
reduced errors and issues leading to higher productivity and
decreased processing costs. Further, by allowing employees
Leverage Existing
SAP Solutions
with Cloud Procurement
|April 2019|18
Brad Hill, Director of Global Sales & Marketing
of Vroozi is a passionate leader and is
responsible for expanding the Vroozi Product
Suite, Brand Adoption, Partnership Network &
ensuring our customers receive an unparalleled
experience with Vroozi. Brad spent the last 20
years building Enterprise Sales and Product
strategies with leading IT Services
organizations. His entrepreneurial strategies
have served a vast number of Fortune 500
industries and verticals. He is also an aspiring
mechanic and frustrated golfer, two good
reminders to keep his day job.
to interact with cloud procurement via smart
Phones and tablets, business can continue to
move with efficiency and speed.
IT Cost Savings
Perhaps no determinant is more important in
realizing the benefits of cloud technologies
versus traditional on premise software is in IT
Cost Savings. Systems and applications which
required large physical infrastructure and
monetary investments can now provide
inexpensive and scalable solutions through the
Cloud and cloud infrastructure providers. A
procurement solution that integrates with SAP is
easier to access, less expensive, and takes a
fraction of the implementation time companies
once faced with traditional software solutions.
Cloud technology relieves the user of hidden
costs such as hardware, consultants,
infrastructure, maintenance, and costly upgrade
cycles, providing lower risk and lower total cost
of ownership.
Conclusion
The cloud offers little upfront expense, automatic
upgrades, and pre-integrated best practices which
allow organizations to focus on business growth
and improved operating margins. Vroozi’s
eProcurement solution that takes SAP solutions
to the cloud empower users with better returns,
better processes and higher savings, so their
overall SAP investment’s ROI is accelerated.
According to IDC, spending on Cloud
computing is growing at 4.5 times the rate of IT
spending since 2009 and is expected to continue
growing at more than 6 times the rate of IT
spending from 2015 through 2020. (via Forbes)
This massive growth is easily understood when
businesses understand the power and value of
cloud solutions. With the Vroozi Platform,
companies can take advantage of robust
eProcurement technology delivered in the Cloud
and integrated seamlessly with SAP.
CXO STANDPOINT
Brad Hill
Director of Global Sales & Marketing
Vroozi
|April 2019| 19
Futurae Technologies:
Curbing Cyber Risks with Passwordless Logins
and Strong Authentication That Without Bothering the User
With advancements in technology propelling
forward at breakneck speed, major security
concerns are also on the rise. These security
concerns are related to multiple technologies but data
breaches always lands the top spot on that list. Smart
gadgets are now considered to be the primary source of
data collection and distribution. While these smart
gadgets are significantly improving daily life in many
different aspects, at the same time they also attribute to
the higher frequency and scale of potential security
breaches.
Founded in 2016 in Zurich, Futurae Technologies offers
a strong suite of multi-factor authentication tools that
provide bank grade security for big and small budgets.
The company’s core belief is that even the strongest level
of security does not need to compromise on customer
experience nor user privacy. The range of authentication
methods in the suite provides companies with complete
flexibility and swift deployment. In addition, Futurae’s
human-centric technologies also enable easy integration
into a company’s existing infrastructure and reduces
overall authentication overhead costs.
Future-proof technologies
Futurae offers award-winning security solutions that
reduce risks of data thefts. The organization’s core
component is “Zero-Touch”, a two-factor authentication
solution that works without any user interaction, entirely
invisible for the user. The technology uses a machine
learning algorithm to securely authenticate the user in a
completely frictionless manner. It uses context
information like sensor signals and ambient noise around
the user, while at the same time also secures the privacy
of the user throughout the entire authentication process.
This solution is unique and offers the most secure access
without causing any additional friction in the customer
journey. Zero-Touch also enables a seamless strong
authentication for use-cases like smart assistants (e.g.,
Alexa or Google Home) or on any device where there is
(only) a microphone and speakers. In addition, Futurae is
a pioneer in passwordless authentication methods
enabling authenticated access, at the same time lowering
helpdesk costs by eliminating password/reset struggles
that many companies have.
Futurae Authentication Suite also offers other
authentication solutions in addition to Zero-Touch, such
“The new standard
in user-centric
authentication - Security
has never been easier.”
Most Trusted
Authentication
1 Solution Providers 2019
The
|April 2019|20
as ‘One-Touch’ via a push notification for
transaction confirmation, single device
authentication, and various offline solutions as well
as solutions that do not rely on smartphone devices.
It has recognized the industry needs and knows that
“one size does not fit all”. All the solutions can be
parameterized to user groups to meet individual needs
of organizations. The Futurae Authentication Suite is
offered as an SDK to be plugged into any existing
mobile apps or as a secure and customizable
authenticator app. Finally, the ease of integration enables
all customers to easily implement strong authentication
for their users.
Futurae offers a flexible pricing model catering to small
startups and large enterprises, that allows all customers
to enable strong user authentication. Its standard
deployment is cloud-based that provides a scalable,
secure and redundant infrastructure. For enterprise cases,
managed on-premise deployment as well as other
customization is available, according to their specific
needs.
New approaches needed in IT security
Digitalization offers companies the ability to create
products with more and more touch points with end-
users, and providing them with personalized services.
The more digital the world gets, the more important and
precious data becomes, thereby increasing the
importance of protecting users from cyber-attacks. The
industry is still struggling with bridging usability with
the highest security requirements and not interrupting the
customer journey. Until now, increased security has
always been correlated with less usability which
weakens the security structure. Futurae is changing that
with its exceptional service and technologies, which is
attracting a lot of global interest. Futurae has customers
in a wide range of industries although the focus is
premiliarly on the financial service and insurance
industry. The company already has strong brands among
its customer base which helps accelerate its rapid
growth. Futurae was named Cool Vendor in Identity and
Access Management in 2018 by Gartner and
strengthening its presence globally.
Security for constantly changing threats
Although the user experience that the Futurae
Authentication Suite provides is so seamless and at times
invisible, there is a team of best-in-class IT security
experts is behind the scene ensuring customers are
secure in the ever evolving cyber threat landscape. Due
to the proximity to ETH Zurich, one of the best computer
science universities in the world, the security experts are
well connected and at the pulse of new developments. As
an ETH Zurich spin-off, they also benefit from the
university’s strong international industry network.
Testimonials from Clients
“Futurae consists of a highly talented and committed
team that delivers its promises with their innovative AI
enhanced authentication portfolio.” Andreas Iten, CIO
Financial Information and Corporate Function, SIX
GROUP
Sandra Tobler
Co-founder & CEO
Futurae Technologies
|April 2019| 21
Wireless Mobile
Technology
Scope for Tremendous Opportunities
Wireless mobile telephony was mainly invented and implemented only for voice
communication to be used anywhere, anytime, and on the go. With time wireless telephony
has been heavily researched and developed. Each year, each month, and even each day new
innovations and trends are being added in mobile communication technology. That has produced till dates,
the most sophisticated wireless mobile telephony that we are using in the form of a smartphone.
History
Some decades ago, mobile phones were costly, large in shape and heavy in weight used for voice calling
only with limited access within metro cities. Gen X people know these big-1G-analog-mobile phones very
well. These big phones remained the status symbol of rich people only. In 1990’s 2G-digital-mobile
service was introduced that consisted voice as well as data capabilities, this was the major innovative
generation of mobile phones. With this, doors opened for mobile telephony for all with ease and compact
mobiles. These mobile phones were a bit costly and not heavy performers like PCs because of their weak
hardware.
Satellite Mobile Phone
In addition to the cellular network phone, mobile phones can also be connected directly from Earth-
orbiting satellites. These satellite phones can be used in remote areas where wired network is unavailable
or where setting up of a cellular network is difficult. The Inmarsat system is the world’s oldest satellite
phone network. Some other operators like Iridium, Globalstar, and Thuraya also provide satellite phone
services. Use of a satellite phone is very low due to the need of a special expensive device that supports
satellite frequency and high usage cost. In some countries, the use of satellite phones is illegal. Most of
the satellite phones are used in defense and disaster response.
Wireless Broadband
With the rise of 21st century, 3G service was first introduced by NTT DoCoMo in Japan. This technology
becomes a game changer in the field of mobile broadband. Use of high-end-cutting-edge technology for
manufacturing made mobile cheaper in addition to good hardware that can perform an internet browsing
and downloading very well. 3G mobile phones reached the popularity with the Internet Access and Video
Calling. Use of mobile phones instead of PCs made compulsory for OEM’s to build similar strong
hardware and OS as PCs. New hardware and OS were introduced and replaced with new one.
|April 2019|24
Operating Systems for Mobiles
For a decade, Symbian of Nokia was very popular as a mobile OS. It faced stiff competition afterward with
the introduction of Android and iOS. After Symbian OS; Android, iOS (Apple), and Windows operating
system became popular that converted a mobile phone into a smartphone. Symbian, Android, iOS, and
Windows are the milestones in mobile technologies that provide nearly similar computing capabilities of PC’s
to mobile with the similar hardware configuration. All these OS supports different applications for a different
purpose depending upon the user requirements.
Need for Mobile Applications
Digitization in banking, governing, and in near about all the fields increases use of smartphones instead of
PCs and laptops because of their low cost and compactness. Now people are not only using mobile phones for
communication, but also for gaming, online transactions, social media, job hunting, online shopping,
downloading-watching videos, and more. All these needs cannot be full-filled by Mobile OS and Mobile
Browser only, which demands most sophisticated separate application for different use. Mobile Applications
are becoming more popular as they are time saving and simple in operation. This has given birth to the
Mobile Applications Industry.
Effect of New Technologies
Newly developed 4G technology broadens the use of wireless mobile technology. IoT (Internet of Things)
mainly use the wireless network for their operation. Using the IoT machines can be connected to each other
and can be remotely controlled and operated with the help of wireless internet and software. IoT needs high
internet speed and strong software to control machines like drones, autonomous vehicles, etc. 4G technology
provides 50-1000 Mbps speed which is highly suitable for IoT devices. IoT also needs a special application
depending on need, which may run on iOS or Android or any operating system.
Base for Mobile Applications
Mobile applications are mainly based on the OS and hardware on which mobile phone or device works.
Today there are mainly three popular OS; Android, iOS, and Windows. Based on this, developer develops the
applications for specific use. These applications are available in App Store of that OS. Like Android places
their apps in Play Store, iOS of Apple in App Store, and Windows in Microsoft Store. All these apps are third
party apps developed and maintained by other developers and solution providers. Some of the apps are free
and some are priced small amount with some validity. Another fact is, free apps are also available in
chargeable premium version, maybe with ad-free versions having high-end features.
Scope for Business
Mobile apps business is growing faster after the 3G technology. 3G and 4G technology provide faster internet
access that brings users to the mobile internet platform. Mobile is now used as a replacement for bulky PCs.
All-day-today activities are carried on mobile that demands different applications for different use with
periodic update depending on changing trends, security, and needs. All biggies are making large investments
in the app solution business due to huge demand for different apps. Dependency on apps is growing due to
use of the new technologies like IoT, M2M, Virtual Reality (VR), and more. Again gaming apps are also
gaining more popularity as hardware of mobiles are becoming more advance that can support high-end
gaming.
Numbers of apps are entering into the mobile market, creating lots of space for mobile app developers and
solution providers. New mobile technology innovated, implemented and grew continuously, that again creates
the new requirement of different apps, keeping app industry growing.
BEGINNING
|April 2019| 25
Hitachi ID Systems:
Deploying Solutions that Manage Identities,
Entitlements and Credentials
In an interview with Insights Success, Idan Shoham, the
Chief Technology Officer and Founder of Hitachi ID
Systems, Inc. shares his valuable insights on the
company’s core competencies and its comprehensive
solutions for managing identities, security entitlements and
credentials.
Belowarethehighlightsof interview:
Give a brief overview of the Hitachi ID Systems, its
uniqueness, and itsvision.
Hitachi ID Systems, Inc. delivers identity and access
management (IAM) solutions to organizations globally,
including many of the Fortune 500 companies.The Hitachi ID
Identity and Access Management Suite is a fully integrated
solution for managing identities, security entitlements and
credentials, for both business users and shared/privileged
accounts,on-premisesandinthecloud.
The Hitachi ID Suite is well known in the marketplace for
high scalability, fault tolerance, a pragmatic design and low
total cost of ownership (TCO). Hitachi ID Systems is
recognized by customers and analysts for industry-leading
customerservice.
No other IAM suite includes identity management, access
governance, group lifecycle management, credential
management, privileged access management (PAM), strong
authentication and federated access. Hitachi ID Suite includes
all of these, behind a single user interface, running in a single
instance, with a single back-end database and using shared
connectorsandreports.
No competing IAM or PAM product includes a peer-to-peer
replication model for active-active, load balanced
deployment, no competitor offers smart phone access without
a public URL and no competitor includes as many built-in
connectors.
Hitachi ID Systems’ vision is to be the identity and access
management, credential management and privileged access
management vendor of choice for medium and large
organizations, selected on the basis of innovation, flexibility,
customerserviceandtotalcost.
What are the cutting-edge services/solutions offered by
HitachiID Systems?
The Hitachi ID Suite is available as any combination of three
licensedproducts:
a) Hitachi ID Identity Manager: Manage identities, accounts,
groups and roles: Automation, requests, approvals, reviews,
SoD andRBAC.
b) Hitachi ID Password Manager: Integrated credential
management: Passwords, security questions, certificates,
tokens,smartcardsandbiometrics.
“Hitachi ID Systems offers
comprehensive identity
management and access
governance, privileged access
management and password
management solutions.”
Most Trusted
Authentication
1 Solution Providers 2019
The
|April 2019|26
c)Hitachi ID Privileged Access Manager: Securing
access to administrator, embedded and service
accounts.
These are all built on a single platform – one source
code, one installer, one UI, one workflow framework, a
shared set of connectors, reports and analytics, etc.
Moreover, the Hitachi ID Suite includes features that
might be surprising in the above categories, including
group lifecycle management, federated application single
sign-on andbuilt-inmulti-factorauthentication.
All of this is available as a service – i.e., cloud-hosted and
vendor operated SaaS, as traditional on-premises software
with a perpetual license and annual maintenance, or with a
hybrid model, such as licensed and deployed to IaaS or on-
premisesbutmanagedby HitachiID Systems.
Describe the experiences, achievements or lessons learned
that haveshaped the journey ofthe company.
Hitachi ID Systems is focused on delivering pragmatic
solutions to real-world problems, rather than "me too"
features.Thishasledtosomeunusualcapabilities.
For example, in the context of identity and access
management (IAM), it is impossible to predict all the
entitlements that some users will require. The more “high
value” the user (e.g., back office people who perform
functions that are material to the business), the less likely their
needs are to fit neatly into a role based access control (RBAC)
model.This leads to the need for users to request entitlements,
which in turn exposes a serious usability problem: users know
they need access but they don’t know what the system,
account, role or group they need access to is called and they
struggle to select the right entitlementfrom a menu of millions
of items!This is a central challenge in IAM systems: requester
usability. To tackle this problem, Hitachi ID Systems has
developed multiple requester usability aids, including a
recommendation system, a mechanism for requesters to
compare the entitlements of recipients to reference users and
the ability to intercept denied access attempts and guide users
totheappropriaterequestpage.
Another interesting example arises in password reset systems.
Employees and contractors often carry around corporate
laptops with locally cached Active Directory (AD)
credentials. If a user forgets theirAD password while off-site,
they can call the help desk for assistance but the help desk
cannot connect to the off-site/off-line laptop and
consequently cannot enable the user to regain access to their
computer. To address this major disruption, Hitachi ID
Systems has developed a self-service password reset client
software component which integrates with WiFi and the
corporate VPN. With it, users can reset forgotten passwords
even while off-site, and the password reset updatesthe locally
cached password. Users can then get back to work, rather than
carrying around a useless laptop until they next visit a
corporateoffice.
What according to you could be the potential future of
Authentication Solution Industry and how does Hitachi
ID Systems envisionsustaining itscompetency?
Strong authentication has become “table stakes” – there are
lots of options, many of which work well. Federation, be it via
the secure assertions markup language (SAML) or OpenID
Connect (OIDC) allows applications to offload this problem
tosharedinfrastructure.
The future is one where every organization has multiple MFA
solutions, where most applications forego internal
authentication and instead support SAML and/or OIDC and
where MFA solutions become very inexpensive, ultimately
dropping to $0 by being bundled with other, larger products,
as isthecasewithHitachiID MobileAccess.
About the Leader
In his role as Chief Technology Officer, Idan Shoham is
responsible for defining product and technology strategy and
the overall development of Hitachi ID Systems solutions. He
works closely with his talented team to ensure that the
solutions that Hitachi ID delivers to the market are of the
highestquality.
Idan Shoham
Founder & CTO
Hitachi ID Systems, Inc.
|April 2019| 27
C
orporations are shifting their
marketing services in-house
and re-defining relationships
with their suppliers. This is a strategic
shift brought about by a confluence of
technical, social and political change on
a global scale. At the core of this
movement is the corporation’s need to
control global brand messaging quickly
in an increasingly regulated world. Is
this a temporary shift or is there more
to it, and how far might it go?
TShiftthat
broke
the pendulum
he
About the Author
Murray Oles is the President of
CHALEX Corp. The company is specialized
in Workow Management for Marketing
Communications Projects through the use of
SmartFlo and integrated third party tools.
Murray Oles
President
|April 2019|28
The rise of mobile computing combined with an explosion
in SaaS software development has led to more intuitive
purpose-built applications with built in learning tools. The
net effect is that corporations can do much more with less.
Hence, the rapidly accelerating move to take internal
control of the corporate global supply chain. More
specifically, control of process, digital assets, resources, and
the brand message. Evidence of the shift can be seen in
global corporations like P&G who in recent years
consolidated their packaging prepress supply chain from
hundreds of companies to only three. The ANA
(Association of National Advertisers) committee for
in-house agencies includes members from hundreds of the
Fortune 1000. A Google search reveals many recent articles
detailing the rise of in-house ad agencies.
The drivers of this shift are affordable and effective new
technology and the need for speed to market. The value of a
middleman controlling portions of the marcom workflow
has diminished. This does not mean that everything is being
produced in-house, just internally controlled and managed
by in-house staff who are defining new best practices for
their agile enterprise. Many companies go back and forth
between insourcing and outsourcing, but this time it is
different. Companies are focused on process, and it is not
just marketing, legal and business analytics, recruiting,
employee services and even providing in-house healthcare.
With change comes opportunity. Demand for business
process management tools is growing rapidly. Many new
companies are developing SaaS products to further enable
the agile business. Online workflow modeling and business
process management tools are becoming main stream. File
sharing and digital asset management services are widely
accepted. Integrating these services to meet the
requirements of a project has never been easier now that
RESTful APIs have become widely available. Artificial
intelligence applied to big data analytics will provide the
agile business with insights previously inconceivable. Best
of all, the enterprise can securely access most SaaS services
without making any upfront investments or long term
commitments.
At the core of the agile business is an integrated business
process management platform. This is the tool that enables
distributed process control. In-house is only practical when
the technology enables the staff to do an order of magnitude
more with less. BPM systems capture huge amounts of data
that can be analyzed as a service in real-time. The ability to
analyze any combination of process and behavioral data
yields valuable predictive insights. Standards such as
BPMN notation and the XPDL file format have allowed
developers to simplify the user experience for defining,
managing, and sharing process maps across BPM
platforms. A virtual task can automatically serve up the
tools the user will need. SaaS tools have one thing in
common. They can be called through a RESTful API
without the need for a software developer. The workflow
can be configured to invoke access to tools based on the
nature of the task. For healthcare workflows a digital
radiology file format (DICOM Web) enables secure
cross-platform viewing and collaboration over a patient’s
scanned images and medical history.
Business agile companies adjust to market conditions faster
by adopting a culture of managed change. It is no longer
acceptable to be so disconnected from your projects that
you can’t even access your own brand packaging and
promotion files. The same is true for legal, regulatory and
compliance work. The agile company controls all of these
processes. Their DAM enabled BPM system interacts with
a SaaS reporting service like EZBI that concatenates and
reports on data across distributed systems. Lean
manufacturing and Six Sigma programs are used to
configure these systems to monitor compliance to regulated
processes.
These changes are far more profound than may appear on
the surface. The gig economy is fueling a virtual cottage
industry that circles the globe. Project managers are
increasingly in demand. This is not just an IT thing, every
business runs on projects. The certified project management
professional PMP is a new college certification. Rachel
Burger in a Capterra article explained The 5 Biggest Project
Management Trends Shaping 2018. In brief, “business
agile” is the new way of doing business. A visit to the
Fiverr.com web site will show how one SaaS service is
bringing buyers and sellers of creative services together.
This in-house trend is not just another swing of the
pendulum.
VIRTUOSO’S VISION
|April 2019| 29
Janrain:
Making the World Identity Digital
Solution providing companies are in the stage of
improvising the data security of the internet users.
Innumerable IT companies in the world have started
providing the best solutions to their respective clients. A
good Authentication Solution Provider company has to
consistently improve the work productivity, IT
infrastructure and a deep understanding of their clients
expectation. Such solution providers carry a right approach
and solve the client’s problem through its expertise.
Janrain is one of the most trusted Authentication Solution
Providers, which manages the most valuable assets of the
internet users.
Foremost Identity Entrants
Janrain pioneered Customer Identity and Access
Management (CIAM) and is recognized by industry
analysts as a global CIAM leader. Its vision is to make a
digital world where consumers will move seamlessly and
securely between apps, web and mobile properties. Janrain
Identity Cloud® provides identity solutions that enable
seamless and safe consumer experiences across its digitally
connected world; empowering identity-first brands with
digital transformation and new insights, all while ensuring
privacy and security. Also it has a cloud-native, SaaS
solution that balances security, privacy and compliance
while providing a frictionless experience which the
consumers demand.
The Janrain Identity Cloud is a comprehensively integrated
suite, including registration, login/authentication, single
sign-on (SSO) and access management - as well as
regulation-compliant, consumer-controlled preference and
consent management. Its SaaS hosted registration and
authentication services allows to rapidly deploy new apps
and web experiences while adhering to best practices for
user verification and account security. The Janrain Identity
Cloud is peerless in its ability to meet the customer identity
demands of global brands. Its industry-leading
infrastructure offers best-in-class availability across all
regions.
The Guiding Light
Jim Kaskade is the CEO of Janrain and leads the
company’s strategy, worldwide operations and vision. He is
a seasoned entrepreneur with more than 31 years of
experience in complex enterprise technology. Jim has
created a client-centric culture at Janrain along with some
core values which includes determination, change, attitude,
teamwork, curiosity, expertise, transparency, accountability,
respect and communication. Jim is a hands-on leader who
stays ahead of market expectations for authentication,
authorization and user experience and drives the team to
exceed those expectations. The company’s founder is
integral in the development of Social Login protocols which
“If you need infinite
scale at millisecond
performance that is
available 99.999%
of the time, then
you only have
one partner to
choose, Janrain”
Most Trusted
Authentication
1 Solution Providers 2019
The
|April 2019|32
consist of the ability for consumers to use their social
media credentials to create accounts on websites and
mobile apps.
Social Login Authentication
Janrain developed the concept of Social Login, which
allows consumers to register and authenticate through
more than 35 social networks such as Facebook, Twitter,
Google, and LinkedIn. Today, users are also able to
register through any OpenID provider. In addition to the
long list of social logins and OIDC interoperability, the
company supports username/password and SMS OTP
authentication, and federation over SAML and OAuth.
Today, Janrain serves many of the world’s recognized
brands giving their customers unrivaled registration and
authentication experiences and giving its clients the
support, performance and availability they demand.
Authentication Challenges
According to Janrain’s long years of experience, the
challenges that brands face is balancing the desire to have a
simple on-boarding or registration experience for their
customers against maintaining security and data integrity. In
a nutshell, that’s the only solution it provides. Beyond the
authentication part the company faces the question of how
will these identities be managed? Janrain completely
focuses on the entirety of the identity on how customers
come on-board, how securely their data is kept, how easily
they can manage their consents and how their experience
can help its clients.
The company’s cloud-based platform is designed to scale
intelligently with spikes in usage, ensuring the best possible
availability. The security measures it takes and
accreditations it has received mark its lead in the industry.
Janrain provides customers consent management options
allowing the clients to exceed both regulatory and
individual expectations. Also it provides identity resolution
and customer activity insights that can propel the online or
in-app experience.
Analyzing the authentication issues Jim states,
“Authentication has its challenges. But meeting those
challenges is not merely a matter of front-end configuration
or revising registration forms. It requires a platform that is
built with the customer experience as its focus, with the
scalability that high-volume brands require”.
Scaling the Heights
Janrain always continues creating secure and reliable user
authentication solutions and it is willing to continue the
same. The company has led the market in evolving from
Social Login authentication to multi-factor authentication,
biometric authentication and other forms of password less
authentication. Eventually, Strong Authentication (in
accordance with FIDO standards) will become the norm.
Janrain had already supported these more secure
authentication methods and willingly continues to help its
clients. Jim shares his views on social login authentication
as, “Social Login and traditional e-mail account
authentication will continue to be the standard in the short
term, but the next step is broader adoption of biometrics
and multi-factor authentication”.
Much of the authentication conversation is focused on the
front end user experience. The additional challenges for
high volume consumer brands are managing the data
securely and maintaining an authentication process with
flawless availability. The Janrain Identity Cloud is truly
cloud native and it is designed to excel when there are
spikes in traffic and even when there are regional outages. It
also supplies additional layers of assurance to its clients.
The company’s built-in fraud detection helps safeguard
against fraudulent account creation and undesirable
behaviors, while the Janrain Secure Edge offers best-in-
class coverage against external attacks. From the front end
to the back end, Janrain has mastered authentication.
Testimonial
“Our number of registered users has jumped 33 percent
since we turned to Janrain. A smoother social login
experience is a huge contributor to these improved
results.”- Slate
Jim Kaskade
CEO
Janrain
|April 2019| 33
H
O
WGPSIS ENHANCING
FLEETMANAGEMENT?
|April 2019|34
Fleet management is an administrative
task which allows organizations to
co-ordinate with vehicles and drivers
in order to maintain a smooth functioning of
the fleet operations that too in compliance
with the government regulations. Recent
advancements in GPS technology have
empowered fleet managers to improve
efficiency, reduce costs and enhance driver’s
safety in a hassle free manner. Here we have
enlisted few of the advantages in detail
which GPS technology has brought for the
betterment of fleet management’s operations.
Improve the Efficiency of Drivers
GPS devices have the ability to enhance the
efficiency of drivers and help save more
money which any company requires to
manage its fleet operations. This device can
assist the fleet managers to know more about
the driving pattern of the driver like: At what
time a driver can drop the delivery? At what
speed a driver can complete all deliveries?
By knowing answers to such vital questions
can empower the business owners to
schedule each driver’s future weeks more
effectively by focusing on individual driver’s
driving pattern. The data which a GPS device
transmit to the central device can further be
utilized to gain some more meaningful
insights utilizing data analytics services like
EDITOR’S PERSPECTIVE
|April 2019| 35
deciding the better route, tracking traffic hit areas, deciding what materials to be sent and how among others. Adoption of
such technology can empower both the drivers and the business to attain efficiency with elevated performance that too in
lesser time.
Keep Vigil like a Spy
Data collected by the GPS device can provide many performance related concerns to the upper management like: At what
time the driver has started his journey? Which different places the driver has visited during his entire journey? Where did he
stop and for how much time? Answers to such vital questions can help the upper management to keep track of their driver’s
work behaviour and assist in maintaining better efficiency in future. Moreover, to manage the health of a vehicle it is
important that a driver move vehicle as par standard road safety guidelines or protocols, which is beneficial for maintaining
the safety of drivers and longevity of vehicle’s parts. Using the benefits of GPS device and specialized software, fleet
managers can get to know about various important things like: sudden accelerator pattern, driving pattern at the turn, speed
breakers, and close residential areas, whether the vehicle gets use for non-work related activities, etc. and thus keep a strong
vigil on their fleet operations like a spy.
Moreover, by analysing driver’s speed, companies can keep track of the amount of gas required and number of times the
vehicle has gone for a repair. Such things ultimately assist in reducing the maintenance cost, make vehicle’s resale value last
long, and also reduce the speeding fines to a great level.
Help Improving Drivers’ Safety
In the past, when GPS was not in place, drivers used to work very much on their own space and schedules. Although, having
freedom to do their work is not a bad thing but unnecessary wasting of time creates inefficiency which ultimately costs the
company. Moreover, drivers’ safety is yet another concern which repeatedly creates tension on manager’s mind, since the
drivers are more distracted than ever. In one recent study published by the Virginia Tech Transportation Institute discovered
that truck drivers are 23 times more prone to fall into an accident than someone who is not at all distracted. GPS tracking can
address such issues.
Telematics, in-fact lets you know whether your driver has worn the seat belt or not and is there any unauthorized passenger in
the vehicle. In such a way, it can help in enhancing the safety of your vital human resource which is needed to carry out your
fleet operations.
Enable Integration for Better Customer Experience
Management, employees and the customers are the most integral part of any business. In-fact the end customers are the most
vital aspect as it is from where all the money flows into the company’s coffers. Therefore, it is necessary to provide much
better and more transparent services to the end user to create a much better customer experience where customers don’t need
to call customer’ care to know about their delivery.
It is thus important to provide real-time updates to your customers as well. Thanks to the recent innovations happening in the
GPS integration technology, now fleet managers can integrate GPS devices using APIs to delight their customers and create a
much better end-user experience. Such integration can show your customers where your service vans are with the help of
map and reduce significant burden on your helpdesk executives. Another integration which revolves around social media is
starting to take shape in fleet management. It lets followers know where their logistics currently is with the help of messages
and provides a real-time update in a hassle free manner to the clients. Currently, fleet managers use accounting systems, CRM
systems, and fleet systems to access more information.
|April 2019|36
Pradotec:Establishing Trust in an Interconnected World
The world is hurtling forward at a tremendous pace.
Digital transformation is molding the way we live,
travel, and interacts. Perhaps most importantly, it is
revolutionizing how individuals access their finances and
how governments administer citizen services.
Very few companies are at the nexus of technical
proficiency, bleeding edge innovation, and decisive
leadership to excel in this fast-paced arena. However, one
Southeast Asian firm has already established a foothold
here. It is forging a trailblazing path that will shape the
‘connected’ experience for millions around the world, far
into the foreseeable future.
That company is Pradotec.
Impeccable Pedigree
Pradotec Corporation Sdn Bhd (Pte Ltd) is one of the
world’s foremost electronic identification, access control,
and secure payments specialists. The hardware development
and manufacturing company is headquartered in Malaysia
but 70% of its revenue is generated internationally.
While it was founded in 2007, Pradotec’s technical DNA is
much older. It is an independent offshoot of IRIS, the
company that developed the world’s first digital smart card
in 1997, executed Malaysia’s ePassport program in 1998,
and its Multi-Purpose National ID Card project in 2000.
The company’s Founder, Dato’ Tony Lee Kwee Hiang is
a veritable legend in the Malaysian computing sphere.
Dato’ Lee began his journey into the world of technology
almost four decades ago with a technical diploma. He went
on to introduce Apple computers to Malaysia and was
instrumental in establishing the country’s first computer
manufacturing facility. Malaysian students learn about
computing based on the ATOM1 syllabus Dato’ Lee
designed.
His achievements transcend national borders; Dato’ Lee’s
invaluable contributions to Malaysia’s MyKad initiative
created the world’s first chip-based multi-application
identity card.
This wealth of technical knowledge, practical experience,
and an innate ability to foresee trends in technology give
Pradotec the inspired leadership needed to dominate the
industry.
Diversified Excellence
Pradotec has adopted an aggressive approach to
diversifying its portfolio. Besides passports and eID
documents themselves, it also develops and manufactures
static and handled readers for such documents. The
company’s expertise extends to biometric readers, mobile
enrollment units, self-service kiosks, and ID printers, too.
Having dominated the government services sector for so
long, Pradotec is ideally positioned to bring its world-
leading technological solutions to a variety of industry
segments.
“Peer-to-peer exchange transactions, a globalized society,
and exponential increases in travel and border crossings
have changed consumer behavior in terms of technology
and how it impacts our identity and private life,” says Dato’
Lee.
“If you create a car,
you need to
have roads for the car
to be driven on.
Ultimately, you
have to also build
these roads!”
Most Trusted
Authentication
1 Solution Providers 2019
The
|April 2019|38
Pradotec understands that its growth lies in being a part
of every transaction made in this digital realm.
“Our goal is to develop trusted technology that can be
relied upon to secure the identities of everyone in the
community, be it in the realm of physical or digital
exchange,” he explains.
The company is taking decisive strides towards this goal
with its focus on innovation, trust, and stability.
“These three factors define and characterize each product
we create and every decision we make. Our intention is to
meet the demands of both the government and the private
sectors.”
A Roadmap for Success
Pradotec is keeping abreast of the seismic shifts that are
shaping the government and private sectors, including
increasingly popular innovations like smart technology and
the Internet of Things (IoT).
“My vision for Pradotec revolves around two key
principles,” reveals Dato’ Lee, “Firstly, to become a global
brand and, secondly, to deliver capabilities that matter just
as much in the future as they do today.”
Dato’ Lee’s has a cohesive plan to make that vision a reality
focuses on innovation driven by authentication, integration,
and sustainability.
The Dato’ expounds, “Authentication involves the use of
embedded software to verify that a person or source is who
they say they are. Integration comprises a range of
techniques that combine various identification roadmaps
into a single, trusted information highway. Sustainability
refers to our core design principle that aims to prolong the
relevance and value of our products across traditional
limitations of time and space.”
The competition is intense at the elite levels of any industry
and the verification and eID ecosystems are no different.
However, Pradotec has at its disposal a key advantage that
its competitors do not – a holistic suite of products and
services.
Most authentication specialists are completely software-
driven. Their products have to be integrated into externally-
produced hardware before they can be utilized. This
discontinuity can potentially be the root of both
incompatibility issues and security breaches.
With Pradotec, this situation does not arise. Their
organically-developed symbiosis of hardware and software
is unrivalled. In fact, companies that would otherwise be
competitors often turn to Pradotec as customers of their
products.
Pradotec regards a recent ASEAN Defense Ministers’
meeting, which emphasized the need for biometric
hardware to manage information in the fight against
terrorism as the ideal opportunity to press its advantage
internationally.
Crafting the Future
The world is witnessing a steady and inevitable shift from
physical to digital solutions in every aspect of technology.
The Internet of Things, Augmented Intelligence (AI), and
the transition to the Cloud provide versatility, speed, and
convenience hardly imaginable not long ago. With this
change comes an increased potential for lapses in security.
Dato’ Lee anticipated this and his efforts at Pradotec have
focused on creating systems that are designed to address
this inherent deficiency.
Another pressing need for security exists in the nascent
world of smart, interconnected living. We already hear the
term “smart cities” but Pradotec realizes that these cities
will arise out of interconnected facilities. It is only when a
network of smart facilities are interlinked will the smart city
appear.
Pradotec is already developing secure systems for the IoT
and for access and identity management. These components
will form the backbone of the smart complex, however
large or small.
The myriad developments will lead to what Pradotec calls
“One Identification”. The One Identification concept will be
an individual’s gateway to every government service and
every private transaction they require. Through its clients,
Pradotec will deliver faster, smoother transactions devoid of
traditional bottlenecks.
The future looks bright indeed.
Dato' Tony Lee Kwee Hiang
Founder
Pradotec Corporation
|April 2019| 39
Chief Operating Officer
Mark rees
Secucloud GmbH
|April 2019|40
C
an one learn leadership? Every winter semester
I pull my students through the whole spectrum
of “Leadership Theory Parts I and II”:
Taylorism; French & Raven; Blanchard; McGregor;
Maslow et al. At the end of the semester I have them test
their knowledge in a tricky exercise involving a climbing
rope and blindfolds. They have to – whilst blindfolded –
form, storm, norm and perform as a team and lay the
rope (which they are not allowed to let go of) in a
predetermined shape on the ground. And yes, they
always achieve the objective – one way or another. In
contrast I have experienced this exercise as a team
member of highly paid and experienced managers and
witnessed first-hand the utter failure to even manage a
plan, let alone achieve even half of the objective.
Although to be fair, what the managers did achieve (as
opposed to the students), was a whopping great conflict
of personal differences, with which the rest of the
seminar was used to sort out. So what was the difference
between these two groups?
A business acquaintance of mine once introduced me to
the “power of trust” as a basic concept of leadership. He
argued that if there is no trust between the leader and the
led, then the possibilities for sustainable leadership are
extremely limited and indeed most probably restricted to
a short period. Without trust in human relationships there
is however a form of leadership and to reference French
Leadership skills
essential for
organizational growth
and Raven, it is the positional power of coerciveness and
reward – the proverbial carrot and stick. That works for a
while as long as the (micro) manager exclusively owns
the processes and information as a means of control. I
believe in the long run, this strategy fails. No (high
performing) employee deliberately hangs around for
very long in such a situation. I’ve seen this happen
numerous times.
Again considering the group of students and the
experienced managers with their climbing ropes and
blindfolds, what I perceived was extreme differences in
levels of trust. The students – in their seventh semester –
were close-nit. They were just entering their final thesis,
they have common objectives and after 3 and half years
spent on campus, an intrinsic trust to one another. In
contrast the managers came from varying business units
of a large company and were “thrown” together to
improve their leadership skills and develop as a
leadership group within the company. Each manager had
his (the group was all male) own agenda and personal
career objectives etc. Each was competing for power and
influence before the board. Instead of collaborating to
achieve the climbing rope objective, all the micro-
politics came out in the exercise and trashed any trust
that might have been there at the outset. The evening log
fire at the beach was a flop.
Trust is the key for sustainable development of organizations
MENTOR’S STANDPOINT
|April 2019| 41
Trust as a subject is rationally difficult to grasp. It is one
of those things we intuitively feel as being present (or
not) in human relationships. To get a grip on the term, let
us start with Peter Drucker’s definition of management
“turning resources into production”. Now consider that
what leadership does in a company is to apply strategies
(resources) to achieve objectives (production). On the
one hand the objectives should be such that they inspire
people, bringing out their best qualities both in skills and
collaboration. Secondly and as a rule, it is the leader who
drives the strategy in order to achieve those objectives
and this is the key area where trust within the team and
across teams can emerge. It is the means utilized to
achieve the ends that define so much about an enterprise.
There are of course coercive means, non-compliant
means, even illegal means etc., thus the old excuse for
bad behavior “the ends justify the means”. In such an
environment sub groups form, secrecy becomes endemic
and there can only be mistrust and suspicion between
people.
Approaching the skill of leadership whith consideration
of social and ecological factors allows decisions to be
made under the reflection for example, of waste
reduction, for the good of the many, for sustainable
growth etc. In utilizing social and ecological factors in
decision-making processes, our unique human form of
emotional intelligence is an influential force that
significantly influences behavior both of oneself as a
leader, and as a member of the collective (the business
unit being led). Over time common values and
understanding emerge in the group, which in turn
develop (forms and storms) and fortifies the culture (the
norms), thus producing the high performance unit that
every person blessed with the opportunity to lead can
aspire to. If you get there it’s the best job in the world!
Trust is a human trait that is available to us all. You can´t
simply buy it by attending a leadership seminar, doing an
MBA or reading a book. Trust has to be earned and
shared unconditionally as a gift. It can be rejected,
withheld, it is breakable and can be destroyed in a
second. Yet for all its non-tangibility and fragility, it has
more power to achieve than anything else in the
leadership toolbox.
About the Author
Mark Rees is the Chief Operating
recfO at Secucloud GmbH,
Hamburg. In his last position Mark
Rees was Managing Director of E-POST
Development GmbH in Berlin, a
subsidiary of Deutsche Post. There, he
led an international team comprised
of several hundred employees in agile
DevOps development teams, and was
responsible for employee direction, as
well as the entire budget in the areas
of IT security, DevOps, quality
assurance, operations and user
experience. In his work as COO at
Secucloud, Rees applies his expertise
in agile leadership and his many
years of experience in interdisciplinary
IT organizations in the Media and IT
security industries.
|April 2019|42
Signicat:
An Innovative Digital Identity Service Provider
Based in Trondheim, Norway, and founded in 2007,
Signicat operates the largest Digital Identity Hub in
the world, offering the only complete identity
platform in the market and trusted to reduce the burden of
compliance in highly regulated markets. The company is a
leader in verified digital identity, making it possible for
organizations to securely onboard and authenticate new and
returning customers. Signicat is dedicated to innovate in the
areas of electronic identity and signatures, and to offer
customers, solutions that enable them to offer their products
and services in new and innovative ways.
Signicat is the winner of the International Identity
Deployment of the Year Award and Best Innovation Award
at the Cards and Payments Europe Awards.
Signicat’s solutions are used by banks and financial
institutions, insurance companies, government agencies and
large corporations as well as small and medium sized
businesses. Customers trust Signicat with the responsibility
of authenticating users, providing electronic signing,
identity proofing, and document preservation. Signicat’s
vision is to be the preferred provider of electronic identity
services to customers in regulated industries across the
world.
The company has a local presence in Norway, Sweden,
Denmark, Finland, Germany, Portugal, United Kingdom,
and the Netherlands. These countries are in the forefront in
the world with the usage of digital identities and electronic
signatures.
Dynamic Solutions
With Signicat, service providers can build and leverage
existing customer credentials to connect users, devices and
even ‘things’ across channels, services and markets
transforming identity into an asset rather than a burden. By
ditching manual, paper-based processes and replacing them
with digital identity assurance, customer on-boarding is
accelerated and access to services is made simple and
secure. Signicat’s Identity Hub is a complete solution that
offers compliance and a route to better customer
engagement. Its solutions fulfill operational capabilities in
“Our vision is to be
the most comprehensive
provider of electronic
identity services to
customers in regulated
industries
across the world.”
Most Trusted
Authentication
1 Solution Providers 2019
The
|April 2019|44
line with international standards and requirements,
such as Privacy, Anti-Money Laundering (AML) and
Anti-Terrorist legislation and regulations, as well as
Know Your Customer (KYC) requirements for
onboarding of new users. Company has over 400
financial services organizations as clients,
connects to more than 20 schemes globally and
verifies more than 10 million identities per
month.
Personifying Expertise
The Nordics are well respected for their adoption of
verified, reusable digital identities, by being able to
have a single, verified identity to access government,
bank, and other services online. This approach was
pioneered a decade ago, and Gunnar Nordseth, the CEO
of Signicat, is one among the handful of executives in the
world, who has been in this industry for its entire journey.
Gunnar has helped shape this industry through its founding
and subsequent maturation. He is now helping to shape the
next phase of this industry by leading a push to provide
cross-border identity across Europe and beyond.
Implementing the Lessons Learnt
The team at Signicat has learnt many lessons among which
one of the key lessons was the power of reusable identities.
One of Signicat’s customers named Komplett, a large online
retailer in the Nordics, realized that by using verified digital
identities, it could not only authenticate its customers
quickly, but also could deliver credit services to its
customers. Th is was so successful that Komplett was able
to open its own bank to service its customers.
Additionally, Signicat focuses on regulated industries with
which it learnt that there is a need to take a highly
customizable approach while delivering solutions to its
customers. Each organization, in each market, requires
unique functionality and so it has developed its platform to
ensure it can quickly respond to unique requests to meet the
needs of the regulated businesses.
Overcoming Hurdles
As Signicat deals with regulated industries, it faces new
regulations, compliance requirements, and cultural
requirements quite frequently. The addition of new
technologies (smartphones, smart watches, etc.) further
requires flexibility. It tackles these problems by working
with some of the smartest technology providers out there, as
well as its experienced team. It continues to innovate
around authentication, with biometric authentication which
is a large focus area for the company currently. Signicat is
also able to integrate technologies into its platform to
ensure its delivery of cutting-edge authentication offerings.
Future Insights
As per Signicat, Biometric authentication is important for
the future, as is pattern recognition and more generally AI
and data analytics. More and more mobile devices will be
the key to authentication and Signicat will be able to use the
various sensors within these devices to help ensure the user
is who they say they are. The firm is exploring technologies
such as gait analysis, movement user patterns, the way
users hold their devices and more as examples of potential
authentication data sources.
Signicat’s goal is to enable customers to do business more
effectively by delivering great user experiences for the end
users and at the same time reduce the risk by using
advanced security technology.
Gunnar Nordseth
CEO
Signicat
|April 2019| 45
5 INTERESTING CATEGORIES OF
‘GPS TRACKERS’TO TRACE LOCATION
G
lobal Positioning System (GPS) which was
originally envisioned as a military project to assist
guiding missiles to target the key objects more
precisely and accurately has now been utilize by citizens
(directly or indirectly), and businesses all across. It has
become a vital thing which is needed to carry out day-to-
day operations in many verticals. Today, this technology is
benefitting many individuals and businesses to navigate and
track their objects in a hassle free and timely manner that
too with a single click of their electronic gadget. GPS has
already spread its deep footprint in automobile navigation
systems, mobile phones, and timekeeping systems and is
ready to make a far deeper impression in some other sectors
in coming times.
However, many people do not exactly know the different
types of GPS trackers available in the market, their usage
and working pattern. Here we have clear those confusions
and come up with interesting details concerning various
types of GPS trackers.
Personal Tracker
Gone are those days when people used to stick posters of
their lost pet in their nearby colony. People now-a-days are
using personalized tracker to monitor their pets.
GPS-equipped collars have replaced ID collars which have
been in use for a very long time. What’s interesting about
these GPS-equipped collars is that it can be remotely
monitored with the assistance of a personalised device.
Moreover, such tracker is also gets use to track human
beings with the help of pocket chip or bracelet. Such device
provides a huge peace of mind since anyone can find their
pets and even the close ones without taking the help of
anyone and that too in a very quick time.
Asset Tracker
Many people got confused between a personal tracker and
an asset tracker. Although, there is a very thin line that
differentiates these two, but both are completely different as
per their use. An asset tracker is use to track any
non-vehicular item with the assistance of a small radio chip
to a large satellite tags. Largely, supermarkets use such
trackers to find their stolen or lost item.
For example, previously, supermarkets use cart blocking
barriers to prevent it from getting stolen or lost but/since
that process was time consuming which also demands extra
manpower to manage those numerous shopping carts,
supermarkets have now switched to using asset trackers.
Interestingly, by using such tracker in their carts,
supermarkets have witnessed a significant drop in the share
of their lost or stolen carts. And even of that get stolen, the
rate of recovery is quite high. This is what the real benefit
of using an asset tracker.
Moreover, such trackers also provide some extra benefits to
a business rather than just tracking or recovering a
misplaced or stolen shopping cart. These trackers also have
the ability to identify the items placed inside the customer’s
grocery cart. By analysing such data, a business owner can
find interesting details like customers buying pattern,
buying frequency among more. And can then effectively
plan a customised marketing plan focusing on an individual
customer’s shopping habits to boost more sales in the
future.
Cell-based GPS Vehicle Tracker
There was a time when delivery companies used to call
their drivers to know the exact position of their vehicles and
|April 2019|46
keep themselves updated on regular intervals. Especially
those delivery companies who transport precious as well as
vital objects like gold, metals, cash, and other items. Such
companies were under uncertainty and tension regarding
the safe delivery of their goods till the time its reaches
safely to the destination. But with the introduction of Cell-
based GPS vehicle tracking, that worry has reduced to a
minimum level. Such devices capture data from the device
and then reports that data back to the business operator with
the help of cell phones towers. What’s interesting about this
device is that as compared to a satellite tracking, cell-based
vehicle tracking costs less and reports faster to the business
operator. This is one of the reasons behind its huge
popularity in the vehicle-tracking segment.
Satellite-based GPS Vehicle Tracker
What if your vehicle moving through a remote area which
does not have cell towers for long distances, gets lost?
Would you be worry? Definitely yes! Then what is the
solution. The answer is Satellite-based GPS vehicle tracker.
Since, the Satellite-based GPS can be able to track a vehicle
no matter from where it is moving (remote village, dense
forest, hilly regions etc.), it can sends regular updates to the
owner even from the location where cell phones do not
work or the area which does not have cell tower present in
nearby areas.
Cellular-based Tracker
Don’t get confused between Cellular-based Tracker and
Cell-based GPS Vehicle Tracker. Both are different in their
application of usage. Let us clarify with an example. What
if you are into a logistic business, have plenty of
warehouses but no vehicle. In such cases many times it
happens that the third party who handles the transportation
operations does not get convince to install a GPS device
into their vehicle. In such scenario Cellular-based Tracker
gets use, since it only require to install the business app into
the driver’s cell-phone and no other devices in the vehicle.
As the vehicle moves, it sends the location information to
the owner without installing an in-vehicle tracking device
which is required in Cell-based GPS Vehicle Tracker. This
is how a Cellular-based tracker can assist in your business
operations.
TECH CONCERN
|April 2019| 47
Most Trusted Authentication Solution Providers 2019
Most Trusted Authentication Solution Providers 2019
Most Trusted Authentication Solution Providers 2019

More Related Content

What's hot

India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021InsightsSuccess3
 
7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)Mighty Guides, Inc.
 
Risk & compliance magazine compressed
Risk & compliance magazine compressed Risk & compliance magazine compressed
Risk & compliance magazine compressed Mirror Review
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Webinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered InsurerWebinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered InsurerThe Digital Insurer
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationCognizant
 
Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...
Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...
Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...The Digital Insurer
 
Future trends of outsourcing
Future trends of outsourcingFuture trends of outsourcing
Future trends of outsourcingManav Gupta
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...The Digital Insurer
 
Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!
Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!
Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!The Digital Insurer
 

What's hot (20)

India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)7 Experts on Transforming Customer Experience with Data Insights (1)
7 Experts on Transforming Customer Experience with Data Insights (1)
 
The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018
 
Risk & compliance magazine compressed
Risk & compliance magazine compressed Risk & compliance magazine compressed
Risk & compliance magazine compressed
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Digital Insurance
Digital InsuranceDigital Insurance
Digital Insurance
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Webinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered InsurerWebinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered Insurer
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...
Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...
Webinar for July 2020 - Insights to Solutions Spotlight: Re-imagining Digital...
 
Future trends of outsourcing
Future trends of outsourcingFuture trends of outsourcing
Future trends of outsourcing
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
The 10 best performing software testing solution providers 2018
The 10 best performing software testing solution providers 2018The 10 best performing software testing solution providers 2018
The 10 best performing software testing solution providers 2018
 
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
Webinar for July 2020 - Digital ecosystems in India: Extending the boundaries...
 
Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!
Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!
Webinar for Feb 2019 - The Digital Actuary – preparing for the future … Now!
 

Similar to Most Trusted Authentication Solution Providers 2019

The 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdfThe 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdfInsightsSuccess4
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019Merry D'souza
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdfCIO Look Magazine
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfinsightssuccess2
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptxinfosec train
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021Merry D'souza
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 

Similar to Most Trusted Authentication Solution Providers 2019 (20)

The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
The 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdfThe 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdf
 
The 10 most trusted biometric companies
The 10 most trusted biometric companiesThe 10 most trusted biometric companies
The 10 most trusted biometric companies
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
The 10 most reliable authentication solution providers 2021
The 10 most reliable authentication solution providers 2021The 10 most reliable authentication solution providers 2021
The 10 most reliable authentication solution providers 2021
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 

More from Insights success media and technology pvt ltd

More from Insights success media and technology pvt ltd (20)

India's Fastest Growing Start-ups to Watch.pdf
India's Fastest Growing Start-ups to Watch.pdfIndia's Fastest Growing Start-ups to Watch.pdf
India's Fastest Growing Start-ups to Watch.pdf
 
The Fastest Growing Startups in Maharashtra Edition 1.pdf
The Fastest Growing Startups in Maharashtra  Edition 1.pdfThe Fastest Growing Startups in Maharashtra  Edition 1.pdf
The Fastest Growing Startups in Maharashtra Edition 1.pdf
 
Best of 5 Bio-Technology Comapnies In India.pdf
Best of 5 Bio-Technology Comapnies In India.pdfBest of 5 Bio-Technology Comapnies In India.pdf
Best of 5 Bio-Technology Comapnies In India.pdf
 
2022’s Best iPhone 13 Alternatives Presentation.pptx
2022’s Best iPhone 13 Alternatives Presentation.pptx2022’s Best iPhone 13 Alternatives Presentation.pptx
2022’s Best iPhone 13 Alternatives Presentation.pptx
 
The Most Successful Business Leaders to follow-2022.pdf
The Most Successful Business Leaders to follow-2022.pdfThe Most Successful Business Leaders to follow-2022.pdf
The Most Successful Business Leaders to follow-2022.pdf
 
Outstanding Women Lawyers 2022.pdf
Outstanding Women Lawyers  2022.pdfOutstanding Women Lawyers  2022.pdf
Outstanding Women Lawyers 2022.pdf
 
The Top 10 Most Promising EV Solution Providers of 2022-compressed.pdf
The Top 10 Most Promising EV Solution Providers of 2022-compressed.pdfThe Top 10 Most Promising EV Solution Providers of 2022-compressed.pdf
The Top 10 Most Promising EV Solution Providers of 2022-compressed.pdf
 
The 10 Best Franchises to Open in 2022.pdf
The 10 Best Franchises to Open in 2022.pdfThe 10 Best Franchises to Open in 2022.pdf
The 10 Best Franchises to Open in 2022.pdf
 
Inspiring Bollywood Movies, Every Entrepreneur Should Watch.pdf
Inspiring Bollywood Movies, Every Entrepreneur Should Watch.pdfInspiring Bollywood Movies, Every Entrepreneur Should Watch.pdf
Inspiring Bollywood Movies, Every Entrepreneur Should Watch.pdf
 
The 10 Most Profitable Franchises to own April2022.pdf
The 10 Most Profitable Franchises to own April2022.pdfThe 10 Most Profitable Franchises to own April2022.pdf
The 10 Most Profitable Franchises to own April2022.pdf
 
10 Most Promising Architecture & Designing Firms 2021.pdf
10 Most Promising Architecture & Designing Firms 2021.pdf10 Most Promising Architecture & Designing Firms 2021.pdf
10 Most Promising Architecture & Designing Firms 2021.pdf
 
Outstanding Women Lawyers 2022 May2022.pdf
Outstanding Women Lawyers 2022 May2022.pdfOutstanding Women Lawyers 2022 May2022.pdf
Outstanding Women Lawyers 2022 May2022.pdf
 
7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf
 
Best of 5 Oil and Gas Companies.pdf
Best of 5 Oil and Gas Companies.pdfBest of 5 Oil and Gas Companies.pdf
Best of 5 Oil and Gas Companies.pdf
 
Yoga Asanas- Help You to Attain the Perfect Mental Health Ever.pdf
Yoga Asanas- Help You to Attain the Perfect Mental Health Ever.pdfYoga Asanas- Help You to Attain the Perfect Mental Health Ever.pdf
Yoga Asanas- Help You to Attain the Perfect Mental Health Ever.pdf
 
India's Emerging Startups
India's Emerging StartupsIndia's Emerging Startups
India's Emerging Startups
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
The Most Reliable Packaging Companies.pdf
The Most Reliable Packaging Companies.pdfThe Most Reliable Packaging Companies.pdf
The Most Reliable Packaging Companies.pdf
 
The Most Reliable Fire And Safety Service Providers.pdf
The Most Reliable Fire And Safety Service Providers.pdfThe Most Reliable Fire And Safety Service Providers.pdf
The Most Reliable Fire And Safety Service Providers.pdf
 
The women owining the businss arena.pdf
The women owining the businss arena.pdfThe women owining the businss arena.pdf
The women owining the businss arena.pdf
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Most Trusted Authentication Solution Providers 2019

  • 1.
  • 2.
  • 3.
  • 4. E n this capricious business world, every individual is quite familiar with the term ’authentication’ and the necessity of Iimplementing a secure authentication system. Authentication is the act of verification—in which—the identity of an individual or commune has to be accurate with the datum, when analyzed. Many industries have recognized that the traditional password method is not enough in order to secure the data as they are more likely to be breached or can lead to data-leaks. Unlike those traditional methods, the real-time disruptive security systems allow organizations with Multi especially Two-factor authentication (TFA). The TFA is method that identifies users by means of a combination of two-distinctive components whereas multi-factor authentication can offer significant benefits to an enterprise. Insights Success accentuates and feels pride to feature certain authentication solution providers that delivers promising and reliable security systems to various enterprises. Instead getting into the depth of the concept, let us acknowledge the three aspects—Why, When and Whom, to acquire better understanding over the necessary security implementation. Why to adapt! Technology is continuously evolving and so are the businesses. Due to the presence of huge processing units in enterprises, it becomes easier for hackers and wormers to decipher codes leading confidential intelligence at the risk of being compromised by system intruders. Some of these risks include cyber-crime, authentication attacks, data leaks, breaches, application attacks, and the list goes on. Any of these attacks are detrimental to the growth business. This is where the need of the authentication solution provider arises. When to adapt! No organization must wait to get attacked or intrigued by any external sources. As a say, “prevention is better than cure”, one must ensure the safety of organizations data and should implement integration of such systems prior any incident. Securing Businesses, Securing World
  • 5. Whom to approach! There are many security solution providers in the market yet one must ensure the facilitation before indulging with any enterprise. As there is lot of threatening risks organizations face in the cyber world, it becomes essential to rely on leading and assured service provider. Through “Authentication Solution Providers 2019” issue, Insights Success takes an initiative in addressing some of the finest organizations who stand forth in delivering best authentication solutions at one’s door. Here is the cover, i-Sprint Innovations—the world class authentication solution provider, who deliberately proved itself on every turns in the industry. Established in the year 2000, i-Sprint Innovations is a leading provider in Identity, Credential and Access Management (ICAM) Solutions. It delivers trusty, versatile and strong authentication, and identity management platform to secure multiple application delivery environments based on a common security platform. It is incorporating the latest Mobility/ Biometrics/ Cloud/ Identification technologies in the most effective and efficient manner to build trust and identity assurance. Its core business is to ensure secure access and protection of data/ transaction/ asset among the four major IT forces (Cloud/ Social/ Mobile/ Information). Let’s unveil such alike, inspiring interviews and stories of many such significant business flagships in this special edition and spread a word about their contribution in making this world a better and secure place. Also, flip through the CXO standpoints presented by some of the leading industry experts to taste the glimpse of industrial revolutions. Happy Reading….! Be it a two- or multi-factor authentication solution, the need of its implementation in corporate businesses has often become a necessity. “ “ Bhushan Ghate
  • 6. i-Sprint Innovations BuildingTrust and Identity Assurance BEGINNING Wireless Mobile Technology: Scope for Tremendous Opportunities EDITOR’S PERSPECTIVE How GPS is Enhancing Fleet Management? TECH CONCERN 5 Interesting Categories of 'GPS Trackers' to Trace Location CXO Standpoint Leverage Existing SAP Solutions with Cloud Procurement VIRTUOSO’S VISION The Shift that broke the pendulum MENTOR’S STANDPOINT Leadership skills essential for organizational growth: Trust is key for sustainable development of organizations Articles 18 28 40 24 34 46 08
  • 7. Futurae Technologies: Curbing Cyber Risks with Passwordless Logins and Strong Authentication That Without Bothering the User CONTENTS Hitachi ID Systems: Deploying Solutions that Manage Identities, Entitlements and Credentials Janrain: Making the World Identity Digital Signicat: An Innovative Digital Identity Service Provider Pradotec: Establishing Trust in an Interconnected World 20 32 44 26 38
  • 8.
  • 9. sales@insightssuccess.com April, 2019 Editor-in-Chief Co-designerSenior Sales Manager Business Development Manager Marketing Manager Technical Head Technical Specialist Digital Marketing Manager Research Analyst Database Management Technology Consultant Pooja M. Bansal Managing Editor Anish Miller Executive Editor Hitesh Dhamani Assistant Editors Jenny Fernandes Bhushan Kadam Visualizer David King Art & Design Director Amol Kamble Associate Designer Shubham Mahadik Passi D. Peter Collins John Matthew Sales Executives David, Kevin, Mark, Avadhut Business Development Executives Steve, Joe, Alan, AnupJacob Smile Aditya Marry D'Souza SME-SMO Executive Prashant Chevale Patrick James Circulation Manager Robert Brown Stella Andrew David Stokes Shweta Ambilwade Co-designer Copyright © 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success. Follow us on : www.facebook.com/insightssuccess/ www.twitter.com/insightssuccess We are also available on : Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com Insights Success Media and Technology Pvt. Ltd. Off. No. 22 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: +91 7410079881/ 82/ 83/ 84/ 85 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in
  • 10. i-Sprint Innovationsi-Sprint Innovations BuildingTrust and Identity Assurance i-Sprint provides a suite of integrated solutions to enable organizations to implement strong authentication, single sign-on, access control and identity management solutions. “ “ Most Trusted Authentication 1 Solution Providers 2019 The
  • 12. There are many threatening risks organizations face in the cyber world. Some of these risks include cyber-crime, authentication attacks, data leaks, breaches, application attacks, and the list goes on. Any of these attacks are detrimental to the growth business. This is where the need of the authentication solution provider arises. i-Sprint Innovations is the world class authentication solution provider. It delivers trusty, versatile and strong authentication, and identity management platform to secure multiple application delivery environments based on a common security platform. Ensuring Secure Access and Protection of Data i-Sprint Innovations (i-Sprint), established in the year 2000, is a leading provider in Identity, Credential and Access Management (ICAM) Solutions. It is incorporating the latest Mobility/ Biometrics/ Cloud/ Identification technologies in the most effective and efficient manner to build trust and identity assurance. Its core business is to ensure secure access and protection of data/ transaction/ asset among the four major IT forces (Cloud/ Social/ Mobile/ Information). i-Sprint has built two R&D centers with 120 plus engineers/experts to monitor the technology changes, it is incorporating the latest trends such as block chain, mobile security in its solutions, it developed its own IPs based on the latest standard such as FIDO, cloud security ISO, it understands the requirements from partners /customers and provides the best solutions for them. Moreover, its eighteen years proven experiences with bank graded standard further enables it to remain the leading company in the industry. Besides its strong presences in IAM market with over 200 global customers (more than half are finance service institutions), it has expanded its core technology to provide the new generation brand protection solution, which has been highly demanded by manufacturing industry in recent years. Driven by Core Values The name of the company (i-Sprint) itself represents its core values i - Identity Credential & Access Management Solution (IAM) S - Scalable P - Partner & Customer Centric R - Resilient I - Innovative N - Niche & Nimble T – Teamwork “Innovation” is one of i-Sprint’s core value and with 60% of its manpower is technical and engineer people, it has been able to innovate in the last eighteen years. Its other core values have empowered the team to innovate more effectively and to focus its development on IAM solution. Over the years, i-Sprint has developed its own IP - AccessMatrix suite from “on premise only”, in the beginning to cloud offering as well as support mobile workforce accessing the system across different platforms. i-Sprint has enhanced its products as per the current and future market needs. i-Sprint’s knowledge and digital identity have enabled it to excel its solutions in identity of thing (IDoT) and innovate a new generation Brand Protection solution. This solution is for anti-counterfeiting, track and trace and consumer marketing with strong security backend and data collection. For the past two years, its solution has been able to win clients in publication, F&B, health products, automatics, pharmaceutical and more. Besides its own development and innovation, it has been working with partners for advance technology to fuel its growth. Instrumental Leadership As the Chief Executive Officer, Dutch Ng is instrumental in providing strategic guidance on corporate technology and security policies, network infrastructure, technology platforms, business applications, products and services strategies by establishing and managing financial and business performance of the organization. Pulling through Adversities The initial stage of i-Sprint’s development, the year 2000 was particularly challenging period. It was essential to build its own IP /technology and also required the fund to sustain its existence. In order to support research and development in the creation of its IAM solution suite, i-Sprint started off doing system integration job for companies. Through these projects, it learned more about the different multitude of problems and preferences of companies experienced in the area of IT deployment, which further emphasized its desire to create a platform for consolidated IT security services. The SARS (Severe Acute Respiratory Syndrome) epidemic, which hit Singapore in 2003, was another challenging period in the company’s history. Customer visits were nearly impossible during that period, which led to a
  • 13. significant toll on i-Sprint’s sales and finances. The team was faced with the tough decision of whether to soldier on through the lean times or to call it a day. Eventually, with its determination, perseverance, and teamwork, it pulled through the difficult period. Its business took off in 2005 with the successful launch of its AccessMatrix™ suite for identity, credential and access management (ICAM). Remarkably Secure Solutions i-Sprint’s product offerings are in further divided into three major categories: 1)AccessMatrix™ - Suite of Identity and Access Management Solutions 2)YESsafe – Mobile Security Solution 3)AccessReal™ - The New Generation Brand Protection solution This prime i-Sprint’s products are admired by industry leader for catering the diverse regulatory requirements. Digital Identity and Access Protection i-Sprint’s digital identity governs the verification of users’ identity and access protection. The AccessMatrix™ is the solution suite that enterprises can implement strong authentication, single sign-on, access control, identity management and end-to-end encryption solutions to safeguard asset, data, and transaction. i-Sprint’s AccessMatrix™ featured patented technology is a A Hierarchy Model. This hierarchy model, when implemented, is capable of allowing security administrators to centrally manage user and application security-related attributes (authentication methods, access rights, privileges, access control rules) and other application attributes. i-Sprint’s AccessMatrix IAM Suite and YESsafe Suite of Mobile Security solutions cover the security requirements for the entire Identity and Access Management Cycle from Smart User Provisiong/De-provisioning, Adaptive and Contextual User Authentication, Multi-environment Secure Single-Sign-On, flexible Access Control via coarse grained and fine grained authorization policy. Its solutions have been successfully deployed to address the security requirements for multiple access channels: Desktop, Web, Cloud, VDI and Mobile. AccessMatrix™ Universal Authentication Server (UAS) is a comprehensive and versatile authentication server that enables organizations to centralize all its authentication schemes in a single unified platform. It is a future-proof authentication infrastructure that supports multiple authentication mechanisms (such as passwords, OTP, biometrics) for strong authentication and authorization requirements. UAS is FIDO UAF (Universal Authentication Framework) certified. UAS offers the freedom for organizations to deploy various authentication methods from different vendors under one Photo by:Association of Small & Medium Enterprises, Singapore
  • 14. platform, and manage it as a holistic security approach. This means organizations will not be restricted or locked to a specific hardware or software authentication solution. The use of Pluggable Authentication Module (PAM) approach also allows organizations to have ease of adding new methods when available on top of their existing scheme. AccessMatrix™ Universal Sign On™ (USO) provides a non-intrusive approach to enable organizations to achieve single sign-on to multiple web and client/ server applications without any source code changes. USO automates the single logon process to access applications, enhances the authentication process, and enforces a unified password management policy across multiple applications. The solution combines sign-on and sign-off automation with context management and fast user switching on workstations to improve access to business information, reduce operational errors and costs. AccessMatrix™ Universal Access Management (UAM) is a web service based integration platform with 4As security components and agent technologies enable organizations to strengthen application security and enforce fine grained access control policy to manage users in accessing confidential information and critical business transactions. UAM provides Single-Sign-On capability to all web based applications in the enterprise and all access control decisions are made by the AccessMatrix Security Server. AccessMatrix™ Universal Credential Management (UCM) is a Web Based Privileged Account management solution with multi-level approval flow empowers organizations to manage the use of privileged User IDs and Passwords to access confidential information and prevent information and data leakage. Comprehensive Mobile Security Management YESsafe AppPortal+ is a comprehensive Enterprise Mobile App Security Management Solution that creates a unified security platform to help enterprises to deploy, secure and run their mobile apps and authenticate their users. YESsafe Token+ is a new generation all-in-one mobile security token using One Time Password (OTP) and PKI / Digital Certificate technologies for strong authentication and transaction authorization. It not only provides transaction signing to provide non-repudiation and data integrity protection, it also leverages the advanced features of mobile devices to offer security protection and ease of use. YESsafe Protect+ proactively protects mobile apps against various risks and attacks, allowing mobile apps to run securely even on highly infected devices. AppProtect+ also provide callback APIs to fulfill user demands, such as to collect and send the risks data to the server. Comparing with the traditional Antivirus software, AppProtect+ can protect app without virus database update or internet connection; Comparing with the hardened app solution, AppProtect+ can prevent passive attacks (like reverse engineering, repackaging and source code modification), and respond by taking necessary measures to if real-time attacks are detected during app running. i-Sprint’s YESsafe Android/ iOS Client and Authenticator Combo has attained the new FIDO UAF Level 1 (L1) Certification. World Class Brand Protection AccessReal™ is a world class brand protection solution for anti-counterfeiting, track & trace and consumer marketing. By providing a unique Identification coding tag (barcode, QR code, clone-proof AR code RFID, NFC, etc.) for each product, it allows companies to minimize counterfeiting activity, perform product logistics tracking, link customers To enable individuals, organizations and societies to build trust and identity assurance for powering huge productivity gain through digital identity and identity of things. “ “
  • 15.
  • 16. to product and provide business intelligence for better business planning and direct interaction with customers. Other than the bank-grade security features and data analytics capabilities, AccessReal also provides a mobile platform for consumers, distributors, resellers, and other stakeholders in the supply chain to leverage mobile devices to authenticate the products, receive news/ promotions and establish direct communication. Global Presence i-Sprint’s clients include leading global and regional financial service institutions, government agencies, public utilities, manufacturing, healthcare, education, multi- national corporations, and others. Currently, i-Sprint has a direct presence and active authorized partners across Singapore, China, Hong Kong, Taiwan, Malaysia, Thailand, Japan and the United States. Differentiation from Competitors · Proven bank-grade technology with over 80 major financial customers worldwide · Solid foundation with 100% owned IPs with patented technology · Complete Suite of ICAM solution is available on- premises and cloud offerings to ensure scalability, flexibility, expendability · Tailored and built a secured platform to support various authentication mechanism. Therefore, choices of authentication methods are maximized · Recognized as the world leading ICAM Solution Provider by many world leading IT organizations such as Gartner/ Cybersecurity Ventures/ Info Security Products Guide/ NetworkWorld Asia Our Digital Identity governs the verification of users’ identity and access protection. “ “ · Presence in Asia is exceptionally strong Recent Awards/ Recognitions The only ICAM (Identity, Credential and Access Management) Vendor in Asia that has been featured in Gartner Reports since 2006 (Gartner is an American research and advisory firm providing information technology-related insight for IT and other business leaders located across the world) · Since year 2015, listed in Cybersecurity 500 Directory · 2018 NetworkAsia Readers’ Choice - Winner in Identity Management Suite Category · 2018 Information Management Awards – Winner in Identity & Authentication Management Category · 2018 Security Industry’s Global Excellence Award - 9 Awards · 2017 Enterprise Innovation Awards, Technology Innovator, Winner in Identity & Authentication Management Category · APAC CIO Outlook Top 25 Cyber Security Technology Companies 2017 Insights into Future i-Sprint Innovations plans to keep innovating its product offerings for the needs of its customers. It is going to continue to develop its technology to capture new opplemortunity in the market. It is determined to cover more markets in Asia and also expanding to US and Europe countries. It is open to partnership in future with competitors that have products that compent theirs to pitch solution to customers Photo by:Association of Small & Medium Enterprises, Singapore
  • 17.
  • 18. Address : Country :City : State : Zip : Global Subscription Date :Name : Telephone : Email : READ IT FIRST Never Miss an Issue Yes I would like to subscribe to Insights uccess Magazine., S SUBSCRIBE T O D A Y Che should be drawn in favor of:ck INSIGHTS SUCCESS MEDIA TECH LLC Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone (614)-602-1754,(302)-319-9947: Email: info@insightssuccess.com For Subscription: www.insightssuccess.com CORPORATE OFFICE
  • 19.
  • 20. C ompanies that have already invested in SAP find that they can achieve even better results from their existing investment with cloud technology and eProcurement. After the initial investment, companies find certain roadblocks preventing mass user adoption and diminishing cost savings. Issues such as inability to stay connected, lack of insight into data, and complex and fragmented business rules stop businesses from using the full power of SAP. As cloud application technologies advance, companies gain the benefits of rapid deployment cycles, increased self-service tools, and faster performance. Vroozi delivers on the promise and power of eProcurement in the Cloud with seamless integration into SAP. SAP users looking to the cloud generally face a few questions, including: · How can I benefit from using cloud procurement? · Will my transition to the cloud be cost-effective? · How will my business processes be affected by cloud technology? To understand the benefits of cloud technology to existing SAP users, let’s evaluate three procurement strategies that highlight the power of cloud procurement. Value Realization Return on Investment (ROI) is a central factor in any procurement strategy. Buyers and trading partners of cloud procurement solutions need to feel confident that solutions will lead to cost savings and higher productivity and efficiency. Users quickly see returns by focusing on user adoption, compliance, and spend management. Spend Management allows companies to visualize purchasing spending patterns and usage and drives employees to leverage preferred pricing with contract suppliers. To increase user adoption and compliance, the cloud empowers a mobile workforce with the right resources and experience so everyone stays connected and available so that business is not disrupted. As user adoption and compliance frameworks increase with cloud-based systems, organizations gain immediate cost savings in procurement by decreasing transaction costs and preventing spend leakage with your supply chain. Efficiencies Process efficiency is key for a successful, healthy business. Cloud technology enables better processes by keeping everyone connected through a mobile experience and automating transaction tasks through the use of machine learning and pattern matching. With a centralized, unified system, cloud automation can yield immediate benefits in requisition to invoice and payment business processes and reduced errors and issues leading to higher productivity and decreased processing costs. Further, by allowing employees Leverage Existing SAP Solutions with Cloud Procurement |April 2019|18
  • 21. Brad Hill, Director of Global Sales & Marketing of Vroozi is a passionate leader and is responsible for expanding the Vroozi Product Suite, Brand Adoption, Partnership Network & ensuring our customers receive an unparalleled experience with Vroozi. Brad spent the last 20 years building Enterprise Sales and Product strategies with leading IT Services organizations. His entrepreneurial strategies have served a vast number of Fortune 500 industries and verticals. He is also an aspiring mechanic and frustrated golfer, two good reminders to keep his day job. to interact with cloud procurement via smart Phones and tablets, business can continue to move with efficiency and speed. IT Cost Savings Perhaps no determinant is more important in realizing the benefits of cloud technologies versus traditional on premise software is in IT Cost Savings. Systems and applications which required large physical infrastructure and monetary investments can now provide inexpensive and scalable solutions through the Cloud and cloud infrastructure providers. A procurement solution that integrates with SAP is easier to access, less expensive, and takes a fraction of the implementation time companies once faced with traditional software solutions. Cloud technology relieves the user of hidden costs such as hardware, consultants, infrastructure, maintenance, and costly upgrade cycles, providing lower risk and lower total cost of ownership. Conclusion The cloud offers little upfront expense, automatic upgrades, and pre-integrated best practices which allow organizations to focus on business growth and improved operating margins. Vroozi’s eProcurement solution that takes SAP solutions to the cloud empower users with better returns, better processes and higher savings, so their overall SAP investment’s ROI is accelerated. According to IDC, spending on Cloud computing is growing at 4.5 times the rate of IT spending since 2009 and is expected to continue growing at more than 6 times the rate of IT spending from 2015 through 2020. (via Forbes) This massive growth is easily understood when businesses understand the power and value of cloud solutions. With the Vroozi Platform, companies can take advantage of robust eProcurement technology delivered in the Cloud and integrated seamlessly with SAP. CXO STANDPOINT Brad Hill Director of Global Sales & Marketing Vroozi |April 2019| 19
  • 22. Futurae Technologies: Curbing Cyber Risks with Passwordless Logins and Strong Authentication That Without Bothering the User With advancements in technology propelling forward at breakneck speed, major security concerns are also on the rise. These security concerns are related to multiple technologies but data breaches always lands the top spot on that list. Smart gadgets are now considered to be the primary source of data collection and distribution. While these smart gadgets are significantly improving daily life in many different aspects, at the same time they also attribute to the higher frequency and scale of potential security breaches. Founded in 2016 in Zurich, Futurae Technologies offers a strong suite of multi-factor authentication tools that provide bank grade security for big and small budgets. The company’s core belief is that even the strongest level of security does not need to compromise on customer experience nor user privacy. The range of authentication methods in the suite provides companies with complete flexibility and swift deployment. In addition, Futurae’s human-centric technologies also enable easy integration into a company’s existing infrastructure and reduces overall authentication overhead costs. Future-proof technologies Futurae offers award-winning security solutions that reduce risks of data thefts. The organization’s core component is “Zero-Touch”, a two-factor authentication solution that works without any user interaction, entirely invisible for the user. The technology uses a machine learning algorithm to securely authenticate the user in a completely frictionless manner. It uses context information like sensor signals and ambient noise around the user, while at the same time also secures the privacy of the user throughout the entire authentication process. This solution is unique and offers the most secure access without causing any additional friction in the customer journey. Zero-Touch also enables a seamless strong authentication for use-cases like smart assistants (e.g., Alexa or Google Home) or on any device where there is (only) a microphone and speakers. In addition, Futurae is a pioneer in passwordless authentication methods enabling authenticated access, at the same time lowering helpdesk costs by eliminating password/reset struggles that many companies have. Futurae Authentication Suite also offers other authentication solutions in addition to Zero-Touch, such “The new standard in user-centric authentication - Security has never been easier.” Most Trusted Authentication 1 Solution Providers 2019 The |April 2019|20
  • 23. as ‘One-Touch’ via a push notification for transaction confirmation, single device authentication, and various offline solutions as well as solutions that do not rely on smartphone devices. It has recognized the industry needs and knows that “one size does not fit all”. All the solutions can be parameterized to user groups to meet individual needs of organizations. The Futurae Authentication Suite is offered as an SDK to be plugged into any existing mobile apps or as a secure and customizable authenticator app. Finally, the ease of integration enables all customers to easily implement strong authentication for their users. Futurae offers a flexible pricing model catering to small startups and large enterprises, that allows all customers to enable strong user authentication. Its standard deployment is cloud-based that provides a scalable, secure and redundant infrastructure. For enterprise cases, managed on-premise deployment as well as other customization is available, according to their specific needs. New approaches needed in IT security Digitalization offers companies the ability to create products with more and more touch points with end- users, and providing them with personalized services. The more digital the world gets, the more important and precious data becomes, thereby increasing the importance of protecting users from cyber-attacks. The industry is still struggling with bridging usability with the highest security requirements and not interrupting the customer journey. Until now, increased security has always been correlated with less usability which weakens the security structure. Futurae is changing that with its exceptional service and technologies, which is attracting a lot of global interest. Futurae has customers in a wide range of industries although the focus is premiliarly on the financial service and insurance industry. The company already has strong brands among its customer base which helps accelerate its rapid growth. Futurae was named Cool Vendor in Identity and Access Management in 2018 by Gartner and strengthening its presence globally. Security for constantly changing threats Although the user experience that the Futurae Authentication Suite provides is so seamless and at times invisible, there is a team of best-in-class IT security experts is behind the scene ensuring customers are secure in the ever evolving cyber threat landscape. Due to the proximity to ETH Zurich, one of the best computer science universities in the world, the security experts are well connected and at the pulse of new developments. As an ETH Zurich spin-off, they also benefit from the university’s strong international industry network. Testimonials from Clients “Futurae consists of a highly talented and committed team that delivers its promises with their innovative AI enhanced authentication portfolio.” Andreas Iten, CIO Financial Information and Corporate Function, SIX GROUP Sandra Tobler Co-founder & CEO Futurae Technologies |April 2019| 21
  • 24.
  • 25.
  • 26. Wireless Mobile Technology Scope for Tremendous Opportunities Wireless mobile telephony was mainly invented and implemented only for voice communication to be used anywhere, anytime, and on the go. With time wireless telephony has been heavily researched and developed. Each year, each month, and even each day new innovations and trends are being added in mobile communication technology. That has produced till dates, the most sophisticated wireless mobile telephony that we are using in the form of a smartphone. History Some decades ago, mobile phones were costly, large in shape and heavy in weight used for voice calling only with limited access within metro cities. Gen X people know these big-1G-analog-mobile phones very well. These big phones remained the status symbol of rich people only. In 1990’s 2G-digital-mobile service was introduced that consisted voice as well as data capabilities, this was the major innovative generation of mobile phones. With this, doors opened for mobile telephony for all with ease and compact mobiles. These mobile phones were a bit costly and not heavy performers like PCs because of their weak hardware. Satellite Mobile Phone In addition to the cellular network phone, mobile phones can also be connected directly from Earth- orbiting satellites. These satellite phones can be used in remote areas where wired network is unavailable or where setting up of a cellular network is difficult. The Inmarsat system is the world’s oldest satellite phone network. Some other operators like Iridium, Globalstar, and Thuraya also provide satellite phone services. Use of a satellite phone is very low due to the need of a special expensive device that supports satellite frequency and high usage cost. In some countries, the use of satellite phones is illegal. Most of the satellite phones are used in defense and disaster response. Wireless Broadband With the rise of 21st century, 3G service was first introduced by NTT DoCoMo in Japan. This technology becomes a game changer in the field of mobile broadband. Use of high-end-cutting-edge technology for manufacturing made mobile cheaper in addition to good hardware that can perform an internet browsing and downloading very well. 3G mobile phones reached the popularity with the Internet Access and Video Calling. Use of mobile phones instead of PCs made compulsory for OEM’s to build similar strong hardware and OS as PCs. New hardware and OS were introduced and replaced with new one. |April 2019|24
  • 27. Operating Systems for Mobiles For a decade, Symbian of Nokia was very popular as a mobile OS. It faced stiff competition afterward with the introduction of Android and iOS. After Symbian OS; Android, iOS (Apple), and Windows operating system became popular that converted a mobile phone into a smartphone. Symbian, Android, iOS, and Windows are the milestones in mobile technologies that provide nearly similar computing capabilities of PC’s to mobile with the similar hardware configuration. All these OS supports different applications for a different purpose depending upon the user requirements. Need for Mobile Applications Digitization in banking, governing, and in near about all the fields increases use of smartphones instead of PCs and laptops because of their low cost and compactness. Now people are not only using mobile phones for communication, but also for gaming, online transactions, social media, job hunting, online shopping, downloading-watching videos, and more. All these needs cannot be full-filled by Mobile OS and Mobile Browser only, which demands most sophisticated separate application for different use. Mobile Applications are becoming more popular as they are time saving and simple in operation. This has given birth to the Mobile Applications Industry. Effect of New Technologies Newly developed 4G technology broadens the use of wireless mobile technology. IoT (Internet of Things) mainly use the wireless network for their operation. Using the IoT machines can be connected to each other and can be remotely controlled and operated with the help of wireless internet and software. IoT needs high internet speed and strong software to control machines like drones, autonomous vehicles, etc. 4G technology provides 50-1000 Mbps speed which is highly suitable for IoT devices. IoT also needs a special application depending on need, which may run on iOS or Android or any operating system. Base for Mobile Applications Mobile applications are mainly based on the OS and hardware on which mobile phone or device works. Today there are mainly three popular OS; Android, iOS, and Windows. Based on this, developer develops the applications for specific use. These applications are available in App Store of that OS. Like Android places their apps in Play Store, iOS of Apple in App Store, and Windows in Microsoft Store. All these apps are third party apps developed and maintained by other developers and solution providers. Some of the apps are free and some are priced small amount with some validity. Another fact is, free apps are also available in chargeable premium version, maybe with ad-free versions having high-end features. Scope for Business Mobile apps business is growing faster after the 3G technology. 3G and 4G technology provide faster internet access that brings users to the mobile internet platform. Mobile is now used as a replacement for bulky PCs. All-day-today activities are carried on mobile that demands different applications for different use with periodic update depending on changing trends, security, and needs. All biggies are making large investments in the app solution business due to huge demand for different apps. Dependency on apps is growing due to use of the new technologies like IoT, M2M, Virtual Reality (VR), and more. Again gaming apps are also gaining more popularity as hardware of mobiles are becoming more advance that can support high-end gaming. Numbers of apps are entering into the mobile market, creating lots of space for mobile app developers and solution providers. New mobile technology innovated, implemented and grew continuously, that again creates the new requirement of different apps, keeping app industry growing. BEGINNING |April 2019| 25
  • 28. Hitachi ID Systems: Deploying Solutions that Manage Identities, Entitlements and Credentials In an interview with Insights Success, Idan Shoham, the Chief Technology Officer and Founder of Hitachi ID Systems, Inc. shares his valuable insights on the company’s core competencies and its comprehensive solutions for managing identities, security entitlements and credentials. Belowarethehighlightsof interview: Give a brief overview of the Hitachi ID Systems, its uniqueness, and itsvision. Hitachi ID Systems, Inc. delivers identity and access management (IAM) solutions to organizations globally, including many of the Fortune 500 companies.The Hitachi ID Identity and Access Management Suite is a fully integrated solution for managing identities, security entitlements and credentials, for both business users and shared/privileged accounts,on-premisesandinthecloud. The Hitachi ID Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). Hitachi ID Systems is recognized by customers and analysts for industry-leading customerservice. No other IAM suite includes identity management, access governance, group lifecycle management, credential management, privileged access management (PAM), strong authentication and federated access. Hitachi ID Suite includes all of these, behind a single user interface, running in a single instance, with a single back-end database and using shared connectorsandreports. No competing IAM or PAM product includes a peer-to-peer replication model for active-active, load balanced deployment, no competitor offers smart phone access without a public URL and no competitor includes as many built-in connectors. Hitachi ID Systems’ vision is to be the identity and access management, credential management and privileged access management vendor of choice for medium and large organizations, selected on the basis of innovation, flexibility, customerserviceandtotalcost. What are the cutting-edge services/solutions offered by HitachiID Systems? The Hitachi ID Suite is available as any combination of three licensedproducts: a) Hitachi ID Identity Manager: Manage identities, accounts, groups and roles: Automation, requests, approvals, reviews, SoD andRBAC. b) Hitachi ID Password Manager: Integrated credential management: Passwords, security questions, certificates, tokens,smartcardsandbiometrics. “Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.” Most Trusted Authentication 1 Solution Providers 2019 The |April 2019|26
  • 29. c)Hitachi ID Privileged Access Manager: Securing access to administrator, embedded and service accounts. These are all built on a single platform – one source code, one installer, one UI, one workflow framework, a shared set of connectors, reports and analytics, etc. Moreover, the Hitachi ID Suite includes features that might be surprising in the above categories, including group lifecycle management, federated application single sign-on andbuilt-inmulti-factorauthentication. All of this is available as a service – i.e., cloud-hosted and vendor operated SaaS, as traditional on-premises software with a perpetual license and annual maintenance, or with a hybrid model, such as licensed and deployed to IaaS or on- premisesbutmanagedby HitachiID Systems. Describe the experiences, achievements or lessons learned that haveshaped the journey ofthe company. Hitachi ID Systems is focused on delivering pragmatic solutions to real-world problems, rather than "me too" features.Thishasledtosomeunusualcapabilities. For example, in the context of identity and access management (IAM), it is impossible to predict all the entitlements that some users will require. The more “high value” the user (e.g., back office people who perform functions that are material to the business), the less likely their needs are to fit neatly into a role based access control (RBAC) model.This leads to the need for users to request entitlements, which in turn exposes a serious usability problem: users know they need access but they don’t know what the system, account, role or group they need access to is called and they struggle to select the right entitlementfrom a menu of millions of items!This is a central challenge in IAM systems: requester usability. To tackle this problem, Hitachi ID Systems has developed multiple requester usability aids, including a recommendation system, a mechanism for requesters to compare the entitlements of recipients to reference users and the ability to intercept denied access attempts and guide users totheappropriaterequestpage. Another interesting example arises in password reset systems. Employees and contractors often carry around corporate laptops with locally cached Active Directory (AD) credentials. If a user forgets theirAD password while off-site, they can call the help desk for assistance but the help desk cannot connect to the off-site/off-line laptop and consequently cannot enable the user to regain access to their computer. To address this major disruption, Hitachi ID Systems has developed a self-service password reset client software component which integrates with WiFi and the corporate VPN. With it, users can reset forgotten passwords even while off-site, and the password reset updatesthe locally cached password. Users can then get back to work, rather than carrying around a useless laptop until they next visit a corporateoffice. What according to you could be the potential future of Authentication Solution Industry and how does Hitachi ID Systems envisionsustaining itscompetency? Strong authentication has become “table stakes” – there are lots of options, many of which work well. Federation, be it via the secure assertions markup language (SAML) or OpenID Connect (OIDC) allows applications to offload this problem tosharedinfrastructure. The future is one where every organization has multiple MFA solutions, where most applications forego internal authentication and instead support SAML and/or OIDC and where MFA solutions become very inexpensive, ultimately dropping to $0 by being bundled with other, larger products, as isthecasewithHitachiID MobileAccess. About the Leader In his role as Chief Technology Officer, Idan Shoham is responsible for defining product and technology strategy and the overall development of Hitachi ID Systems solutions. He works closely with his talented team to ensure that the solutions that Hitachi ID delivers to the market are of the highestquality. Idan Shoham Founder & CTO Hitachi ID Systems, Inc. |April 2019| 27
  • 30. C orporations are shifting their marketing services in-house and re-defining relationships with their suppliers. This is a strategic shift brought about by a confluence of technical, social and political change on a global scale. At the core of this movement is the corporation’s need to control global brand messaging quickly in an increasingly regulated world. Is this a temporary shift or is there more to it, and how far might it go? TShiftthat broke the pendulum he About the Author Murray Oles is the President of CHALEX Corp. The company is specialized in Workow Management for Marketing Communications Projects through the use of SmartFlo and integrated third party tools. Murray Oles President |April 2019|28
  • 31. The rise of mobile computing combined with an explosion in SaaS software development has led to more intuitive purpose-built applications with built in learning tools. The net effect is that corporations can do much more with less. Hence, the rapidly accelerating move to take internal control of the corporate global supply chain. More specifically, control of process, digital assets, resources, and the brand message. Evidence of the shift can be seen in global corporations like P&G who in recent years consolidated their packaging prepress supply chain from hundreds of companies to only three. The ANA (Association of National Advertisers) committee for in-house agencies includes members from hundreds of the Fortune 1000. A Google search reveals many recent articles detailing the rise of in-house ad agencies. The drivers of this shift are affordable and effective new technology and the need for speed to market. The value of a middleman controlling portions of the marcom workflow has diminished. This does not mean that everything is being produced in-house, just internally controlled and managed by in-house staff who are defining new best practices for their agile enterprise. Many companies go back and forth between insourcing and outsourcing, but this time it is different. Companies are focused on process, and it is not just marketing, legal and business analytics, recruiting, employee services and even providing in-house healthcare. With change comes opportunity. Demand for business process management tools is growing rapidly. Many new companies are developing SaaS products to further enable the agile business. Online workflow modeling and business process management tools are becoming main stream. File sharing and digital asset management services are widely accepted. Integrating these services to meet the requirements of a project has never been easier now that RESTful APIs have become widely available. Artificial intelligence applied to big data analytics will provide the agile business with insights previously inconceivable. Best of all, the enterprise can securely access most SaaS services without making any upfront investments or long term commitments. At the core of the agile business is an integrated business process management platform. This is the tool that enables distributed process control. In-house is only practical when the technology enables the staff to do an order of magnitude more with less. BPM systems capture huge amounts of data that can be analyzed as a service in real-time. The ability to analyze any combination of process and behavioral data yields valuable predictive insights. Standards such as BPMN notation and the XPDL file format have allowed developers to simplify the user experience for defining, managing, and sharing process maps across BPM platforms. A virtual task can automatically serve up the tools the user will need. SaaS tools have one thing in common. They can be called through a RESTful API without the need for a software developer. The workflow can be configured to invoke access to tools based on the nature of the task. For healthcare workflows a digital radiology file format (DICOM Web) enables secure cross-platform viewing and collaboration over a patient’s scanned images and medical history. Business agile companies adjust to market conditions faster by adopting a culture of managed change. It is no longer acceptable to be so disconnected from your projects that you can’t even access your own brand packaging and promotion files. The same is true for legal, regulatory and compliance work. The agile company controls all of these processes. Their DAM enabled BPM system interacts with a SaaS reporting service like EZBI that concatenates and reports on data across distributed systems. Lean manufacturing and Six Sigma programs are used to configure these systems to monitor compliance to regulated processes. These changes are far more profound than may appear on the surface. The gig economy is fueling a virtual cottage industry that circles the globe. Project managers are increasingly in demand. This is not just an IT thing, every business runs on projects. The certified project management professional PMP is a new college certification. Rachel Burger in a Capterra article explained The 5 Biggest Project Management Trends Shaping 2018. In brief, “business agile” is the new way of doing business. A visit to the Fiverr.com web site will show how one SaaS service is bringing buyers and sellers of creative services together. This in-house trend is not just another swing of the pendulum. VIRTUOSO’S VISION |April 2019| 29
  • 32.
  • 33.
  • 34. Janrain: Making the World Identity Digital Solution providing companies are in the stage of improvising the data security of the internet users. Innumerable IT companies in the world have started providing the best solutions to their respective clients. A good Authentication Solution Provider company has to consistently improve the work productivity, IT infrastructure and a deep understanding of their clients expectation. Such solution providers carry a right approach and solve the client’s problem through its expertise. Janrain is one of the most trusted Authentication Solution Providers, which manages the most valuable assets of the internet users. Foremost Identity Entrants Janrain pioneered Customer Identity and Access Management (CIAM) and is recognized by industry analysts as a global CIAM leader. Its vision is to make a digital world where consumers will move seamlessly and securely between apps, web and mobile properties. Janrain Identity Cloud® provides identity solutions that enable seamless and safe consumer experiences across its digitally connected world; empowering identity-first brands with digital transformation and new insights, all while ensuring privacy and security. Also it has a cloud-native, SaaS solution that balances security, privacy and compliance while providing a frictionless experience which the consumers demand. The Janrain Identity Cloud is a comprehensively integrated suite, including registration, login/authentication, single sign-on (SSO) and access management - as well as regulation-compliant, consumer-controlled preference and consent management. Its SaaS hosted registration and authentication services allows to rapidly deploy new apps and web experiences while adhering to best practices for user verification and account security. The Janrain Identity Cloud is peerless in its ability to meet the customer identity demands of global brands. Its industry-leading infrastructure offers best-in-class availability across all regions. The Guiding Light Jim Kaskade is the CEO of Janrain and leads the company’s strategy, worldwide operations and vision. He is a seasoned entrepreneur with more than 31 years of experience in complex enterprise technology. Jim has created a client-centric culture at Janrain along with some core values which includes determination, change, attitude, teamwork, curiosity, expertise, transparency, accountability, respect and communication. Jim is a hands-on leader who stays ahead of market expectations for authentication, authorization and user experience and drives the team to exceed those expectations. The company’s founder is integral in the development of Social Login protocols which “If you need infinite scale at millisecond performance that is available 99.999% of the time, then you only have one partner to choose, Janrain” Most Trusted Authentication 1 Solution Providers 2019 The |April 2019|32
  • 35. consist of the ability for consumers to use their social media credentials to create accounts on websites and mobile apps. Social Login Authentication Janrain developed the concept of Social Login, which allows consumers to register and authenticate through more than 35 social networks such as Facebook, Twitter, Google, and LinkedIn. Today, users are also able to register through any OpenID provider. In addition to the long list of social logins and OIDC interoperability, the company supports username/password and SMS OTP authentication, and federation over SAML and OAuth. Today, Janrain serves many of the world’s recognized brands giving their customers unrivaled registration and authentication experiences and giving its clients the support, performance and availability they demand. Authentication Challenges According to Janrain’s long years of experience, the challenges that brands face is balancing the desire to have a simple on-boarding or registration experience for their customers against maintaining security and data integrity. In a nutshell, that’s the only solution it provides. Beyond the authentication part the company faces the question of how will these identities be managed? Janrain completely focuses on the entirety of the identity on how customers come on-board, how securely their data is kept, how easily they can manage their consents and how their experience can help its clients. The company’s cloud-based platform is designed to scale intelligently with spikes in usage, ensuring the best possible availability. The security measures it takes and accreditations it has received mark its lead in the industry. Janrain provides customers consent management options allowing the clients to exceed both regulatory and individual expectations. Also it provides identity resolution and customer activity insights that can propel the online or in-app experience. Analyzing the authentication issues Jim states, “Authentication has its challenges. But meeting those challenges is not merely a matter of front-end configuration or revising registration forms. It requires a platform that is built with the customer experience as its focus, with the scalability that high-volume brands require”. Scaling the Heights Janrain always continues creating secure and reliable user authentication solutions and it is willing to continue the same. The company has led the market in evolving from Social Login authentication to multi-factor authentication, biometric authentication and other forms of password less authentication. Eventually, Strong Authentication (in accordance with FIDO standards) will become the norm. Janrain had already supported these more secure authentication methods and willingly continues to help its clients. Jim shares his views on social login authentication as, “Social Login and traditional e-mail account authentication will continue to be the standard in the short term, but the next step is broader adoption of biometrics and multi-factor authentication”. Much of the authentication conversation is focused on the front end user experience. The additional challenges for high volume consumer brands are managing the data securely and maintaining an authentication process with flawless availability. The Janrain Identity Cloud is truly cloud native and it is designed to excel when there are spikes in traffic and even when there are regional outages. It also supplies additional layers of assurance to its clients. The company’s built-in fraud detection helps safeguard against fraudulent account creation and undesirable behaviors, while the Janrain Secure Edge offers best-in- class coverage against external attacks. From the front end to the back end, Janrain has mastered authentication. Testimonial “Our number of registered users has jumped 33 percent since we turned to Janrain. A smoother social login experience is a huge contributor to these improved results.”- Slate Jim Kaskade CEO Janrain |April 2019| 33
  • 37. Fleet management is an administrative task which allows organizations to co-ordinate with vehicles and drivers in order to maintain a smooth functioning of the fleet operations that too in compliance with the government regulations. Recent advancements in GPS technology have empowered fleet managers to improve efficiency, reduce costs and enhance driver’s safety in a hassle free manner. Here we have enlisted few of the advantages in detail which GPS technology has brought for the betterment of fleet management’s operations. Improve the Efficiency of Drivers GPS devices have the ability to enhance the efficiency of drivers and help save more money which any company requires to manage its fleet operations. This device can assist the fleet managers to know more about the driving pattern of the driver like: At what time a driver can drop the delivery? At what speed a driver can complete all deliveries? By knowing answers to such vital questions can empower the business owners to schedule each driver’s future weeks more effectively by focusing on individual driver’s driving pattern. The data which a GPS device transmit to the central device can further be utilized to gain some more meaningful insights utilizing data analytics services like EDITOR’S PERSPECTIVE |April 2019| 35
  • 38. deciding the better route, tracking traffic hit areas, deciding what materials to be sent and how among others. Adoption of such technology can empower both the drivers and the business to attain efficiency with elevated performance that too in lesser time. Keep Vigil like a Spy Data collected by the GPS device can provide many performance related concerns to the upper management like: At what time the driver has started his journey? Which different places the driver has visited during his entire journey? Where did he stop and for how much time? Answers to such vital questions can help the upper management to keep track of their driver’s work behaviour and assist in maintaining better efficiency in future. Moreover, to manage the health of a vehicle it is important that a driver move vehicle as par standard road safety guidelines or protocols, which is beneficial for maintaining the safety of drivers and longevity of vehicle’s parts. Using the benefits of GPS device and specialized software, fleet managers can get to know about various important things like: sudden accelerator pattern, driving pattern at the turn, speed breakers, and close residential areas, whether the vehicle gets use for non-work related activities, etc. and thus keep a strong vigil on their fleet operations like a spy. Moreover, by analysing driver’s speed, companies can keep track of the amount of gas required and number of times the vehicle has gone for a repair. Such things ultimately assist in reducing the maintenance cost, make vehicle’s resale value last long, and also reduce the speeding fines to a great level. Help Improving Drivers’ Safety In the past, when GPS was not in place, drivers used to work very much on their own space and schedules. Although, having freedom to do their work is not a bad thing but unnecessary wasting of time creates inefficiency which ultimately costs the company. Moreover, drivers’ safety is yet another concern which repeatedly creates tension on manager’s mind, since the drivers are more distracted than ever. In one recent study published by the Virginia Tech Transportation Institute discovered that truck drivers are 23 times more prone to fall into an accident than someone who is not at all distracted. GPS tracking can address such issues. Telematics, in-fact lets you know whether your driver has worn the seat belt or not and is there any unauthorized passenger in the vehicle. In such a way, it can help in enhancing the safety of your vital human resource which is needed to carry out your fleet operations. Enable Integration for Better Customer Experience Management, employees and the customers are the most integral part of any business. In-fact the end customers are the most vital aspect as it is from where all the money flows into the company’s coffers. Therefore, it is necessary to provide much better and more transparent services to the end user to create a much better customer experience where customers don’t need to call customer’ care to know about their delivery. It is thus important to provide real-time updates to your customers as well. Thanks to the recent innovations happening in the GPS integration technology, now fleet managers can integrate GPS devices using APIs to delight their customers and create a much better end-user experience. Such integration can show your customers where your service vans are with the help of map and reduce significant burden on your helpdesk executives. Another integration which revolves around social media is starting to take shape in fleet management. It lets followers know where their logistics currently is with the help of messages and provides a real-time update in a hassle free manner to the clients. Currently, fleet managers use accounting systems, CRM systems, and fleet systems to access more information. |April 2019|36
  • 39.
  • 40. Pradotec:Establishing Trust in an Interconnected World The world is hurtling forward at a tremendous pace. Digital transformation is molding the way we live, travel, and interacts. Perhaps most importantly, it is revolutionizing how individuals access their finances and how governments administer citizen services. Very few companies are at the nexus of technical proficiency, bleeding edge innovation, and decisive leadership to excel in this fast-paced arena. However, one Southeast Asian firm has already established a foothold here. It is forging a trailblazing path that will shape the ‘connected’ experience for millions around the world, far into the foreseeable future. That company is Pradotec. Impeccable Pedigree Pradotec Corporation Sdn Bhd (Pte Ltd) is one of the world’s foremost electronic identification, access control, and secure payments specialists. The hardware development and manufacturing company is headquartered in Malaysia but 70% of its revenue is generated internationally. While it was founded in 2007, Pradotec’s technical DNA is much older. It is an independent offshoot of IRIS, the company that developed the world’s first digital smart card in 1997, executed Malaysia’s ePassport program in 1998, and its Multi-Purpose National ID Card project in 2000. The company’s Founder, Dato’ Tony Lee Kwee Hiang is a veritable legend in the Malaysian computing sphere. Dato’ Lee began his journey into the world of technology almost four decades ago with a technical diploma. He went on to introduce Apple computers to Malaysia and was instrumental in establishing the country’s first computer manufacturing facility. Malaysian students learn about computing based on the ATOM1 syllabus Dato’ Lee designed. His achievements transcend national borders; Dato’ Lee’s invaluable contributions to Malaysia’s MyKad initiative created the world’s first chip-based multi-application identity card. This wealth of technical knowledge, practical experience, and an innate ability to foresee trends in technology give Pradotec the inspired leadership needed to dominate the industry. Diversified Excellence Pradotec has adopted an aggressive approach to diversifying its portfolio. Besides passports and eID documents themselves, it also develops and manufactures static and handled readers for such documents. The company’s expertise extends to biometric readers, mobile enrollment units, self-service kiosks, and ID printers, too. Having dominated the government services sector for so long, Pradotec is ideally positioned to bring its world- leading technological solutions to a variety of industry segments. “Peer-to-peer exchange transactions, a globalized society, and exponential increases in travel and border crossings have changed consumer behavior in terms of technology and how it impacts our identity and private life,” says Dato’ Lee. “If you create a car, you need to have roads for the car to be driven on. Ultimately, you have to also build these roads!” Most Trusted Authentication 1 Solution Providers 2019 The |April 2019|38
  • 41. Pradotec understands that its growth lies in being a part of every transaction made in this digital realm. “Our goal is to develop trusted technology that can be relied upon to secure the identities of everyone in the community, be it in the realm of physical or digital exchange,” he explains. The company is taking decisive strides towards this goal with its focus on innovation, trust, and stability. “These three factors define and characterize each product we create and every decision we make. Our intention is to meet the demands of both the government and the private sectors.” A Roadmap for Success Pradotec is keeping abreast of the seismic shifts that are shaping the government and private sectors, including increasingly popular innovations like smart technology and the Internet of Things (IoT). “My vision for Pradotec revolves around two key principles,” reveals Dato’ Lee, “Firstly, to become a global brand and, secondly, to deliver capabilities that matter just as much in the future as they do today.” Dato’ Lee’s has a cohesive plan to make that vision a reality focuses on innovation driven by authentication, integration, and sustainability. The Dato’ expounds, “Authentication involves the use of embedded software to verify that a person or source is who they say they are. Integration comprises a range of techniques that combine various identification roadmaps into a single, trusted information highway. Sustainability refers to our core design principle that aims to prolong the relevance and value of our products across traditional limitations of time and space.” The competition is intense at the elite levels of any industry and the verification and eID ecosystems are no different. However, Pradotec has at its disposal a key advantage that its competitors do not – a holistic suite of products and services. Most authentication specialists are completely software- driven. Their products have to be integrated into externally- produced hardware before they can be utilized. This discontinuity can potentially be the root of both incompatibility issues and security breaches. With Pradotec, this situation does not arise. Their organically-developed symbiosis of hardware and software is unrivalled. In fact, companies that would otherwise be competitors often turn to Pradotec as customers of their products. Pradotec regards a recent ASEAN Defense Ministers’ meeting, which emphasized the need for biometric hardware to manage information in the fight against terrorism as the ideal opportunity to press its advantage internationally. Crafting the Future The world is witnessing a steady and inevitable shift from physical to digital solutions in every aspect of technology. The Internet of Things, Augmented Intelligence (AI), and the transition to the Cloud provide versatility, speed, and convenience hardly imaginable not long ago. With this change comes an increased potential for lapses in security. Dato’ Lee anticipated this and his efforts at Pradotec have focused on creating systems that are designed to address this inherent deficiency. Another pressing need for security exists in the nascent world of smart, interconnected living. We already hear the term “smart cities” but Pradotec realizes that these cities will arise out of interconnected facilities. It is only when a network of smart facilities are interlinked will the smart city appear. Pradotec is already developing secure systems for the IoT and for access and identity management. These components will form the backbone of the smart complex, however large or small. The myriad developments will lead to what Pradotec calls “One Identification”. The One Identification concept will be an individual’s gateway to every government service and every private transaction they require. Through its clients, Pradotec will deliver faster, smoother transactions devoid of traditional bottlenecks. The future looks bright indeed. Dato' Tony Lee Kwee Hiang Founder Pradotec Corporation |April 2019| 39
  • 42. Chief Operating Officer Mark rees Secucloud GmbH |April 2019|40
  • 43. C an one learn leadership? Every winter semester I pull my students through the whole spectrum of “Leadership Theory Parts I and II”: Taylorism; French & Raven; Blanchard; McGregor; Maslow et al. At the end of the semester I have them test their knowledge in a tricky exercise involving a climbing rope and blindfolds. They have to – whilst blindfolded – form, storm, norm and perform as a team and lay the rope (which they are not allowed to let go of) in a predetermined shape on the ground. And yes, they always achieve the objective – one way or another. In contrast I have experienced this exercise as a team member of highly paid and experienced managers and witnessed first-hand the utter failure to even manage a plan, let alone achieve even half of the objective. Although to be fair, what the managers did achieve (as opposed to the students), was a whopping great conflict of personal differences, with which the rest of the seminar was used to sort out. So what was the difference between these two groups? A business acquaintance of mine once introduced me to the “power of trust” as a basic concept of leadership. He argued that if there is no trust between the leader and the led, then the possibilities for sustainable leadership are extremely limited and indeed most probably restricted to a short period. Without trust in human relationships there is however a form of leadership and to reference French Leadership skills essential for organizational growth and Raven, it is the positional power of coerciveness and reward – the proverbial carrot and stick. That works for a while as long as the (micro) manager exclusively owns the processes and information as a means of control. I believe in the long run, this strategy fails. No (high performing) employee deliberately hangs around for very long in such a situation. I’ve seen this happen numerous times. Again considering the group of students and the experienced managers with their climbing ropes and blindfolds, what I perceived was extreme differences in levels of trust. The students – in their seventh semester – were close-nit. They were just entering their final thesis, they have common objectives and after 3 and half years spent on campus, an intrinsic trust to one another. In contrast the managers came from varying business units of a large company and were “thrown” together to improve their leadership skills and develop as a leadership group within the company. Each manager had his (the group was all male) own agenda and personal career objectives etc. Each was competing for power and influence before the board. Instead of collaborating to achieve the climbing rope objective, all the micro- politics came out in the exercise and trashed any trust that might have been there at the outset. The evening log fire at the beach was a flop. Trust is the key for sustainable development of organizations MENTOR’S STANDPOINT |April 2019| 41
  • 44. Trust as a subject is rationally difficult to grasp. It is one of those things we intuitively feel as being present (or not) in human relationships. To get a grip on the term, let us start with Peter Drucker’s definition of management “turning resources into production”. Now consider that what leadership does in a company is to apply strategies (resources) to achieve objectives (production). On the one hand the objectives should be such that they inspire people, bringing out their best qualities both in skills and collaboration. Secondly and as a rule, it is the leader who drives the strategy in order to achieve those objectives and this is the key area where trust within the team and across teams can emerge. It is the means utilized to achieve the ends that define so much about an enterprise. There are of course coercive means, non-compliant means, even illegal means etc., thus the old excuse for bad behavior “the ends justify the means”. In such an environment sub groups form, secrecy becomes endemic and there can only be mistrust and suspicion between people. Approaching the skill of leadership whith consideration of social and ecological factors allows decisions to be made under the reflection for example, of waste reduction, for the good of the many, for sustainable growth etc. In utilizing social and ecological factors in decision-making processes, our unique human form of emotional intelligence is an influential force that significantly influences behavior both of oneself as a leader, and as a member of the collective (the business unit being led). Over time common values and understanding emerge in the group, which in turn develop (forms and storms) and fortifies the culture (the norms), thus producing the high performance unit that every person blessed with the opportunity to lead can aspire to. If you get there it’s the best job in the world! Trust is a human trait that is available to us all. You can´t simply buy it by attending a leadership seminar, doing an MBA or reading a book. Trust has to be earned and shared unconditionally as a gift. It can be rejected, withheld, it is breakable and can be destroyed in a second. Yet for all its non-tangibility and fragility, it has more power to achieve than anything else in the leadership toolbox. About the Author Mark Rees is the Chief Operating recfO at Secucloud GmbH, Hamburg. In his last position Mark Rees was Managing Director of E-POST Development GmbH in Berlin, a subsidiary of Deutsche Post. There, he led an international team comprised of several hundred employees in agile DevOps development teams, and was responsible for employee direction, as well as the entire budget in the areas of IT security, DevOps, quality assurance, operations and user experience. In his work as COO at Secucloud, Rees applies his expertise in agile leadership and his many years of experience in interdisciplinary IT organizations in the Media and IT security industries. |April 2019|42
  • 45.
  • 46. Signicat: An Innovative Digital Identity Service Provider Based in Trondheim, Norway, and founded in 2007, Signicat operates the largest Digital Identity Hub in the world, offering the only complete identity platform in the market and trusted to reduce the burden of compliance in highly regulated markets. The company is a leader in verified digital identity, making it possible for organizations to securely onboard and authenticate new and returning customers. Signicat is dedicated to innovate in the areas of electronic identity and signatures, and to offer customers, solutions that enable them to offer their products and services in new and innovative ways. Signicat is the winner of the International Identity Deployment of the Year Award and Best Innovation Award at the Cards and Payments Europe Awards. Signicat’s solutions are used by banks and financial institutions, insurance companies, government agencies and large corporations as well as small and medium sized businesses. Customers trust Signicat with the responsibility of authenticating users, providing electronic signing, identity proofing, and document preservation. Signicat’s vision is to be the preferred provider of electronic identity services to customers in regulated industries across the world. The company has a local presence in Norway, Sweden, Denmark, Finland, Germany, Portugal, United Kingdom, and the Netherlands. These countries are in the forefront in the world with the usage of digital identities and electronic signatures. Dynamic Solutions With Signicat, service providers can build and leverage existing customer credentials to connect users, devices and even ‘things’ across channels, services and markets transforming identity into an asset rather than a burden. By ditching manual, paper-based processes and replacing them with digital identity assurance, customer on-boarding is accelerated and access to services is made simple and secure. Signicat’s Identity Hub is a complete solution that offers compliance and a route to better customer engagement. Its solutions fulfill operational capabilities in “Our vision is to be the most comprehensive provider of electronic identity services to customers in regulated industries across the world.” Most Trusted Authentication 1 Solution Providers 2019 The |April 2019|44
  • 47. line with international standards and requirements, such as Privacy, Anti-Money Laundering (AML) and Anti-Terrorist legislation and regulations, as well as Know Your Customer (KYC) requirements for onboarding of new users. Company has over 400 financial services organizations as clients, connects to more than 20 schemes globally and verifies more than 10 million identities per month. Personifying Expertise The Nordics are well respected for their adoption of verified, reusable digital identities, by being able to have a single, verified identity to access government, bank, and other services online. This approach was pioneered a decade ago, and Gunnar Nordseth, the CEO of Signicat, is one among the handful of executives in the world, who has been in this industry for its entire journey. Gunnar has helped shape this industry through its founding and subsequent maturation. He is now helping to shape the next phase of this industry by leading a push to provide cross-border identity across Europe and beyond. Implementing the Lessons Learnt The team at Signicat has learnt many lessons among which one of the key lessons was the power of reusable identities. One of Signicat’s customers named Komplett, a large online retailer in the Nordics, realized that by using verified digital identities, it could not only authenticate its customers quickly, but also could deliver credit services to its customers. Th is was so successful that Komplett was able to open its own bank to service its customers. Additionally, Signicat focuses on regulated industries with which it learnt that there is a need to take a highly customizable approach while delivering solutions to its customers. Each organization, in each market, requires unique functionality and so it has developed its platform to ensure it can quickly respond to unique requests to meet the needs of the regulated businesses. Overcoming Hurdles As Signicat deals with regulated industries, it faces new regulations, compliance requirements, and cultural requirements quite frequently. The addition of new technologies (smartphones, smart watches, etc.) further requires flexibility. It tackles these problems by working with some of the smartest technology providers out there, as well as its experienced team. It continues to innovate around authentication, with biometric authentication which is a large focus area for the company currently. Signicat is also able to integrate technologies into its platform to ensure its delivery of cutting-edge authentication offerings. Future Insights As per Signicat, Biometric authentication is important for the future, as is pattern recognition and more generally AI and data analytics. More and more mobile devices will be the key to authentication and Signicat will be able to use the various sensors within these devices to help ensure the user is who they say they are. The firm is exploring technologies such as gait analysis, movement user patterns, the way users hold their devices and more as examples of potential authentication data sources. Signicat’s goal is to enable customers to do business more effectively by delivering great user experiences for the end users and at the same time reduce the risk by using advanced security technology. Gunnar Nordseth CEO Signicat |April 2019| 45
  • 48. 5 INTERESTING CATEGORIES OF ‘GPS TRACKERS’TO TRACE LOCATION G lobal Positioning System (GPS) which was originally envisioned as a military project to assist guiding missiles to target the key objects more precisely and accurately has now been utilize by citizens (directly or indirectly), and businesses all across. It has become a vital thing which is needed to carry out day-to- day operations in many verticals. Today, this technology is benefitting many individuals and businesses to navigate and track their objects in a hassle free and timely manner that too with a single click of their electronic gadget. GPS has already spread its deep footprint in automobile navigation systems, mobile phones, and timekeeping systems and is ready to make a far deeper impression in some other sectors in coming times. However, many people do not exactly know the different types of GPS trackers available in the market, their usage and working pattern. Here we have clear those confusions and come up with interesting details concerning various types of GPS trackers. Personal Tracker Gone are those days when people used to stick posters of their lost pet in their nearby colony. People now-a-days are using personalized tracker to monitor their pets. GPS-equipped collars have replaced ID collars which have been in use for a very long time. What’s interesting about these GPS-equipped collars is that it can be remotely monitored with the assistance of a personalised device. Moreover, such tracker is also gets use to track human beings with the help of pocket chip or bracelet. Such device provides a huge peace of mind since anyone can find their pets and even the close ones without taking the help of anyone and that too in a very quick time. Asset Tracker Many people got confused between a personal tracker and an asset tracker. Although, there is a very thin line that differentiates these two, but both are completely different as per their use. An asset tracker is use to track any non-vehicular item with the assistance of a small radio chip to a large satellite tags. Largely, supermarkets use such trackers to find their stolen or lost item. For example, previously, supermarkets use cart blocking barriers to prevent it from getting stolen or lost but/since that process was time consuming which also demands extra manpower to manage those numerous shopping carts, supermarkets have now switched to using asset trackers. Interestingly, by using such tracker in their carts, supermarkets have witnessed a significant drop in the share of their lost or stolen carts. And even of that get stolen, the rate of recovery is quite high. This is what the real benefit of using an asset tracker. Moreover, such trackers also provide some extra benefits to a business rather than just tracking or recovering a misplaced or stolen shopping cart. These trackers also have the ability to identify the items placed inside the customer’s grocery cart. By analysing such data, a business owner can find interesting details like customers buying pattern, buying frequency among more. And can then effectively plan a customised marketing plan focusing on an individual customer’s shopping habits to boost more sales in the future. Cell-based GPS Vehicle Tracker There was a time when delivery companies used to call their drivers to know the exact position of their vehicles and |April 2019|46
  • 49. keep themselves updated on regular intervals. Especially those delivery companies who transport precious as well as vital objects like gold, metals, cash, and other items. Such companies were under uncertainty and tension regarding the safe delivery of their goods till the time its reaches safely to the destination. But with the introduction of Cell- based GPS vehicle tracking, that worry has reduced to a minimum level. Such devices capture data from the device and then reports that data back to the business operator with the help of cell phones towers. What’s interesting about this device is that as compared to a satellite tracking, cell-based vehicle tracking costs less and reports faster to the business operator. This is one of the reasons behind its huge popularity in the vehicle-tracking segment. Satellite-based GPS Vehicle Tracker What if your vehicle moving through a remote area which does not have cell towers for long distances, gets lost? Would you be worry? Definitely yes! Then what is the solution. The answer is Satellite-based GPS vehicle tracker. Since, the Satellite-based GPS can be able to track a vehicle no matter from where it is moving (remote village, dense forest, hilly regions etc.), it can sends regular updates to the owner even from the location where cell phones do not work or the area which does not have cell tower present in nearby areas. Cellular-based Tracker Don’t get confused between Cellular-based Tracker and Cell-based GPS Vehicle Tracker. Both are different in their application of usage. Let us clarify with an example. What if you are into a logistic business, have plenty of warehouses but no vehicle. In such cases many times it happens that the third party who handles the transportation operations does not get convince to install a GPS device into their vehicle. In such scenario Cellular-based Tracker gets use, since it only require to install the business app into the driver’s cell-phone and no other devices in the vehicle. As the vehicle moves, it sends the location information to the owner without installing an in-vehicle tracking device which is required in Cell-based GPS Vehicle Tracker. This is how a Cellular-based tracker can assist in your business operations. TECH CONCERN |April 2019| 47