SlideShare a Scribd company logo
Qafis
Finger Finger Vein Face Eye / Iris Palm / Vein Voice ID Card /Smart Card
Biometric Technology as Security
Copywrite: Qafis Holding | Confidential
Welcome
Meet Fintech Day
Amsterdam
May 26th, 2016
Copywrite: Qafis Holding | Confidential
Todays world - Security issues
Some vulnerabilities discovered after years of use.
Hackers use third-party vendors for their attacks.
Attackers have
been exploiting
separate zero-day
vulnerabilities in
Internet Explorer
and the Flash
browser plug-in
software.
Researcher Hacks
Symantec's AV Via
Email Just receiving
an email is enough,
no need to open or
read it.
Flaw is fixed.
http://www.databreachtoday.eu/researcher-hacks-symantecs-av-
via-email-a-9109
http://www.databreachtoday.eu/zero-day-attacks-pummel-ie-
flash-a-9093
http://www.databreachtoday.eu/swift-to-banks-get-your-security-
act-together-a-9099
$81 Million Bank
Hack
SWIFT has issued its
first-ever information
security guidance to
banks, telling them to
get their act together.
Some of the
banking industry's
top executives are
concerned that
hackers will
continue to attack
the global financial
system by breaking
into smaller banks.
http://money.cnn.com/2016/05/18/technology/hackers-smaller-
banks/index.html
Copywrite: Qafis Holding | Confidential
Mobile Security Issues
Learn the New Threat
Vectors Putting Your
Mobile Banking
Customers at Risk
A security researcher
could have stolen as
much as $25 Billion from
one of the India's biggest
banks ‒ Thanks to the
bank's vulnerable mobile
application.
http://thehackernews.com/2016/05/indian-bank-hacking.html
http://www.databreachtoday.eu/webinars/learn-new-threat-
vectors-putting-your-mobile-banking-customers-at-risk-w-777
A Samsung Galaxy S6
and a Huawei Honor 7
were unlocked
successfully using a
fingerprint printed using a
standard inkjet printer
loaded with special ink.
https://www.linkedin.com/pulse/samsung-huawei-fingerprint-
scanners-can-fooled-using-inkjet-mirza
Hack of four big Australian
banks through app’s.
Stealing two-factor SMS
codes, forwarding the code
to hackers while hiding it
from the owner of the phone.
Thieves can bypass a bank's
security measures to log into
the victims' online banking
account from anywhere in
the world and transfer funds
http://www.access-vs.com/#!blog/u0f37/category/Mobile
hacks
Copywrite: Qafis Holding | Confidential
Most hacks take minutes to do and weeks to discover
Most companies sit on cybersecurity breaches for weeks before they're discovered, while they
take hackers only minutes to perpetrate.
In 93 percent of cases where data was stolen, systems were compromised in minutes or less,
according to a Data Breach Investigations Report.
But in over 80 percent of cases, victims didn't find the breach for weeks or more.
Criminals are getting better, faster and nobody
on the defensive is getting better fast enough.
There's no such thing as an 100% secure system.
Qafis has always been focusing on how to
improve the quality of security with
biometric solution implementation, upgrade your
security with biometric technology, it’s the future
of computerized identification.
Copywrite: Qafis Holding | Confidential
MFA and Biometric Solution
The goal of MFA is to create a layered defense and make it more difficult for an unauthorized
person to access a target such as a physical location, computing device, network or database.
If one factor is compromised or broken, the attacker still has at least one more barrier to breach
before successfully breaking into the target.
Qafis can authenticate an identity in three ways:
1. by something the user knows (such as a password or personal identification number),
2. something the user has (a smart card, ID or passport) or
3. something the user is (a physical characteristic,
such as a:
a) fingerprint,
b) face,
c) iris
d) palm,
e) voice,
called biometrics) Biometric system on Card, it makes the difference
Copywrite: Qafis Holding | Confidential
Advantage of a Biometric Smartcard
Biometric system on Card, it makes the difference.
The Biometric Smartcard combined an Identity in three ways, something the user:
1. knows,
2. has,
3. is.
Banking and Finance Identity Card Healthcare Card Company Access Card
When data is stored (encrypted or not) on the device, like a Passport, ID card, smart cards with
or without biometric device, phones or tablets, hackers have the possibility to re-create, or
replace the biometric data.
Qafis R&D team says this about biometrics: "if you can make it you can break it, maybe not
today, but you can't predict the future.“ Our goal is to limit the information the hackers can obtain.
Copywrite: Qafis Holding | Confidential
When identity thieves have access to biometric data and cyber security experts announce
that obtaining biometric data is the worst aspect of theft, then we need to
reconsider our security protocols.
Combined Stored data
Copywrite: Qafis Holding | Confidential
Qafis Secured Solution
Keep it safe with separate stored Biometrics!
Customers Credentials Biometric Database
Copywrite: Qafis Holding | Confidential
Biometric System.
Qafis creates a extra layered defense using biometric technology in a separate stored database.
Why a separate Biometric database?
• Qafis created a Biometric system that secures in a multifactor way the assets from provider
and customers, this is why we use our own security protocols and don’t rely on the security
protocols providers already use. (penetration testing show flaws in their or a third-party
vendors security, improper configurations, or risky end-user behavior)
• Human failure, lack of attention. (A recent report of the Dutch
minister of interior show that one of ten Dutch biometric passports
has a fingerprint stored upside down.)
• Various registration systems in different countries in the world.
(also well known as the Bulgarian Fraud in The Netherlands)
• Qafis avoids our multi-biometrical identity to be linked back to our data credentials.
• Multi-biometrical identity are not only more secure, but they're more accurate.
Copywrite: Qafis Holding | Confidential
Advantage - Separated Biometric System
Unavoidable misuse and abuse of data information is the reason that we separate the biometrics
from the data credentials.
Advantage of the Biometric Secure Socket Layer solution:
• Biometric authentication used in a multifactor authentication based on encryption,
• Behind a provider’s certificate,
• Confirmed on a separated database, Qafis set up a Biometric solution with a separated
biometric server and do not store the data of the provider’s customers.
• Secure VPN connection between Provider and the Biometric server.
• Qafis “OMNI” Biometric platform provides flexibility, use all biometric technology, never get
locked into a single form of biometrics or a single biometric reader.
• When using a separate Biometric system, hackers needs to hack
into 2 systems to obtain all data.
• Qafis creates a unique encrypted HASH that, by themselves,
have no value and is useless for hackers.
Copywrite: Qafis Holding | Confidential
Encrypted stored &
anonymized DataAll Biometrics
All Devices Operational on all web browsers Operational on all OS
All Smart Cards
Business Model
Copywrite: Qafis Holding | Confidential
3D Face Generator instead of a Selfie
All Devices
Operational on all
web browsers
Operational on all
OS
Copywrite: Qafis Holding | Confidential
Our Team Vision and Mission
Qafis Biometric Secure Socket Layer (BSSL) is a system that relies on the
unique biological characteristics of individuals to verify and authenticate identity
for payments and secure access online and offline.
Qafis Biometrics: convenient and highly secure biometric products and
services for all methods of payment and identity protection for various
businesses, at an affordable price.
Finger Finger Vein Face Eye / Iris Palm / Vein Voice ID Card /Smart Card
Biometrics are for life, you cannot change your biometrics like a password.
Copywrite: Qafis Holding | Confidential
Verifying Identity through Biometrics
Verify and
protecting your
identity
Protecting
identity theft
Speed up
security lines
Preventing
financial fraud
Intern / extern
Preventing
duplicated records
& improve data
Use less
passwords,
Age verification,
KYC Solutions
Governments Travel & Immigration Bank & Finance More MarketsHealthcare
Biometric solutions for payment and secure access.
Copywrite: Qafis Holding | Confidential
Clients
More Markets
Travel & Immigration
Bank & Finance
Healthcare
Governments
Physical Access
Control
Logical Access
Control
National identification
Banking - Financial
applications
Web applications
New markets
• Governments in different countries
- Database protection / Biometric database
• Negotiations with a Airport in Europe
- access control for employees
• Negotiations with Banking and Financial markets
- Pilot project Q3 2016
• Negotiations with Healthcare industry
- Pilot project Q3 2016
• Crowdfunding Site
- Running Pilot project from 2015
• Know your customers solution market negotiations
• Physical Facility Solutions for several clients
• IOT - Internet of things
Copywrite: Qafis Holding | Confidential
Biometric security is on a sharp growth curve,
according to a number of recent research reports.
Market size
Copywrite: Qafis Holding | Confidential
The Team
Our dedicate team has years of experience in Biometric solutions
CFO 6+ years international experience in business and finance
COO 8+ years international business, specialist in Biometric technology
CTO 9+ years of experience in software Architecture & Facial Recognition
IT specialist, our team of 8 IT specialist has a total of over 50 years of Software technology
development in different businesses, from banking and finance, healthcare, KYC to IOT
E. Nicolaas, CEO and Founder of Qafis Biometric Technology
Mr. Nicolaas is responsible for setting the overall direction and product strategy for the company.
He has 20 years experience on board of directors of several private companies before he
started Qafis.
Copywrite: Qafis Holding | Confidential
Why Qafis
Copywrite: Qafis Holding Confidential
Why Qafis
Whether you would like to use biometrics to improve your customers’ relationship, or to secure
daily operations for accessing services, Qafis can provide the technology where security,
reliability, accuracy and speed are the solution to built up a trusted environment thanks to
biometrics.
• Using Biometrics to safeguard identities, multifactor authentication.
• Safeguarding against criminal and terrorist attacks.
• The data on the Qafis BSSL server is anonymized and useless for hackers.
• No privacy concerns by never storing a person’s biometric feature
• Multi factor Biometric Platform: 1 integration, 1 platform, all Biometrics.
In a world of biometric security, you are the password.
Finger Finger Vein Face Eye / Iris Palm / Vein Voice ID Card /Smart Card
Copywrite: Qafis Holding | Confidential
Contact
Qafis Holding Limited
Visiting Address:
The Netherlands:
Utrecht Central Station
3531 AH Utrecht
The Netherlands
Tel | +31 303 200 001
http://www.qafis.com
Copywrite: Qafis Holding | Confidential
Are you secure?
Copywrite: Qafis Holding | Confidential
Copywrite: Qafis Holding | Confidential
Thank you
Let Qafis help you to choose the best Biometric solution for your organization.

More Related Content

What's hot

Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management WebinarEliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Veridium
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
Victor Oluwajuwon Badejo
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Michelle Morgan-Nelsen
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment
Victor Oluwajuwon Badejo
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
onionid12
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
Veridium
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
eCommerce Merchants
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Violet Le, MBA MIS
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Veridium
 
Pci dss-for-it-providers
Pci dss-for-it-providersPci dss-for-it-providers
Pci dss-for-it-providers
Calyptix Security
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
Colin Valencia
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Internet transaction and communication security
Internet transaction and communication securityInternet transaction and communication security
Internet transaction and communication security
Dianoesis
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
IBM Security
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Priyanka Aash
 
FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer Authentication
FIDO Alliance
 

What's hot (20)

Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management WebinarEliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Banking the Unbanked
Banking the UnbankedBanking the Unbanked
Banking the Unbanked
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Pci dss-for-it-providers
Pci dss-for-it-providersPci dss-for-it-providers
Pci dss-for-it-providers
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Internet transaction and communication security
Internet transaction and communication securityInternet transaction and communication security
Internet transaction and communication security
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer Authentication
 

Viewers also liked

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Prav_Kalyan
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
ppriteshs
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved barPratish Sardar
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
Neel Parikh
 
Biometrics
BiometricsBiometrics
Biometrics
Rare Input
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
Clarejenson
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
AKS Solutions (Pvt) Ltd.
 
Network security
Network securityNetwork security
Network security
Akhilesh Jain
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 

Viewers also liked (20)

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Network security
Network securityNetwork security
Network security
 
Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 
Biometrics
BiometricsBiometrics
Biometrics
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Network security
Network securityNetwork security
Network security
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Biometric
Biometric Biometric
Biometric
 
Biometric
Biometric Biometric
Biometric
 

Similar to Slideshare fintech-may26th-def

Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
Loqr
LoqrLoqr
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
Holly Vega
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
Securing The Cloud
Securing The CloudSecuring The Cloud
Securing The Cloudgeorge.james
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Core Security
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Tech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber ThreatsTech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber Threats
yashakhandelwal2
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety SolutionEddie Cohen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
John Varghese
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Amazon Web Services
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
koushikichakraborty3
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
VASCO Data Security
 

Similar to Slideshare fintech-may26th-def (20)

Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Loqr
LoqrLoqr
Loqr
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Securing The Cloud
Securing The CloudSecuring The Cloud
Securing The Cloud
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Tech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber ThreatsTech4biz Solutions Defending Against Cyber Threats
Tech4biz Solutions Defending Against Cyber Threats
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety Solution
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Slideshare fintech-may26th-def

  • 1. Qafis Finger Finger Vein Face Eye / Iris Palm / Vein Voice ID Card /Smart Card Biometric Technology as Security Copywrite: Qafis Holding | Confidential
  • 2. Welcome Meet Fintech Day Amsterdam May 26th, 2016 Copywrite: Qafis Holding | Confidential
  • 3. Todays world - Security issues Some vulnerabilities discovered after years of use. Hackers use third-party vendors for their attacks. Attackers have been exploiting separate zero-day vulnerabilities in Internet Explorer and the Flash browser plug-in software. Researcher Hacks Symantec's AV Via Email Just receiving an email is enough, no need to open or read it. Flaw is fixed. http://www.databreachtoday.eu/researcher-hacks-symantecs-av- via-email-a-9109 http://www.databreachtoday.eu/zero-day-attacks-pummel-ie- flash-a-9093 http://www.databreachtoday.eu/swift-to-banks-get-your-security- act-together-a-9099 $81 Million Bank Hack SWIFT has issued its first-ever information security guidance to banks, telling them to get their act together. Some of the banking industry's top executives are concerned that hackers will continue to attack the global financial system by breaking into smaller banks. http://money.cnn.com/2016/05/18/technology/hackers-smaller- banks/index.html Copywrite: Qafis Holding | Confidential
  • 4. Mobile Security Issues Learn the New Threat Vectors Putting Your Mobile Banking Customers at Risk A security researcher could have stolen as much as $25 Billion from one of the India's biggest banks ‒ Thanks to the bank's vulnerable mobile application. http://thehackernews.com/2016/05/indian-bank-hacking.html http://www.databreachtoday.eu/webinars/learn-new-threat- vectors-putting-your-mobile-banking-customers-at-risk-w-777 A Samsung Galaxy S6 and a Huawei Honor 7 were unlocked successfully using a fingerprint printed using a standard inkjet printer loaded with special ink. https://www.linkedin.com/pulse/samsung-huawei-fingerprint- scanners-can-fooled-using-inkjet-mirza Hack of four big Australian banks through app’s. Stealing two-factor SMS codes, forwarding the code to hackers while hiding it from the owner of the phone. Thieves can bypass a bank's security measures to log into the victims' online banking account from anywhere in the world and transfer funds http://www.access-vs.com/#!blog/u0f37/category/Mobile hacks Copywrite: Qafis Holding | Confidential
  • 5. Most hacks take minutes to do and weeks to discover Most companies sit on cybersecurity breaches for weeks before they're discovered, while they take hackers only minutes to perpetrate. In 93 percent of cases where data was stolen, systems were compromised in minutes or less, according to a Data Breach Investigations Report. But in over 80 percent of cases, victims didn't find the breach for weeks or more. Criminals are getting better, faster and nobody on the defensive is getting better fast enough. There's no such thing as an 100% secure system. Qafis has always been focusing on how to improve the quality of security with biometric solution implementation, upgrade your security with biometric technology, it’s the future of computerized identification. Copywrite: Qafis Holding | Confidential
  • 6. MFA and Biometric Solution The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a target such as a physical location, computing device, network or database. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Qafis can authenticate an identity in three ways: 1. by something the user knows (such as a password or personal identification number), 2. something the user has (a smart card, ID or passport) or 3. something the user is (a physical characteristic, such as a: a) fingerprint, b) face, c) iris d) palm, e) voice, called biometrics) Biometric system on Card, it makes the difference Copywrite: Qafis Holding | Confidential
  • 7. Advantage of a Biometric Smartcard Biometric system on Card, it makes the difference. The Biometric Smartcard combined an Identity in three ways, something the user: 1. knows, 2. has, 3. is. Banking and Finance Identity Card Healthcare Card Company Access Card When data is stored (encrypted or not) on the device, like a Passport, ID card, smart cards with or without biometric device, phones or tablets, hackers have the possibility to re-create, or replace the biometric data. Qafis R&D team says this about biometrics: "if you can make it you can break it, maybe not today, but you can't predict the future.“ Our goal is to limit the information the hackers can obtain. Copywrite: Qafis Holding | Confidential
  • 8. When identity thieves have access to biometric data and cyber security experts announce that obtaining biometric data is the worst aspect of theft, then we need to reconsider our security protocols. Combined Stored data Copywrite: Qafis Holding | Confidential
  • 9. Qafis Secured Solution Keep it safe with separate stored Biometrics! Customers Credentials Biometric Database Copywrite: Qafis Holding | Confidential
  • 10. Biometric System. Qafis creates a extra layered defense using biometric technology in a separate stored database. Why a separate Biometric database? • Qafis created a Biometric system that secures in a multifactor way the assets from provider and customers, this is why we use our own security protocols and don’t rely on the security protocols providers already use. (penetration testing show flaws in their or a third-party vendors security, improper configurations, or risky end-user behavior) • Human failure, lack of attention. (A recent report of the Dutch minister of interior show that one of ten Dutch biometric passports has a fingerprint stored upside down.) • Various registration systems in different countries in the world. (also well known as the Bulgarian Fraud in The Netherlands) • Qafis avoids our multi-biometrical identity to be linked back to our data credentials. • Multi-biometrical identity are not only more secure, but they're more accurate. Copywrite: Qafis Holding | Confidential
  • 11. Advantage - Separated Biometric System Unavoidable misuse and abuse of data information is the reason that we separate the biometrics from the data credentials. Advantage of the Biometric Secure Socket Layer solution: • Biometric authentication used in a multifactor authentication based on encryption, • Behind a provider’s certificate, • Confirmed on a separated database, Qafis set up a Biometric solution with a separated biometric server and do not store the data of the provider’s customers. • Secure VPN connection between Provider and the Biometric server. • Qafis “OMNI” Biometric platform provides flexibility, use all biometric technology, never get locked into a single form of biometrics or a single biometric reader. • When using a separate Biometric system, hackers needs to hack into 2 systems to obtain all data. • Qafis creates a unique encrypted HASH that, by themselves, have no value and is useless for hackers. Copywrite: Qafis Holding | Confidential
  • 12. Encrypted stored & anonymized DataAll Biometrics All Devices Operational on all web browsers Operational on all OS All Smart Cards Business Model Copywrite: Qafis Holding | Confidential
  • 13. 3D Face Generator instead of a Selfie All Devices Operational on all web browsers Operational on all OS Copywrite: Qafis Holding | Confidential
  • 14. Our Team Vision and Mission Qafis Biometric Secure Socket Layer (BSSL) is a system that relies on the unique biological characteristics of individuals to verify and authenticate identity for payments and secure access online and offline. Qafis Biometrics: convenient and highly secure biometric products and services for all methods of payment and identity protection for various businesses, at an affordable price. Finger Finger Vein Face Eye / Iris Palm / Vein Voice ID Card /Smart Card Biometrics are for life, you cannot change your biometrics like a password. Copywrite: Qafis Holding | Confidential
  • 15. Verifying Identity through Biometrics Verify and protecting your identity Protecting identity theft Speed up security lines Preventing financial fraud Intern / extern Preventing duplicated records & improve data Use less passwords, Age verification, KYC Solutions Governments Travel & Immigration Bank & Finance More MarketsHealthcare Biometric solutions for payment and secure access. Copywrite: Qafis Holding | Confidential
  • 16. Clients More Markets Travel & Immigration Bank & Finance Healthcare Governments Physical Access Control Logical Access Control National identification Banking - Financial applications Web applications New markets • Governments in different countries - Database protection / Biometric database • Negotiations with a Airport in Europe - access control for employees • Negotiations with Banking and Financial markets - Pilot project Q3 2016 • Negotiations with Healthcare industry - Pilot project Q3 2016 • Crowdfunding Site - Running Pilot project from 2015 • Know your customers solution market negotiations • Physical Facility Solutions for several clients • IOT - Internet of things Copywrite: Qafis Holding | Confidential
  • 17. Biometric security is on a sharp growth curve, according to a number of recent research reports. Market size Copywrite: Qafis Holding | Confidential
  • 18. The Team Our dedicate team has years of experience in Biometric solutions CFO 6+ years international experience in business and finance COO 8+ years international business, specialist in Biometric technology CTO 9+ years of experience in software Architecture & Facial Recognition IT specialist, our team of 8 IT specialist has a total of over 50 years of Software technology development in different businesses, from banking and finance, healthcare, KYC to IOT E. Nicolaas, CEO and Founder of Qafis Biometric Technology Mr. Nicolaas is responsible for setting the overall direction and product strategy for the company. He has 20 years experience on board of directors of several private companies before he started Qafis. Copywrite: Qafis Holding | Confidential
  • 19. Why Qafis Copywrite: Qafis Holding Confidential
  • 20. Why Qafis Whether you would like to use biometrics to improve your customers’ relationship, or to secure daily operations for accessing services, Qafis can provide the technology where security, reliability, accuracy and speed are the solution to built up a trusted environment thanks to biometrics. • Using Biometrics to safeguard identities, multifactor authentication. • Safeguarding against criminal and terrorist attacks. • The data on the Qafis BSSL server is anonymized and useless for hackers. • No privacy concerns by never storing a person’s biometric feature • Multi factor Biometric Platform: 1 integration, 1 platform, all Biometrics. In a world of biometric security, you are the password. Finger Finger Vein Face Eye / Iris Palm / Vein Voice ID Card /Smart Card Copywrite: Qafis Holding | Confidential
  • 21. Contact Qafis Holding Limited Visiting Address: The Netherlands: Utrecht Central Station 3531 AH Utrecht The Netherlands Tel | +31 303 200 001 http://www.qafis.com Copywrite: Qafis Holding | Confidential
  • 22. Are you secure? Copywrite: Qafis Holding | Confidential
  • 23. Copywrite: Qafis Holding | Confidential Thank you Let Qafis help you to choose the best Biometric solution for your organization.

Editor's Notes

  1. Thanks to having us here on this Fintech Day, my name is Edwin Nicolaas and I am the CEO of Qafis Biometrics and Access Verification Solutions.
  2. When identity thieves have access to biometrics and cyber security experts announce that obtaining biometric data is the worst aspect of theft, then we need to reconsider our security protocols.
  3. they'll move on and look for an easier target
  4. When identity thieves have access to biometrics and cyber security experts announce that obtaining biometric data is the worst aspect of theft, then we need to reconsider our security protocols.
  5. Local stored Biometric credentials together with your data. If you can make it you can break it.
  6. Pincodes and Tokens - Every site has his own requirements for passwords, capital letters – numbers – minimum 6 or 8 digits, it’s not easy to remember for the customer. Immigration registration – Different countries use different ways to register people.
  7. Pincodes and Tokens - Every site has his own requirements for passwords, capital letters – numbers – minimum 6 or 8 digits, it’s not easy to remember for the customer. Immigration registration – Different countries use different ways to register people.