Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future-readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient, and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
an environment without disrupting end-user
2. Automated Onboarding, Identity
Verification and Strong Authentication
are all needed by future readiness
businesses that demand rapid
evolution for their businesses
transformation and growth.
These 3 features form the core in
hyper volume-velocity with remote
working and BYO-focused workplace
for every business too. End users and
employee as understand the need for
efficient solid identity verification
security, but they expect technology
to be simple, convenient and fast.
With decreased visibility and
increased complexity, IT is more
challenged than ever to manage
authentication across a hybrid
environment without disrupting end
users.
What is wrong?
3. of businesses worldwide have been reported and
experienced data breach and identity theft. When poor
onboarding, verification and passwords cause these
81% of data breaches, it’s clear that only old world
Even though 52% of businesses have implemented
two factor for at least remote access, it is a great
starting point, but a one-size-fits-all authentication
approach does not work when users have
different behaviours, personal devices, levels
Identity Verification is one of the biggest pain
points for businesses. About 65% companies have
experienced inside breach with 92% consider
rogue insiders and poor access security to be one
of their main concern in coming 5 years.
From background check of employees,
vendors, contractors to end customers needs
to be dealt with best onboarding with
maximum identity verification policies and
checks in place.
Why consider verification and authentication
separate? Right now, security itself is too
81%
Onboarding with weak authentication (like passwords alone) won’t
protect your business’s reputation, applications, data and users. How can
you ensure critical information is secure and accessed by trusted ones,
without adding friction and huge cost?
52%
of access and attributes. There have been attacks where 2FA is
bypassed and hackers was tricked users to give away their credentials.
65%
92%
fragmented which leads to gaps and holes (that hackers and rogue
elements) abuse to get inside and cause harm.
4. Axiom Protect 2.0 (AP2) Platform protects
your business with automated onboarding,
solid identity verification, adaptive and
absolute authentication covering secure
biometric authentication and data
protection while simplifying the multiple
applications integration and finally offering
easy login experience for not just employees
but also end users.
AP2 ensures the right users are onboarded,
right users are accessing the right data at
the right time, without any added
complexity across web, mobile, future and
legacy applications along with VPN and
workstation. With a unique security by-
design model, AP2 ensures all identity and
authentication data remains private and
secure, while leveraging on adaptive and
contextual factors to identify and
authenticate users.
AP2 offers future ready beyond multifactor
experience along with data protection that’s
easy for admins to deploy and effortless for
customers & employees to adopt.
www.axiomprotect.com
Let’s Fix it together…
6. Most methods don’t really
provide much identity
assurance, automation or
transparency. Businesses can’t
trust that someone is who they
claim to be. Multiple
applications with different need
to eliminate maximum manual
and paper driven customer
acquisition and onboarding with
best security, validation and
verification is needed;
Plus complete data ownership
and process control with policy
enforcement .
Axiom Protect 2.0 brings you
completed technology stack to
help you achieve your dream
onboarding with your own
branding.
How certain are we that the person
behind registration and login is who
she claim to be?
7. Identity Biometric With
Document Verification
AP2 offers web and mobile plug and play SDK and
APIs as well as standalone identity verification
app gives 80% process automated with 98%
biometric accuracy including 3D liveness
detection. Secure Remote Self or Assisted
onboarding with facial recognition with liveness
detection (static and dynamic) along with
compare images on user’s identity documents
(IDs).
Data Ownership & Security
Unlike other solutions, AP2 does not use any
3rd party online OCR, Biometric, Video Call
and more services. Ap2 offers complete
100% data control and ownership. Data
encryption, watermark and masking to
protect all identity pictures, documents and
videos to eliminate insider threat and data
breach. Completely offline, on-premise or
private cloud ready.
Video Call, Out of Band
Authentication
KYC expert’s live assistance for your
customers/businesses to eliminate identity fraud
with online verification and highly instrumental in
resolving KYC/AML compliance issues. Strong
Authentication through Email, SMS and Voice Call
along with In-App Push based Consent
Note/Video call with device telemetry ensure
authentic and authorized user.
8. Consent Note & Handwritten
Signature
Handwritten signature along with written
consent statement on paper authenticates
legitimate customers in real-time and detect
handwritten Date, Place, Name even for real
time check. Solid features for self service KYC
with AI assisted data checking.
Limitless & Flexible
From KYC for retail to KYB for insurance or
commerce Or Crowd Sourcing Contextual
correlation between multiple documents
coupled with real time location, device and
behavior checks with predefined points for all
touchpoints. Fast multi language Intelligent
on-premise OCR gives cross documents (e.g.
Driver License, Passport, Utility Bill, Bank
Statements) authentication of data like
address, name, DOB checking. Re-KYC is
available between multiple intra and inter
departments for their multi applications.
Fake OR Real Checks. AML/PEP
Checks.
In less than 3 seconds, AP2 detects if Rainbow
Check for document authenticity, photoshop/
Fake/Manipulated? It also checks for
Presentation Attack for Selfie. Also
Government ID checks along with real time
screening for high-risk entities through our
exhaustive dataset of 1700+ global watchlists,
PEPs and sanction lists Prevent potential
financial crimes One time or Ongoing Options
9. Secure Dashboard, App, Report
Regulation/IT Compliance Auditor may demand on-premise or private
cloud deployment with dedicated mobile and web app with end to end
data control. AP2 gives dockized microservice based solution with white-
label web and mobile app option for rolling out your assisted or self KYC
with policies and profiles configuration. PDF Signed Report for each
application can be published to other systems and with web APIs any
other system can integrate for KYC, REKYC, Data Sharing.
High Velocity & Volume
Handle ‘000s clients per day where end
customer will use web/mobile app with self
service the Identity Verification Steps (selfie,
Documents, Consent, Signature etc.). Face
matching, OCR, Fraud Detection, AML/PEP API
and maximum technology used to automate
the process.
Agent / Assisted Service
End customer engages with agent
over recorded video call or in person.
Superior, Face to Face Verification
(with all documents, Q&A, OTP,
Consent, Signature and more). Again
Face matching, Real time QA,
AML/PEP Check can be done with
human decision making. This caters
Low Volume, Low Velocity, Solid
Against Fraud.
10. Multi Systems, Single KYC/KYB Source
100% On-premise With Features
1 Alive & Match
2 Facial Biometric with ID Matching and PAD Protection
3 Identity Proof With and Without Video Call
4 Mode – Self/Assisted/Point based
5 Documents With points scores
6 Own Domains with multiple apps
7 Location (geo and IP based)
8 OCR (English and non English) with MRZ
9 End to End Data Security (at transit & at rest)
10 Bank Agent And User Management
12 External ID Check + AML / PEP Check
13 Hand Signatures
14 Water Marking Documents And Videos
15 Audit Report And insights
16 3rd Party Push and Pull Captured App
17 External Authentication
18 RedAct / Mark Data
19 Fake Documents Detection
20 Speech To Text
21 Inbuilt MFA Security enablement
- OTP with Hand Signature
- Alive & Mentally Stable?
- Proof of Identity & Address
- Location & Device.
- USD 1 Transaction.
- Create Policy
- Assign Agents
- Integrate
Workflow
- Invite Users (self
or agent)
- OCR Extraction.
- Biometric Matching (Facial and Voice)
- Speech to Text OTP Validation
- USD 1 Transaction Matching (Name &Account)
- Enforce Policy & Score Application.
- Operator Call Verified (Record)
- Acquired & Welcomed
- Default Role & Risk Profile
- Agent Performance
- Insights And Forecast
- ROI and Profit Reports
Rejected
12. Axiom Protect 2.0 Multi Factor
Authentication is off-the-shelf intelligent on-
premise or cloud-based authentication,
authorization (MFA) service that enables
your business to provide extraordinary
customer experiences that balance user
convenience with security and cost.
With Axiom Protect 2.0 MFA, your
organization can embed MFA directly into
your mobile/web application, enabling your
customers to easily and securely log in from
their trusted devices. It offers simple and
convenient authentication methods like
adaptive authentication to offline One time
password or push notification from custom
apps, SMS and email, and can enhance the
end-user experience through advanced
authentication policies.
Intelligent AI powered insights and risk
engine prompts customer to re-
authenticate only in high-risk or high-value
situations, such as approving a transaction,
you remove unnecessary friction without
sacrificing security.
Identity Protection is a complex
problem. One size does not fit all.
How do we solve it?
13. Extending EKYC
Only platform that brings EKYC customer
onboarding into complete adaptive and
absolute MFA. Once EKYC approval
happens user is issued with multiple
security attributes like push, offline OTP,
biometric and digital certificate and
adaptive profile. From this point, you use
varied authentication type across multiple
applications and associated risk policies.
Frictionless Adaptive
By combining user behavior, telemetry,
biometric, risk policies and contextual
intelligence, Ap2 MFA proves a user’s identity
protection by offering frictionless yet secure
experience. Adaptive authentication bring
“what you do?” and “what you are?” for web
and mobile applications with unified AI
powered decision making that adapts over time
where ‘000s of users are present.
Absolute Authentication &
Authorization
Gives 100% assurance for strong MFA factor. It can
be Push based Verification, Offline One Time
Password, QR code based Challenge Response
Signature Code coupled with AP2 Security
“Mobility Trust Plus” factor coming from device
with its location and telemetry. World’s only
security token that is for web and mobile to help
any and all application with MFA. It works
beautifully with KYC onboarding and adaptive
authentication.
14. Passwordless
Authentication
Delight your users with a frictionless,
passwordless user experience that’s
smooth and effortless. Our solutions
are equipped with the latest, ready-to-
use, FIDO2 technology which ensures
an optimal user experience and strong
authentication using biometrics. AP2
supports biometrics authentication via
FIDO2.0, delivering standards-based
support via technologies like Windows Hello, TouchID, FaceID, and
more. Additionally, AP2 can integrate with third-party technologies that
support biometrics through SSO and API integrations.
All-in-one (cloud/on-
premise) Security
With support for cloud, mobile, legacy,
on-premise apps, VPN and workstation,
AP2 MFA manages authentication for
every critical business application from
a single interface. All data is encrypted,
masked at the device level and never
leaves the user’s device.
. Using biometrics and adaptive
authentication, LastPass MFA can
eliminate passwords and streamline
employee access to work applications
to improve productivity.
Moving Towards Zero Trust Maturity
Identity, role management coupled with Adaptive Workforce with risk
based access policies and continuous and adaptive authentication and
authorization. Frictionless access to different applications and resources
is the next step and AP2 offers ZT journey.
15. Enhance Existing Authentication workflows
AP2 MFA can send push notifications—the most secure and convenient
multi-factor authentication method—during web, mobile web, call
centre, face-to-face, high-value transaction or other customer
interaction. By adding MFA to your native mobile app, you drive
Embed MFA into your app
You can embed multi-factor authentication
capabilities natively into your own iOS & Android
mobile along with mobile web and pure web
applications. This allows you to deliver convenient
and secure MFA to your customers, without
requiring them to download a separate
application. And, device authorization behind the
scenes can provide an additional layer of security
without introducing friction when a user logs into
your mobile application, resulting in a seamless
authentication experience.
Automate more with advanced policies
Apply advanced authentication policies that use context to prompt
customers for MFA only in certain situations, such as when they haven’t
authenticated recently. Additionally, when using AP2 MFA with AP2’s risk
engine to leverage risk-based policies that evaluate several signals,
including IP reputation, geo, device, anomaly detection and impossible
travel/change in time , to determine if the customer is in a scenario
requiring MFA.
application adoption.
Additionally, AP2 MFA augments
your existing authentication
workflow. Customers who have
your app benefit from additional
MFA security, while customers
who don’t have your app aren’t
required to download it and
instead can utilize TEXT and
email authentication methods.
16. Multi Apps-Devices-Users Token Wallet
AP2 is the only platform that allows multi users multi devices including
mobile & web. In addition, white label with own branding gives you
complete control and trust to your customers. This offers extra
security shouldn’t be a blocker in workflow productivity. Ap2 MFA
secures every access point – from legacy to cloud apps, VPN and
workstation. It authenticates users seamlessly across all their devices,
for flexibility in how your organization manages authentication.
AP2 MFA caters for multiple different custom applications with their
unique and specific requirements.
- ‘000s Mobile + Web Users
- Onboard Customers
- Risk based Frictionless Auth.
- B2B Server Data Security
- Usage Reports
- Behavior / Forecast Insights
- VPN, Wifi And VDI Security
- Software 2FA token
- Active Directory Sync.
- Self Onboarding
- Policy Based Access
- Radius Interface
- MFA With Single Sign On
- Multiple Applications Single User
- Data Tokenization for Server To Server
- Embed Video With Facial And Voice
- Mobile Data Security
- Document Parser for Data Extraction
- Agent EKYC Onboarding.
- Digital Certificate Issuance.
- ESIGN Documents And Forms.
- Mask/Redact Sensitive PII Data
- Issue User And Application Certificate.
- HSM based key management
- Migrate Old Hardware OTP Token
- Data Encryption (over HTTPS).
- Handwritten signature matching.
- PII documents OCR Extraction.
- Share User Data With User Consent
- Multiple 3rd Party Applications Single User
- Token Wallet (SMS, Mobile, Certificate)
- Policy Enforcement
- Identity Verification
- MFA Enablement
- Adaptive Profiling
- Pre Screen Request
- Create New Onboard
- What you know.
- What you have.
- How are you.
- Plus Factor.
- Beyond Plus Factor.
- Application Policies
- Roles & Authorization
- Audit & Accounts
- Insights And Forecast
Sharing Identity with
Other Application
17. 100% On-premise With Features
Applications
Consolidating Multiple
Applications/Systems
Groups
User Grouping with
default profiles
Policy Settings
Enforcement And
Controlled Administration
Password
LDAP Synchronized /
Inbuilt DB / Ext. Source
Q&A
Based On Document
OCR, LDAP or Ex. Source
Dynamic Image
User Defined Color +
Text Image
One Time Password
OATH TOTP Mobile, OOB (SMS,
Email), 3rd Party Hardware
Google Token
Support for Google
Authenticator OTP Token
Geo Fence
User Location, White/Black
List Macro to Micro
Radius Service
Inbuild Service to support
popular network devices
Trusted Device
Single To Multiple
Devices vs Users
Digital Certificate
User, App, Server
Certificate Management
Push Notification
Zero Cost, Reliable
Large Data Duplex
Signature One Time Password
Mobile,3rd Party Hardware
OCRA Time Based.
Tokenization
Consolidating Multiple
Applications/Systems
PDF Security
Sign, TimeStamp, Password
Protect, QR Embed
Data Protection
Data, Database, File
Encryption And Signing
Single Sign On
Authentication +
Authorization Consolidation
Facial Biometric
Extract, Register, Recognize,
Authenticate, Relearn
Voice Biometric
Extract, Register, Recognize,
Authenticate, Relearn
Hand Signature Biometric
Extract, Register, Recognize,
Authenticate, Relearn
Risk Based AuthN
AI/ML Powered intelligent
Anomaly Finder
intelliOCR
Smart Face, Signature, MRZ,
Contextual Data Extractor
Audio Video
Secured Audio Video Calls
Recorder + Watermark
IntelliMask
Images as well as True PDF
Sensitive Data Mask/RedAct
intelliParser
Extract, Register, Recognize,
Authenticate, Relearn
STT Extract
Speech To Text On Premise
Extraction & Analyzer
E-Sign
True MFA enabled E-Signature
with Biometric AuthN
ROI Insights*
Predictive Usage As well as
Performance Insights
Threat Insights*
Global STIX/TAXII With
Local Systems Feed
Adaptive AuthN
User Behavior coupled
with Risk & System Policies
18. At the end…
Cybersecurity is a fascinating discipline at
the intersection of technology, policy and
business. It is Vital Discipline to the 4th
Industrial Revolution.
- Cybersecurity is a competitive differentiator
- You are part of the solution
- Cybersecurity is a process
- Cybersecurity is possible
- Cybersecurity is a positive word
Blue Bricks over last 7 years have worked with large
enterprises in BFSI, Public & Private sectors,
government agencies to protect millions of users,
and hundreds of applications with 99.9% protection
with high aggressive velocity and volume.
Axiom Protect 2.0 is here for you to help you own,
control your data, privacy and security without any
3rd party. We are here as your partner to bring
cybersecurity as vital discipline.
www.blue-bricks.com
www.axiomprotect.com