SlideShare a Scribd company logo
© Mobico Comodo Private Limited
Global Identity and Access Management System
truMe for Visitor Management
Security
Convenience
Present Challenges
Privacy
• Overwhelming dependence on manpower and legacy systems
• Need vigilant and trained workforce; therefore expensive
• Little flexibility to design access rules
• Half-baked methods to establish identity
• Poor visibility on visitors’ movement
• No tracking; No analytics
• Queues – Friction – Paperwork
• Obtrusive, Inconvenient and Insecure access management
• Time-consuming processes
• Unpleasant Entry Experience – Visitors feel unwelcome and hassled
• Visitors have to share an identity document at time of access
• Visitors have little visibility on or control over what happens to the
identity document shared with the establishment
The truMe Advantage
Security
• Controlled & secure access for visitors on the basis of pre-verified identity
• Phone number is OTP verified real-time, photograph, ID on record
• Host employee has option to invite, accept/ decline the visit request
• Tamper proof QR code printed pass for visitors without phone
• Real time visibility on a visitor’s entry & exit
• Access of unwanted elements can be blocked
• In-built Emergency Response System
Efficiency
• Unlimited number of users; unlimited number of transactions
• Building Manager (BM) has complete flexibility to devise access rules
• Power of analytics is available to the BM in real time
• BM can customize/ generate Access Reports on the relevant parameters
Convenience
• Guests feel welcome
• No queues – No paperwork – No wait time – No friction
• Multiple options to register/ invite visitors, avoiding pressure on
reception
• Live Access View from anywhere in the world
• Complete privacy for the visitors
Security
Features
Versatility
• Entire manual process automated, resulting in security for the building
& the people inside and privacy and convenience for the visitors
• Access Rules can be changed by the complex real-time
• Real-time visibility on visitor movement & throughput, enabling quick
and informed decision-making process
• Emergency Response System could address various real-time
communication needs
• Option to upgrade to Access Control for the visitors, vendors and
employees on the same platform
truMe: Robust, Secure, Versatile
• AES 256 bit encryption and data on AWS cloud behind a firewall
• End to end encryption ensures that data between truMe app and
server always travels in encrypted form
• truMe identity and doc, if any on user’s phone are also encrypted
and cannot be transferred to any other application/ device
• truMe identity and the supporting doc, if any on truMe platform are
stored on separate servers on the cloud
• The data remains with the organization; Mobico has no access to it
Limited
Personal Data
truMe Identity
• truMe flags a user’s organization-based identity as specific to only that
organization and does not recognize it for access to any other organization
unless the user specifically allows that
• truMe treats a particular identity as global only when the user specifically
opts to create one to access multiple establishments
• If an organization is using truMe to deal with its customers, all such
identities are deleted automatically after the relevant event
• Mobico is open to and encourages third party audit of truMe servers/
platform
truMe: Rock-solid Privacy Protection
• truMe does not track or record user’s access history. User’s access
details are available only to the organization at their location server
• truMe identity consists of user’s name, phone number, photograph and
email ID; Each of these identity attributes are already in public domain
• truMe identity and the supporting doc/s, if any are stored on different
servers on the cloud, fully protected by a firewall
• truMe identity and doc/s, if any on user’s phone are also encrypted and
cannot be transferred to any other application/ device
The People
• Pramod N Uniyal – Background in internal security, 23 years of
experience of creating and leading organizations, IIMA alumnus
• Babu Dayal - Serial entrepreneur, 24 years of experience in technology
space in US, Japan & India
• Lalit Mehta – Serial entrepreneur, 23 years of experience in technology
and finance, IIMA alumnus
The Team
The
Company
Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO
27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent
on truMe platform under section 11 A (3) of the Patents (Amendment) Act
2005. Mobico’s truMe platform is already under deployment with customers
like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
Thank You
© Mobico Comodo Private Limited

More Related Content

What's hot

truMe for Private Platforms
truMe for Private PlatformstruMe for Private Platforms
truMe for Private Platforms
AthulJojo1
 
truMe
truMe truMe
truMe
AthulJojo1
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
Manish Mahapatra
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
Eric Koeppen
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
ForgeRock
 
Security login
Security loginSecurity login
Security login
Mohibullah Saail
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
Precisely
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
GeekTek IT Services
 
Simple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theftSimple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theft
TouchPoint, Gate Pass Management System
 
System 6000
System 6000System 6000
System 6000
Mail Box Production
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
Lisa Herrera
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Salvatore D'Agostino
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
SURFnet
 
Physical security
Physical securityPhysical security
Physical security
Tariq Mahmood
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
Vijay Νavgire
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
Sandeep Agarwal
 
Layers of control
Layers of controlLayers of control
Layers of control
Rebecca Jones
 
Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01
Irena90
 

What's hot (18)

truMe for Private Platforms
truMe for Private PlatformstruMe for Private Platforms
truMe for Private Platforms
 
truMe
truMe truMe
truMe
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Security login
Security loginSecurity login
Security login
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Simple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theftSimple yet powerful ways to prevent workplace theft
Simple yet powerful ways to prevent workplace theft
 
System 6000
System 6000System 6000
System 6000
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
The mobile evolution of the employee and student pass
The mobile evolution of the employee and student passThe mobile evolution of the employee and student pass
The mobile evolution of the employee and student pass
 
Physical security
Physical securityPhysical security
Physical security
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
Layers of control
Layers of controlLayers of control
Layers of control
 
Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01Aboutme 12983064135624 Phpapp01
Aboutme 12983064135624 Phpapp01
 

Similar to truMe visitor management system

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
AthulJojo1
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutions
AthulJojo1
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildings
AthulJojo1
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
Alejandro Daricz
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
Information Security
Information SecurityInformation Security
Information Security
UmangThakkar26
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Amazon Web Services
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
Rivetz
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
Will Adams
 

Similar to truMe visitor management system (20)

truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
 
truMe for educational institutions
truMe for educational institutionstruMe for educational institutions
truMe for educational institutions
 
Visitor management system in government buildings
Visitor management system in government buildingsVisitor management system in government buildings
Visitor management system in government buildings
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Information Security
Information SecurityInformation Security
Information Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Provable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain TransactionsProvable Device Cybersecurity in Blockchain Transactions
Provable Device Cybersecurity in Blockchain Transactions
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 

Recently uploaded

Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
fkyes25
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 

Recently uploaded (20)

Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 

truMe visitor management system

  • 1. © Mobico Comodo Private Limited Global Identity and Access Management System
  • 2. truMe for Visitor Management
  • 3. Security Convenience Present Challenges Privacy • Overwhelming dependence on manpower and legacy systems • Need vigilant and trained workforce; therefore expensive • Little flexibility to design access rules • Half-baked methods to establish identity • Poor visibility on visitors’ movement • No tracking; No analytics • Queues – Friction – Paperwork • Obtrusive, Inconvenient and Insecure access management • Time-consuming processes • Unpleasant Entry Experience – Visitors feel unwelcome and hassled • Visitors have to share an identity document at time of access • Visitors have little visibility on or control over what happens to the identity document shared with the establishment
  • 4. The truMe Advantage Security • Controlled & secure access for visitors on the basis of pre-verified identity • Phone number is OTP verified real-time, photograph, ID on record • Host employee has option to invite, accept/ decline the visit request • Tamper proof QR code printed pass for visitors without phone • Real time visibility on a visitor’s entry & exit • Access of unwanted elements can be blocked • In-built Emergency Response System Efficiency • Unlimited number of users; unlimited number of transactions • Building Manager (BM) has complete flexibility to devise access rules • Power of analytics is available to the BM in real time • BM can customize/ generate Access Reports on the relevant parameters Convenience • Guests feel welcome • No queues – No paperwork – No wait time – No friction • Multiple options to register/ invite visitors, avoiding pressure on reception • Live Access View from anywhere in the world • Complete privacy for the visitors
  • 5. Security Features Versatility • Entire manual process automated, resulting in security for the building & the people inside and privacy and convenience for the visitors • Access Rules can be changed by the complex real-time • Real-time visibility on visitor movement & throughput, enabling quick and informed decision-making process • Emergency Response System could address various real-time communication needs • Option to upgrade to Access Control for the visitors, vendors and employees on the same platform truMe: Robust, Secure, Versatile • AES 256 bit encryption and data on AWS cloud behind a firewall • End to end encryption ensures that data between truMe app and server always travels in encrypted form • truMe identity and doc, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device • truMe identity and the supporting doc, if any on truMe platform are stored on separate servers on the cloud • The data remains with the organization; Mobico has no access to it
  • 6. Limited Personal Data truMe Identity • truMe flags a user’s organization-based identity as specific to only that organization and does not recognize it for access to any other organization unless the user specifically allows that • truMe treats a particular identity as global only when the user specifically opts to create one to access multiple establishments • If an organization is using truMe to deal with its customers, all such identities are deleted automatically after the relevant event • Mobico is open to and encourages third party audit of truMe servers/ platform truMe: Rock-solid Privacy Protection • truMe does not track or record user’s access history. User’s access details are available only to the organization at their location server • truMe identity consists of user’s name, phone number, photograph and email ID; Each of these identity attributes are already in public domain • truMe identity and the supporting doc/s, if any are stored on different servers on the cloud, fully protected by a firewall • truMe identity and doc/s, if any on user’s phone are also encrypted and cannot be transferred to any other application/ device
  • 7. The People • Pramod N Uniyal – Background in internal security, 23 years of experience of creating and leading organizations, IIMA alumnus • Babu Dayal - Serial entrepreneur, 24 years of experience in technology space in US, Japan & India • Lalit Mehta – Serial entrepreneur, 23 years of experience in technology and finance, IIMA alumnus The Team The Company Mobico Comodo Pvt. Ltd. is a technology product company. We are an ISO 27001:2013 and ISO 9001:2015 certified company. Mobico owns the patent on truMe platform under section 11 A (3) of the Patents (Amendment) Act 2005. Mobico’s truMe platform is already under deployment with customers like Kotak Mahindra Bank, Bharti, XL Labs, Decimal Tech, Advant Navis etc.
  • 8. Thank You © Mobico Comodo Private Limited