1 / 52

The 10 Most Trusted Authentication Solution Providers 2018

Through u201cAuthentication Solution Providers 2019u201d issue, Insights Success takes an initiative in addressing some of the finest organizations who stand forth in delivering best authentication solutions at oneu2019s door. <br>

Télécharger la présentation

The 10 Most Trusted Authentication Solution Providers 2018

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E Securing Businesses, Securing World I Many industries have recognized that the traditional password method is not enough in order to secure the data as they are more likely to be breached or can lead to data-leaks. Unlike those traditional methods, the real-time disruptive security systems allow organizations with Multi especially Two-factor authentication (TFA). The TFA is method that identifies users by means of a combination of two-distinctive components whereas multi-factor authentication can offer significant benefits to an enterprise. Insights Success accentuates and feels pride to feature certain authentication solution providers that delivers promising and reliable security systems to various enterprises. Instead getting into the depth of the concept, let us acknowledge the three aspects—Why, When and Whom, to acquire better understanding over the necessary security implementation. n this capricious business world, every individual is quite familiar with the term ’authentication’ and the necessity of implementing a secure authentication system. Authentication is the act of verification—in which—the identity of an individual or commune has to be accurate with the datum, when analyzed. Why to adapt! Technology is continuously evolving and so are the businesses. Due to the presence of huge processing units in enterprises, it becomes easier for hackers and wormers to decipher codes leading confidential intelligence at the risk of being compromised by system intruders. Some of these risks include cyber-crime, authentication attacks, data leaks, breaches, application attacks, and the list goes on. Any of these attacks are detrimental to the growth business. This is where the need of the authentication solution provider arises. When to adapt! No organization must wait to get attacked or intrigued by any external sources. As a say, “prevention is better than cure”, one must ensure the safety of organizations data and should implement integration of such systems prior any incident.

  2. Be it a two- or multi-factor authentication solution, the need of its implementation in corporate businesses has often become a necessity. “ Bhushan Ghate Whom to approach! There are many security solution providers in the market yet one must ensure the facilitation before indulging with any enterprise. As there is lot of threatening risks organizations face in the cyber world, it becomes essential to rely on leading and assured service provider. Through “Authentication Solution Providers 2019” issue, Insights Success takes an initiative in addressing some of the finest organizations who stand forth in delivering best authentication solutions at one’s door. Here is the cover, i-Sprint Innovations—the world class authentication solution provider, who deliberately proved itself on every turns in the industry. Established in the year 2000, i-Sprint Innovations is a leading provider in Identity, Credential and Access Management (ICAM) Solutions. It delivers trusty, versatile and strong authentication, and identity management platform to secure multiple application delivery environments based on a common security platform. It is incorporating the latest Mobility/ Biometrics/ Cloud/ Identification technologies in the most effective and efficient manner to build trust and identity assurance. Its core business is to ensure secure access and protection of data/ transaction/ asset among the four major IT forces (Cloud/ Social/ Mobile/ Information). Let’s unveil such alike, inspiring interviews and stories of many such significant business flagships in this special edition and spread a word about their contribution in making this world a better and secure place. Also, flip through the CXO standpoints presented by some of the leading industry experts to taste the glimpse of industrial revolutions. Happy Reading….!

  3. i-Sprint Innovations Building Trust and Identity Assurance 08 18 CXO Standpoint Leverage Existing SAP Solutions with Cloud Procurement Articles BEGINNING Wireless Mobile Technology: Scope for Tremendous Opportunities 24 28 VIRTUOSO’S VISION The Shift that broke the pendulum EDITOR’S PERSPECTIVE How GPS is Enhancing Fleet Management? 34 40 MENTOR’S STANDPOINT Leadership skills essential for organizational growth: Trust is key for sustainable development of organizations TECH CONCERN 5 Interesting Categories of 'GPS Trackers' to Trace Location 46

  4. CONTENTS 20 Futurae Technologies: Curbing Cyber Risks with Passwordless Logins and Strong Authentication That Without Bothering the User 26 Hitachi ID Systems: Deploying Solutions that Manage Identities, Entitlements and Credentials 32 Janrain: Making the World Identity Digital 38 Pradotec: Establishing Trust in an Interconnected World 44 Signicat: An Innovative Digital Identity Service Provider

  5. Editor-in-Chief Pooja M. Bansal Executive Editor Hitesh Dhamani Assistant Editors Jenny Fernandes Bhushan Kadam Managing Editor Anish Miller Co-designer Visualizer David King Art & Design Director Amol Kamble Associate Designer Shubham Mahadik Shweta Ambilwade Senior Sales Manager Business Development Manager Co-designer Passi D. Peter Collins Sales Executives David, Kevin, Mark, Avadhut Marketing Manager John Matthew Business Development Executives Technical Head Jacob Smile Steve, Joe, Alan, Anup Digital Marketing Manager Marry D'Souza Technical Specialist Aditya Research Analyst Patrick James SME-SMO Executive Prashant Chevale Database Management Stella Andrew Technology Consultant David Stokes Circulation Manager Robert Brown sales@insightssuccess.com April, 2019 Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com Insights Success Media and Technology Pvt. Ltd. Off. No. 22 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: +91 7410079881/ 82/ 83/ 84/ 85 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in Follow us on : www.facebook.com/insightssuccess/ We are also available on : www.twitter.com/insightssuccess Copyright © 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success.

  6. 1 The Most Trusted Authentication Solution Providers 2019 i-Sprint Innovations i-Sprint Innovations Building Trust and Identity Assurance i-Sprint provides a suite of integrated solutions to enable organizations to implement strong authentication, single sign-on, access control and identity management solutions. “ “

  7. Dutch Ng CEO

  8. T breaches, application attacks, and the list goes on. Any of these attacks are detrimental to the growth business. This is where the need of the authentication solution provider arises. N - Niche & Nimble T – Teamwork here are many threatening risks organizations face in the cyber world. Some of these risks include cyber-crime, authentication attacks, data leaks, “Innovation” is one of i-Sprint’s core value and with 60% of its manpower is technical and engineer people, it has been able to innovate in the last eighteen years. Its other core values have empowered the team to innovate more effectively and to focus its development on IAM solution. i-Sprint Innovations is the world class authentication solution provider. It delivers trusty, versatile and strong authentication, and identity management platform to secure multiple application delivery environments based on a common security platform. Over the years, i-Sprint has developed its own IP - AccessMatrix suite from “on premise only”, in the beginning to cloud offering as well as support mobile workforce accessing the system across different platforms. i-Sprint has enhanced its products as per the current and future market needs. Ensuring Secure Access and Protection of Data i-Sprint’s knowledge and digital identity have enabled it to excel its solutions in identity of thing (IDoT) and innovate a new generation Brand Protection solution. This solution is for anti-counterfeiting, track and trace and consumer marketing with strong security backend and data collection. For the past two years, its solution has been able to win clients in publication, F&B, health products, automatics, pharmaceutical and more. i-Sprint Innovations (i-Sprint), established in the year 2000, is a leading provider in Identity, Credential and Access Management (ICAM) Solutions. It is incorporating the latest Mobility/ Biometrics/ Cloud/ Identification technologies in the most effective and efficient manner to build trust and identity assurance. Its core business is to ensure secure access and protection of data/ transaction/ asset among the four major IT forces (Cloud/ Social/ Mobile/ Information). Besides its own development and innovation, it has been working with partners for advance technology to fuel its growth. i-Sprint has built two R&D centers with 120 plus engineers/experts to monitor the technology changes, it is incorporating the latest trends such as block chain, mobile security in its solutions, it developed its own IPs based on the latest standard such as FIDO, cloud security ISO, it understands the requirements from partners /customers and provides the best solutions for them. Moreover, its eighteen years proven experiences with bank graded standard further enables it to remain the leading company in the industry. Instrumental Leadership As the Chief Executive Officer, Dutch Ng is instrumental in providing strategic guidance on corporate technology and security policies, network infrastructure, technology platforms, business applications, products and services strategies by establishing and managing financial and business performance of the organization. Besides its strong presences in IAM market with over 200 global customers (more than half are finance service institutions), it has expanded its core technology to provide the new generation brand protection solution, which has been highly demanded by manufacturing industry in recent years. Pulling through Adversities The initial stage of i-Sprint’s development, the year 2000 was particularly challenging period. It was essential to build its own IP /technology and also required the fund to sustain its existence. In order to support research and development in the creation of its IAM solution suite, i-Sprint started off doing system integration job for companies. Through these projects, it learned more about the different multitude of problems and preferences of companies experienced in the area of IT deployment, which further emphasized its desire to create a platform for consolidated IT security services. Driven by Core Values The name of the company (i-Sprint) itself represents its core values i - Identity Credential & Access Management Solution (IAM) S - Scalable P - Partner & Customer Centric R - Resilient I - Innovative The SARS (Severe Acute Respiratory Syndrome) epidemic, which hit Singapore in 2003, was another challenging period in the company’s history. Customer visits were nearly impossible during that period, which led to a

  9. Photo by: Association of Small & Medium Enterprises, Singapore significant toll on i-Sprint’s sales and finances. The team was faced with the tough decision of whether to soldier on through the lean times or to call it a day. Eventually, with its determination, perseverance, and teamwork, it pulled through the difficult period. Its business took off in 2005 with the successful launch of its AccessMatrix™ suite for identity, credential and access management (ICAM). i-Sprint’s AccessMatrix™ featured patented technology is a A Hierarchy Model. This hierarchy model, when implemented, is capable of allowing security administrators to centrally manage user and application security-related attributes (authentication methods, access rights, privileges, access control rules) and other application attributes. i-Sprint’s AccessMatrix IAM Suite and YESsafe Suite of Mobile Security solutions cover the security requirements for the entire Identity and Access Management Cycle from Smart User Provisiong/De-provisioning, Adaptive and Contextual User Authentication, Multi-environment Secure Single-Sign-On, flexible Access Control via coarse grained and fine grained authorization policy. Its solutions have been successfully deployed to address the security requirements for multiple access channels: Desktop, Web, Cloud, VDI and Mobile. Remarkably Secure Solutions i-Sprint’s product offerings are in further divided into three major categories: 1)AccessMatrix™ - Suite of Identity and Access Management Solutions 2)YESsafe – Mobile Security Solution 3)AccessReal™ - The New Generation Brand Protection solution AccessMatrix™ Universal Authentication Server (UAS) is a comprehensive and versatile authentication server that enables organizations to centralize all its authentication schemes in a single unified platform. It is a future-proof authentication infrastructure that supports multiple authentication mechanisms (such as passwords, OTP, biometrics) for strong authentication and authorization requirements. UAS is FIDO UAF (Universal Authentication Framework) certified. This prime i-Sprint’s products are admired by industry leader for catering the diverse regulatory requirements. Digital Identity and Access Protection i-Sprint’s digital identity governs the verification of users’ identity and access protection. The AccessMatrix™ is the solution suite that enterprises can implement strong authentication, single sign-on, access control, identity management and end-to-end encryption solutions to safeguard asset, data, and transaction. UAS offers the freedom for organizations to deploy various authentication methods from different vendors under one

  10. Comprehensive Mobile Security Management platform, and manage it as a holistic security approach. This means organizations will not be restricted or locked to a specific hardware or software authentication solution. The use of Pluggable Authentication Module (PAM) approach also allows organizations to have ease of adding new methods when available on top of their existing scheme. YESsafe AppPortal+ is a comprehensive Enterprise Mobile App Security Management Solution that creates a unified security platform to help enterprises to deploy, secure and run their mobile apps and authenticate their users. YESsafe Token+ is a new generation all-in-one mobile security token using One Time Password (OTP) and PKI / Digital Certificate technologies for strong authentication and transaction authorization. It not only provides transaction signing to provide non-repudiation and data integrity protection, it also leverages the advanced features of mobile devices to offer security protection and ease of use. AccessMatrix™ Universal Sign On™ (USO) provides a non-intrusive approach to enable organizations to achieve single sign-on to multiple web and client/ server applications without any source code changes. USO automates the single logon process to access applications, enhances the authentication process, and enforces a unified password management policy across multiple applications. The solution combines sign-on and sign-off automation with context management and fast user switching on workstations to improve access to business information, reduce operational errors and costs. YESsafe Protect+ proactively protects mobile apps against various risks and attacks, allowing mobile apps to run securely even on highly infected devices. AppProtect+ also provide callback APIs to fulfill user demands, such as to collect and send the risks data to the server. Comparing with the traditional Antivirus software, AppProtect+ can protect app without virus database update or internet connection; Comparing with the hardened app solution, AppProtect+ can prevent passive attacks (like reverse engineering, repackaging and source code modification), and respond by taking necessary measures to if real-time attacks are detected during app running. AccessMatrix™ Universal Access Management (UAM) is a web service based integration platform with 4As security components and agent technologies enable organizations to strengthen application security and enforce fine grained access control policy to manage users in accessing confidential information and critical business transactions. UAM provides Single-Sign-On capability to all web based applications in the enterprise and all access control decisions are made by the AccessMatrix Security Server. “ i-Sprint’s YESsafe Android/ iOS Client and Authenticator Combo has attained the new FIDO UAF Level 1 (L1) Certification. To enable individuals, organizations and societies to build trust and identity assurance for powering huge productivity gain through digital identity and identity of things. “ World Class Brand Protection AccessMatrix™ Universal Credential Management (UCM) is a Web Based Privileged Account management solution with multi-level approval flow empowers organizations to manage the use of privileged User IDs and Passwords to access confidential information and prevent information and data leakage. AccessReal™ is a world class brand protection solution for anti-counterfeiting, track & trace and consumer marketing. By providing a unique Identification coding tag (barcode, QR code, clone-proof AR code RFID, NFC, etc.) for each product, it allows companies to minimize counterfeiting activity, perform product logistics tracking, link customers

  11. to product and provide business intelligence for better business planning and direct interaction with customers. Other than the bank-grade security features and data analytics capabilities, AccessReal also provides a mobile platform for consumers, distributors, resellers, and other stakeholders in the supply chain to leverage mobile devices to authenticate the products, receive news/ promotions and establish direct communication. Global Presence Photo by: Association of Small & Medium Enterprises, Singapore i-Sprint’s clients include leading global and regional financial service institutions, government agencies, public utilities, manufacturing, healthcare, education, multi- national corporations, and others. · Presence in Asia is exceptionally strong Recent Awards/ Recognitions Currently, i-Sprint has a direct presence and active authorized partners across Singapore, China, Hong Kong, Taiwan, Malaysia, Thailand, Japan and the United States. The only ICAM (Identity, Credential and Access Management) Vendor in Asia that has been featured in Gartner Reports since 2006 (Gartner is an American research and advisory firm providing information technology-related insight for IT and other business leaders located across the world) Differentiation from Competitors · Proven bank-grade technology with over 80 major financial customers worldwide · Since year 2015, listed in Cybersecurity 500 Directory · Solid foundation with 100% owned IPs with patented technology “ · 2018 NetworkAsia Readers’ Choice - Winner in Identity Management Suite Category · Complete Suite of ICAM solution is available on- premises and cloud offerings to ensure scalability, flexibility, expendability · 2018 Information Management Awards – Winner in Identity & Authentication Management Category · 2018 Security Industry’s Global Excellence Award - 9 Awards Our Digital Identity governs the verification of users’ identity and access protection. “ · 2017 Enterprise Innovation Awards, Technology Innovator, Winner in Identity & Authentication Management Category · APAC CIO Outlook Top 25 Cyber Security Technology Companies 2017 Insights into Future · Tailored and built a secured platform to support various authentication mechanism. Therefore, choices of authentication methods are maximized i-Sprint Innovations plans to keep innovating its product offerings for the needs of its customers. It is going to continue to develop its technology to capture new opplemortunity in the market. It is determined to cover more markets in Asia and also expanding to US and Europe countries. It is open to partnership in future with competitors that have products that compent theirs to pitch solution to customers · Recognized as the world leading ICAM Solution Provider by many world leading IT organizations such as Gartner/ Cybersecurity Ventures/ Info Security Products Guide/ NetworkWorld Asia

  12. READ IT FIRST SUBSCRIBE T O D A Y Never Miss an Issue Yes I would like to subscribe to Insights uccess Magazine. , S Global Subscription Date : Name : Address : Telephone : Email : City : State : Zip : Country : Che ck should be drawn in favor of: INSIGHTS SUCCESS MEDIA TECH LLC CORPORATE OFFICE Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone (614)-602-1754,(302)-319-9947 : Email: info@insightssuccess.com For Subscription: www.insightssuccess.com

  13. Leverage Existing SAP Solutions with Cloud Procurement C eProcurement. After the initial investment, companies find certain roadblocks preventing mass user adoption and diminishing cost savings. Issues such as inability to stay connected, lack of insight into data, and complex and fragmented business rules stop businesses from using the full power of SAP. As cloud application technologies advance, companies gain the benefits of rapid deployment cycles, increased self-service tools, and faster performance. Vroozi delivers on the promise and power of eProcurement in the Cloud with seamless integration into SAP. procurement strategy. Buyers and trading partners of cloud procurement solutions need to feel confident that solutions will lead to cost savings and higher productivity and efficiency. Users quickly see returns by focusing on user adoption, compliance, and spend management. Spend Management allows companies to visualize purchasing spending patterns and usage and drives employees to leverage preferred pricing with contract suppliers. To increase user adoption and compliance, the cloud empowers a mobile workforce with the right resources and experience so everyone stays connected and available so that business is not disrupted. As user adoption and compliance frameworks increase with cloud-based systems, organizations gain immediate cost savings in procurement by decreasing transaction costs and preventing spend leakage with your supply chain. ompanies that have already invested in SAP find that they can achieve even better results from their existing investment with cloud technology and SAP users looking to the cloud generally face a few questions, including: · How can I benefit from using cloud procurement? · Will my transition to the cloud be cost-effective? · How will my business processes be affected by cloud technology? Efficiencies Process efficiency is key for a successful, healthy business. Cloud technology enables better processes by keeping everyone connected through a mobile experience and automating transaction tasks through the use of machine learning and pattern matching. With a centralized, unified system, cloud automation can yield immediate benefits in requisition to invoice and payment business processes and reduced errors and issues leading to higher productivity and decreased processing costs. Further, by allowing employees To understand the benefits of cloud technology to existing SAP users, let’s evaluate three procurement strategies that highlight the power of cloud procurement. Value Realization Return on Investment (ROI) is a central factor in any 18 |April 2019|

  14. CXO STANDPOINT to interact with cloud procurement via smart Phones and tablets, business can continue to move with efficiency and speed. IT Cost Savings Perhaps no determinant is more important in realizing the benefits of cloud technologies versus traditional on premise software is in IT Cost Savings. Systems and applications which required large physical infrastructure and monetary investments can now provide inexpensive and scalable solutions through the Cloud and cloud infrastructure providers. A procurement solution that integrates with SAP is easier to access, less expensive, and takes a fraction of the implementation time companies once faced with traditional software solutions. Cloud technology relieves the user of hidden costs such as hardware, consultants, infrastructure, maintenance, and costly upgrade cycles, providing lower risk and lower total cost of ownership. Brad Hill Director of Global Sales & Marketing Vroozi Conclusion The cloud offers little upfront expense, automatic upgrades, and pre-integrated best practices which allow organizations to focus on business growth and improved operating margins. Vroozi’s eProcurement solution that takes SAP solutions to the cloud empower users with better returns, better processes and higher savings, so their overall SAP investment’s ROI is accelerated. Brad Hill, Director of Global Sales & Marketing of Vroozi is a passionate leader and is responsible for expanding the Vroozi Product Suite, Brand Adoption, Partnership Network & ensuring our customers receive an unparalleled experience with Vroozi. Brad spent the last 20 years building Enterprise Sales and Product strategies with leading IT Services organizations. His entrepreneurial strategies have served a vast number of Fortune 500 industries and verticals. He is also an aspiring mechanic and frustrated golfer, two good reminders to keep his day job. According to IDC, spending on Cloud computing is growing at 4.5 times the rate of IT spending since 2009 and is expected to continue growing at more than 6 times the rate of IT spending from 2015 through 2020. (via Forbes) This massive growth is easily understood when businesses understand the power and value of cloud solutions. With the Vroozi Platform, companies can take advantage of robust eProcurement technology delivered in the Cloud and integrated seamlessly with SAP. 19 |April 2019|

  15. 1 The Most Trusted Authentication Solution Providers 2019 Futurae Technologies: Curbing Cyber Risks with Passwordless Logins and Strong Authentication That Without Bothering the User W concerns are related to multiple technologies but data breaches always lands the top spot on that list. Smart gadgets are now considered to be the primary source of data collection and distribution. While these smart gadgets are significantly improving daily life in many different aspects, at the same time they also attribute to the higher frequency and scale of potential security breaches. ith advancements in technology propelling forward at breakneck speed, major security concerns are also on the rise. These security completely frictionless manner. It uses context information like sensor signals and ambient noise around the user, while at the same time also secures the privacy of the user throughout the entire authentication process. This solution is unique and offers the most secure access without causing any additional friction in the customer journey. Zero-Touch also enables a seamless strong authentication for use-cases like smart assistants (e.g., Alexa or Google Home) or on any device where there is (only) a microphone and speakers. In addition, Futurae is a pioneer in passwordless authentication methods enabling authenticated access, at the same time lowering helpdesk costs by eliminating password/reset struggles that many companies have. Founded in 2016 in Zurich, Futurae Technologies offers a strong suite of multi-factor authentication tools that provide bank grade security for big and small budgets. The company’s core belief is that even the strongest level of security does not need to compromise on customer experience nor user privacy. The range of authentication methods in the suite provides companies with complete flexibility and swift deployment. In addition, Futurae’s human-centric technologies also enable easy integration into a company’s existing infrastructure and reduces overall authentication overhead costs. Futurae Authentication Suite also offers other authentication solutions in addition to Zero-Touch, such “The new standard in user-centric authentication - Security has never been easier.” Future-proof technologies Futurae offers award-winning security solutions that reduce risks of data thefts. The organization’s core component is “Zero-Touch”, a two-factor authentication solution that works without any user interaction, entirely invisible for the user. The technology uses a machine learning algorithm to securely authenticate the user in a 20 |April 2019|

  16. as ‘One-Touch’ via a push notification for transaction confirmation, single device authentication, and various offline solutions as well as solutions that do not rely on smartphone devices. It has recognized the industry needs and knows that “one size does not fit all”. All the solutions can be parameterized to user groups to meet individual needs of organizations. The Futurae Authentication Suite is offered as an SDK to be plugged into any existing mobile apps or as a secure and customizable authenticator app. Finally, the ease of integration enables all customers to easily implement strong authentication for their users. Futurae offers a flexible pricing model catering to small startups and large enterprises, that allows all customers to enable strong user authentication. Its standard deployment is cloud-based that provides a scalable, secure and redundant infrastructure. For enterprise cases, managed on-premise deployment as well as other customization is available, according to their specific needs. Sandra Tobler Co-founder & CEO Futurae Technologies Access Management in 2018 by Gartner and strengthening its presence globally. Security for constantly changing threats Although the user experience that the Futurae Authentication Suite provides is so seamless and at times invisible, there is a team of best-in-class IT security experts is behind the scene ensuring customers are secure in the ever evolving cyber threat landscape. Due to the proximity to ETH Zurich, one of the best computer science universities in the world, the security experts are well connected and at the pulse of new developments. As an ETH Zurich spin-off, they also benefit from the university’s strong international industry network. New approaches needed in IT security Digitalization offers companies the ability to create products with more and more touch points with end- users, and providing them with personalized services. The more digital the world gets, the more important and precious data becomes, thereby increasing the importance of protecting users from cyber-attacks. The industry is still struggling with bridging usability with the highest security requirements and not interrupting the customer journey. Until now, increased security has always been correlated with less usability which weakens the security structure. Futurae is changing that with its exceptional service and technologies, which is attracting a lot of global interest. Futurae has customers in a wide range of industries although the focus is premiliarly on the financial service and insurance industry. The company already has strong brands among its customer base which helps accelerate its rapid growth. Futurae was named Cool Vendor in Identity and Testimonials from Clients “Futurae consists of a highly talented and committed team that delivers its promises with their innovative AI enhanced authentication portfolio.” Andreas Iten, CIO Financial Information and Corporate Function, SIX GROUP 21 |April 2019|

  17. Wireless Mobile Technology Scope for Tremendous Opportunities W innovations and trends are being added in mobile communication technology. That has produced till dates, the most sophisticated wireless mobile telephony that we are using in the form of a smartphone. ireless mobile telephony was mainly invented and implemented only for voice communication to be used anywhere, anytime, and on the go. With time wireless telephony has been heavily researched and developed. Each year, each month, and even each day new History Some decades ago, mobile phones were costly, large in shape and heavy in weight used for voice calling only with limited access within metro cities. Gen X people know these big-1G-analog-mobile phones very well. These big phones remained the status symbol of rich people only. In 1990’s 2G-digital-mobile service was introduced that consisted voice as well as data capabilities, this was the major innovative generation of mobile phones. With this, doors opened for mobile telephony for all with ease and compact mobiles. These mobile phones were a bit costly and not heavy performers like PCs because of their weak hardware. Satellite Mobile Phone In addition to the cellular network phone, mobile phones canalso beconnected directly from Earth- orbiting satellites. These satellite phones can be used in remote areas where wired network is unavailable or where setting up of a cellular network is difficult. The Inmarsat system is the world’s oldest satellite phone network. Some other operators like Iridium, Globalstar, and Thuraya also provide satellite phone services. Use of a satellite phone is very low due to the need of a special expensive device that supports satellite frequency and high usage cost. In some countries, the use of satellite phones is illegal. Most of the satellite phones are used in defense and disaster response. Wireless Broadband With the rise of 21st century, 3G service was first introduced by NTT DoCoMo in Japan. This technology becomes a game changer in the field of mobile broadband. Use of high-end-cutting-edge technology for manufacturing made mobile cheaper in addition to good hardware that can perform an internet browsing and downloading very well. 3G mobile phones reached the popularity with the Internet Access and Video Calling. Use of mobile phones instead of PCs made compulsory for OEM’s to build similar strong hardware and OS as PCs. New hardware and OS were introduced and replaced with new one. 24 |April 2019|

  18. BEGINNING Operating Systems for Mobiles For a decade, Symbian of Nokia was very popular as a mobile OS. It faced stiff competition afterward with the introduction of Android and iOS. After Symbian OS; Android, iOS (Apple), and Windows operating system became popular that converted a mobile phone into a smartphone.Symbian, Android, iOS, and Windows are the milestones in mobile technologies that provide nearly similar computing capabilities of PC’s to mobile with the similar hardware configuration. All these OS supports different applications for a different purpose depending upon the user requirements. Need for Mobile Applications Digitization in banking, governing, and in near about all the fields increases use of smartphones instead of PCs and laptops because of their low cost and compactness. Now people are not only using mobile phones for communication, but also for gaming, online transactions, social media, job hunting, online shopping, downloading-watching videos, and more. All these needs cannot be full-filled by Mobile OS and Mobile Browser only, which demands most sophisticated separate application for different use. Mobile Applications are becoming more popular as they are time saving and simple in operation. This has given birth to the Mobile Applications Industry. Effect of New Technologies Newly developed 4G technology broadens the use of wireless mobile technology. IoT (Internet of Things) mainly use the wireless network for their operation. Using the IoT machines can be connected to each other and can be remotely controlled and operated with the help of wireless internet and software. IoT needs high internet speed and strong software to control machines like drones, autonomous vehicles, etc. 4G technology provides 50-1000 Mbps speed which is highly suitable for IoT devices. IoT also needs a special application depending on need, which may run on iOS or Android or any operating system. Base for Mobile Applications Mobile applications are mainly based on the OS and hardware on which mobile phone or device works. Today there are mainly three popular OS; Android, iOS, and Windows. Based on this, developer develops the applications for specific use. These applications are available in App Store of that OS. Like Android places their apps in Play Store, iOS of Apple in App Store, and Windows in Microsoft Store. All these apps are third party apps developed and maintained by other developers and solution providers. Some of the apps are free and some are priced small amount with some validity. Another fact is, free apps are also available in chargeable premium version,maybe with ad-free versions having high-end features. Scope for Business Mobile apps business is growing faster after the 3G technology. 3G and 4G technology provide faster internet access that brings users to the mobile internet platform. Mobile is now used as a replacement for bulky PCs. All-day-today activities are carried on mobile that demands different applications for different use with periodic update depending on changing trends, security, and needs. All biggies are making large investments in the app solution business due to huge demand for different apps. Dependency on apps is growing due to use of the new technologies like IoT, M2M, Virtual Reality (VR), and more. Again gaming apps are also gaining more popularity as hardware of mobiles are becoming more advance that can support high-end gaming. Numbers of apps are entering into the mobile market, creating lots of space for mobile app developers and solution providers. New mobile technology innovated, implemented and grew continuously, that again creates the new requirement of different apps, keeping app industry growing. 25 |April 2019|

  19. 1 The Most Trusted Authentication Solution Providers 2019 Hitachi ID Systems: Deploying Solutions that Manage Identities, Entitlements and Credentials I company’s core competencies and its comprehensive solutions for managing identities, security entitlements and credentials. n an interview with Insights Success, Idan Shoham, the Chief Technology Officer and Founder of Hitachi ID Systems, Inc. shares his valuable insights on the Hitachi ID Systems’ vision is to be the identity and access management, credential management and privileged access management vendor of choice for medium and large organizations, selected on the basis of innovation, flexibility, customer service and total cost. What are the cutting-edge services/solutions offered by Hitachi ID Systems? The Hitachi ID Suite is available as any combination of three licensed products: a) Hitachi ID Identity Manager: Manage identities, accounts, groups and roles: Automation, requests, approvals, reviews, SoD and RBAC. Below are the highlights of interview: Give a brief overview of the Hitachi ID Systems, its uniqueness, and its vision. Hitachi ID Systems, Inc. delivers identity and access management (IAM) solutions to organizations globally, including many of the Fortune 500 companies. The Hitachi ID Identity and Access Management Suite is a fully integrated solution for managing identities, security entitlements and credentials, for both business users and shared/privileged accounts, on-premises and in the cloud. b) Hitachi ID Password Manager: Integrated credential management: Passwords, security questions, certificates, tokens, smart cards and biometrics. The Hitachi ID Suite is well known in the marketplace for high scalability, fault tolerance, a pragmatic design and low total cost of ownership (TCO). Hitachi ID Systems is recognized by customers and analysts for industry-leading customer service. “Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.” No other IAM suite includes identity management, access governance, group lifecycle management, credential management, privileged access management (PAM), strong authentication and federated access. Hitachi ID Suite includes all of these, behind a single user interface, running in a single instance, with a single back-end database and using shared connectors and reports. No competing IAM or PAM product includes a peer-to-peer replication model for active-active, load balanced deployment, no competitor offers smart phone access without a public URL and no competitor includes as many built-in connectors. 26 |April 2019|

  20. c)Hitachi ID Privileged Access Manager: Securing access to administrator, embedded and service accounts. These are all built on a single platform – one source code, one installer, one UI, one workflow framework, a shared set of connectors, reports and analytics, etc. Moreover, the Hitachi ID Suite includes features that might be surprising in the above categories, including group lifecycle management, federated application single sign-on and built-in multi-factor authentication. Idan Shoham Founder & CTO Hitachi ID Systems, Inc. All of this is available as a service – i.e., cloud-hosted and vendor operated SaaS, as traditional on-premises software with a perpetual license and annual maintenance, or with a hybrid model, such as licensed and deployed to IaaS or on- premises but managed by Hitachi ID Systems. corporate VPN. With it, users can reset forgotten passwords even while off-site, and the password reset updatesthe locally cached password. Users can then get back to work, rather than carrying around a useless laptop until they next visit a corporate office. Describe the experiences, achievements or lessons learned that have shaped the journey of the company. Hitachi ID Systems is focused on delivering pragmatic solutions to real-world problems, rather than "me too" features. This has led to some unusual capabilities. What according to you could be the potential future of Authentication Solution Industry and how does Hitachi ID Systems envision sustaining its competency? Strong authentication has become “table stakes” – there are lots of options, many of which work well. Federation, be it via the secure assertions markup language (SAML) or OpenID Connect (OIDC) allows applications to offload this problem to shared infrastructure. For example, in the context of identity and access management (IAM), it is impossible to predict all the entitlements that some users will require. The more “high value” the user (e.g., back office people who perform functions that are material to the business), the less likely their needs are to fit neatly into a role based access control (RBAC) model. This leads to the need for users to request entitlements, which in turn exposes a serious usability problem: users know they need access but they don’t know what the system, account, role or group they need access to is called and they struggle to select the right entitlement from a menu of millions of items! This is a central challenge in IAM systems: requester usability. To tackle this problem, Hitachi ID Systems has developed multiple requester usability aids, including a recommendation system, a mechanism for requesters to compare the entitlements of recipients to reference users and the ability to intercept denied access attempts and guide users to the appropriate request page. The future is one where every organization has multiple MFA solutions, where most applications forego internal authentication and instead support SAML and/or OIDC and where MFA solutions become very inexpensive, ultimately dropping to $0 by being bundled with other, larger products, as is the case with Hitachi ID Mobile Access. About the Leader In his role as Chief Technology Officer, Idan Shoham is responsible for defining product and technology strategy and the overall development of Hitachi ID Systems solutions. He works closely with his talented team to ensure that the solutions that Hitachi ID delivers to the market are of the highest quality. Another interesting example arises in password reset systems. Employees and contractors often carry around corporate laptops with locally cached Active Directory (AD) credentials. If a user forgets their AD password while off-site, they can call the help desk for assistance but the help desk cannot connect to the off-site/off-line laptop and consequently cannot enable the user to regain access to their computer. To address this major disruption, Hitachi ID Systems has developed a self-service password reset client software component which integrates with WiFi and the 27 |April 2019|

  21. T Shift broke the pendulum he that About the Author Murray Oles is the President of CHALEX Corp. The company is specialized in Workow Management for Marketing Communications Projects through the use of SmartFlo and integrated third party tools. Murray Oles President C with their suppliers. This is a strategic shift brought about by a confluence of technical, social and political change on a global scale. At the core of this movement is the corporation’s need to control global brand messaging quickly in an increasingly regulated world. Is this a temporary shift or is there more to it, and how far might it go? orporations are shifting their marketing services in-house and re-defining relationships 28 |April 2019|

  22. VIRTUOSO’S VISION The rise of mobile computing combined with an explosion in SaaS software development has led to more intuitive purpose-built applications with built in learning tools. The net effect is that corporations can do much more with less. Hence, the rapidly accelerating move to take internal control of the corporate global supply chain. More specifically, control of process, digital assets, resources, and the brand message. Evidence of the shift can be seen in global corporations like P&G who in recent years consolidated their packaging prepress supply chain from hundreds of companies to only three. The ANA (Association of National Advertisers) committee for in-house agencies includes members from hundreds of the Fortune 1000. A Google search reveals many recent articles detailing the rise of in-house ad agencies. that can be analyzed as a service in real-time. The ability to analyze any combination of process and behavioral data yields valuable predictive insights. Standards such as BPMN notation and the XPDL file format have allowed developers to simplify the user experience for defining, managing, and sharing process maps across BPM platforms. A virtual task can automatically serve up the tools the user will need. SaaS tools have one thing in common. They can be called through a RESTful API without the need for a software developer. The workflow can be configured to invoke access to tools based on the nature of the task. For healthcare workflows a digital radiology file format (DICOM Web) enables secure cross-platform viewing and collaboration over a patient’s scanned images and medical history. The drivers of this shift are affordable and effective new technology and the need for speed to market. The value of a middleman controlling portions of the marcom workflow has diminished. This does not mean that everything is being produced in-house, just internally controlled and managed by in-house staff who are defining new best practices for their agile enterprise. Many companies go back and forth between insourcing and outsourcing, but this time it is different. Companies are focused on process, and it is not just marketing, legal and business analytics, recruiting, employee services and even providing in-house healthcare. Business agile companies adjust to market conditions faster by adopting a culture of managed change. It is no longer acceptable to be so disconnected from your projects that you can’t even access your own brand packaging and promotion files. The same is true for legal, regulatory and compliance work. The agile company controls all of these processes. Their DAM enabled BPM system interacts with a SaaS reporting service like EZBI that concatenates and reports on data across distributed systems. Lean manufacturing and Six Sigma programs are used to configure these systems to monitor compliance to regulated processes. With change comes opportunity. Demand for business process management tools is growing rapidly. Many new companies are developing SaaS products to further enable the agile business. Online workflow modeling and business process management tools are becoming main stream. File sharing and digital asset management services are widely accepted. Integrating these services to meet the requirements of a project has never been easier now that RESTful APIs have become widely available. Artificial intelligence applied to big data analytics will provide the agile business with insights previously inconceivable. Best of all, the enterprise can securely access most SaaS services without making any upfront investments or long term commitments. These changes are far more profound than may appear on the surface. The gig economy is fueling a virtual cottage industry that circles the globe. Project managers are increasingly in demand. This is not just an IT thing, every business runs on projects. The certified project management professional PMP is a new college certification. Rachel Burger in a Capterra article explained The 5 Biggest Project Management Trends Shaping 2018. In brief, “business agile” is the new way of doing business. A visit to the Fiverr.com web site will show how one SaaS service is bringing buyers and sellers of creative services together. This in-house trend is not just another swing of the pendulum. At the core of the agile business is an integrated business process management platform. This is the tool that enables distributed process control. In-house is only practical when the technology enables the staff to do an order of magnitude more with less. BPM systems capture huge amounts of data 29 |April 2019|

  23. 1 The Most Trusted Authentication Solution Providers 2019 Janrain: Making the World Identity Digital S providing the best solutions to their respective clients. A good Authentication Solution Provider company has to consistently improve the work productivity, IT infrastructure and a deep understanding of their clients expectation. Such solution providers carry a right approach and solve the client’s problem through its expertise. Janrain is one of the most trusted Authentication Solution Providers, which manages the most valuable assets of the internet users. demands of global brands. Its industry-leading infrastructure offers best-in-class availability across all regions. olution providing companies are in the stage of improvising the data security of the internet users. Innumerable IT companies in the world have started The Guiding Light Jim Kaskade is the CEO of Janrain and leads the company’s strategy, worldwide operations and vision. He is a seasoned entrepreneur with more than 31 years of experience in complex enterprise technology. Jim has created a client-centric culture at Janrain along with some core values which includes determination, change, attitude, teamwork, curiosity, expertise, transparency, accountability, respect and communication. Jim is a hands-on leader who stays ahead of market expectations for authentication, authorization and user experience and drives the team to exceed those expectations. The company’s founder is integral in the development of Social Login protocols which Foremost Identity Entrants Janrain pioneered Customer Identity and Access Management (CIAM) and is recognized by industry analysts as a global CIAM leader. Its vision is to make a digital world where consumers will move seamlessly and securely between apps, web and mobile properties. Janrain Identity Cloud® provides identity solutions that enable seamless and safe consumer experiences across its digitally connected world; empowering identity-first brands with digital transformation and new insights, all while ensuring privacy and security. Also it has a cloud-native, SaaS solution that balances security, privacy and compliance while providing a frictionless experience which the consumers demand. The Janrain Identity Cloud is a comprehensively integrated suite, including registration, login/authentication, single sign-on (SSO) and access management - as well as regulation-compliant, consumer-controlled preference and consent management. Its SaaS hosted registration and authentication services allows to rapidly deploy new apps and web experiences while adhering to best practices for user verification and account security. The Janrain Identity Cloud is peerless in its ability to meet the customer identity “If you need infinite scale at millisecond performance that is available 99.999% of the time, then you only have one partner to choose, Janrain” 32 |April 2019|

  24. consist of the ability for consumers to use their social media credentials to create accounts on websites and mobile apps. Social Login Authentication Janrain developed the concept of Social Login, which allows consumers to register and authenticate through more than 35 social networks such as Facebook, Twitter, Google, and LinkedIn. Today, users are also able to register through any OpenID provider. In addition to the long list of social logins and OIDC interoperability, the company supports username/password and SMS OTP authentication, and federation over SAML and OAuth. Jim Kaskade CEO Janrain Today, Janrain serves many of the world’s recognized brands giving their customers unrivaled registration and authentication experiences and giving its clients the support, performance and availability they demand. same. The company has led the market in evolving from Social Login authentication to multi-factor authentication, biometric authentication and other forms of password less authentication. Eventually, Strong Authentication (in accordance with FIDO standards) will become the norm. Janrain had already supported these more secure authentication methods and willingly continues to help its clients. Jim shares his views on social login authentication as, “Social Login and traditional e-mail account authentication will continue to be the standard in the short term, but the next step is broader adoption of biometrics and multi-factor authentication”. Authentication Challenges According to Janrain’s long years of experience, the challenges that brands face is balancing the desire to have a simple on-boarding or registration experience for their customers against maintaining security and data integrity. In a nutshell, that’s the only solution it provides. Beyond the authentication part the company faces the question of how will these identities be managed? Janrain completely focuses on the entirety of the identity on how customers come on-board, how securely their data is kept, how easily they can manage their consents and how their experience can help its clients. Much of the authentication conversation is focused on the front end user experience. The additional challenges for high volume consumer brands are managing the data securely and maintaining an authentication process with flawless availability. The Janrain Identity Cloud is truly cloud native and it is designed to excel when there are spikes in traffic and even when there are regional outages. It also supplies additional layers of assurance to its clients. The company’s built-in fraud detection helps safeguard against fraudulent account creation and undesirable behaviors, while the Janrain Secure Edge offers best-in- class coverage against external attacks. From the front end to the back end, Janrain has mastered authentication. The company’s cloud-based platform is designed to scale intelligently with spikes in usage, ensuring the best possible availability. The security measures it takes and accreditations it has received mark its lead in the industry. Janrain provides customers consent management options allowing the clients to exceed both regulatory and individual expectations. Also it provides identity resolution and customer activity insights that can propel the online or in-app experience. Testimonial Analyzing the authentication issues Jim states, “Authentication has its challenges. But meeting those challenges is not merely a matter of front-end configuration or revising registration forms. It requires a platform that is built with the customer experience as its focus, with the scalability that high-volume brands require”. “Our number of registered users has jumped 33 percent since we turned to Janrain. A smoother social login experience is a huge contributor to these improved results.”- Slate Scaling the Heights Janrain always continues creating secure and reliable user authentication solutions and it is willing to continue the 33 |April 2019|

  25. W GPS IS ENHANCING FLEET MANAGEMENT? H O 34 |April 2019|

  26. EDITOR’S PERSPECTIVE F in order to maintain a smooth functioning of the fleet operations that too in compliance with the government regulations. Recent advancements in GPS technology have empowered fleet managers to improve efficiency, reduce costs and enhance driver’s safety in a hassle free manner. Here we have enlisted few of the advantages in detail which GPS technology has brought for the betterment of fleet management’s operations. leet management is an administrative task which allows organizations to co-ordinate with vehicles and drivers Improve the Efficiency of Drivers GPS devices have the ability to enhance the efficiency of drivers and help save more money which any company requires to manage its fleet operations. This device can assist the fleet managers to know more about the driving pattern of the driver like: At what time a driver can drop the delivery? At what speed a driver can complete all deliveries? By knowing answers to such vital questions can empower the business owners to schedule each driver’s future weeks more effectively by focusing on individual driver’s driving pattern. The data which a GPS device transmit to the central device can further be utilized to gain some more meaningful insights utilizing data analytics services like 35 |April 2019|

  27. deciding the better route, tracking traffic hit areas, deciding what materials to be sent and how among others. Adoption of such technology can empower both the drivers and the business to attain efficiency with elevated performance that too in lesser time. Keep Vigil like a Spy Data collected by the GPS device can provide many performance related concerns to the upper management like: At what time the driver has started his journey? Which different places the driver has visited during his entire journey? Where did he stop and for how much time? Answers to such vital questions can help the upper management to keep track of their driver’s work behaviour and assist in maintaining better efficiency in future. Moreover, to manage the health of a vehicle it is important that a driver move vehicle as par standard road safety guidelines or protocols, which is beneficial for maintaining the safety of drivers and longevity of vehicle’s parts. Using the benefits of GPS device and specialized software, fleet managers can get to know about various important things like: sudden accelerator pattern, driving pattern at the turn, speed breakers, and close residential areas, whether the vehicle gets use for non-work related activities, etc. and thus keep a strong vigil on their fleet operations like a spy. Moreover, by analysing driver’s speed, companies can keep track of the amount of gas required and number of times the vehicle has gone for a repair. Such things ultimately assist in reducing the maintenance cost, make vehicle’s resale value last long, and also reduce the speeding fines to a great level. Help Improving Drivers’ Safety In the past, when GPS was not in place, drivers used to work very much on their own space and schedules. Although, having freedom to do their work is not a bad thing but unnecessary wasting of time creates inefficiency which ultimately costs the company. Moreover, drivers’ safety is yet another concern which repeatedly creates tension on manager’s mind, since the drivers are more distracted than ever. In one recent study published by the Virginia Tech Transportation Institute discovered that truck drivers are 23 times more prone to fall into an accident than someone who is not at all distracted. GPS tracking can address such issues. Telematics, in-fact lets you know whether your driver has worn the seat belt or not and is there any unauthorized passenger in the vehicle. In such a way, it can help in enhancing the safety of your vital human resource which is needed to carry out your fleet operations. Enable Integration for Better Customer Experience Management, employees and the customers are the most integral part of any business. In-fact the end customers are the most vital aspect as it is from where all the money flows into the company’s coffers. Therefore, it is necessary to provide much better and more transparent services to the end user to create a much better customer experience where customers don’t need to call customer’ care to know about their delivery. It is thus important to provide real-time updates to your customers as well. Thanks to the recent innovations happening in the GPS integration technology, now fleet managers can integrate GPS devices using APIs to delight their customers and create a much better end-user experience. Such integration can show your customers where your service vans are with the help of map and reduce significant burden on your helpdesk executives. Another integration which revolves around social media is starting to take shape in fleet management. It lets followers know where their logistics currently is with the help of messages and provides a real-time update in a hassle free manner to the clients. Currently, fleet managers use accounting systems, CRM systems, and fleet systems to access more information. 36 |April 2019|

  28. 1 The Most Trusted Authentication Solution Providers 2019 Pradotec: Establishing Trust in an Interconnected World T revolutionizing how individuals access their finances and how governments administer citizen services. Very few companies are at the nexus of technical proficiency, bleeding edge innovation, and decisive leadership to excel in this fast-paced arena. However, one Southeast Asian firm has already established a foothold here. It is forging a trailblazing path that will shape the ‘connected’ experience for millions around the world, far into the foreseeable future. he world is hurtling forward at a tremendous pace. Digital transformation is molding the way we live, travel, and interacts. Perhaps most importantly, it is This wealth of technical knowledge, practical experience, and an innate ability to foresee trends in technology give Pradotec the inspired leadership needed to dominate the industry. Diversified Excellence Pradotec has adopted an aggressive approach to diversifying its portfolio. Besides passports and eID documents themselves, it also develops and manufactures static and handled readers for such documents. The company’s expertise extends to biometric readers, mobile enrollment units, self-service kiosks, and ID printers, too. That company is Pradotec. Having dominated the government services sector for so long, Pradotec is ideally positioned to bring its world- leading technological solutions to a variety of industry segments. Impeccable Pedigree Pradotec Corporation Sdn Bhd (Pte Ltd) is one of the world’s foremost electronic identification, access control, and secure payments specialists. The hardware development and manufacturing company is headquartered in Malaysia but 70% of its revenue is generated internationally. “Peer-to-peer exchange transactions, a globalized society, and exponential increases in travel and border crossings have changed consumer behavior in terms of technology and how it impacts our identity and private life,” says Dato’ Lee. While it was founded in 2007, Pradotec’s technical DNA is much older. It is an independent offshoot of IRIS, the company that developed the world’s first digital smart card in 1997, executed Malaysia’s ePassport program in 1998, and its Multi-Purpose National ID Card project in 2000. The company’s Founder, Dato’ Tony Lee Kwee Hiang is a veritable legend in the Malaysian computing sphere. “If you create a car, you need to have roads for the car to be driven on. Ultimately, you have to also build these roads!” Dato’ Lee began his journey into the world of technology almost four decades ago with a technical diploma. He went on to introduce Apple computers to Malaysia and was instrumental in establishing the country’s first computer manufacturing facility. Malaysian students learn about computing based on the ATOM1 syllabus Dato’ Lee designed. His achievements transcend national borders; Dato’ Lee’s invaluable contributions to Malaysia’s MyKad initiative created the world’s first chip-based multi-application identity card. 38 |April 2019|

  29. Pradotec understands that its growth lies in being a part of every transaction made in this digital realm. “Our goal is to develop trusted technology that can be relied upon to secure the identities of everyone in the community, be it in the realm of physical or digital exchange,” he explains. The company is taking decisive strides towards this goal with its focus on innovation, trust, and stability. Dato' Tony Lee Kwee Hiang Founder Pradotec Corporation “These three factors define and characterize each product we create and every decision we make. Our intention is to meet the demands of both the government and the private sectors.” competitors often turn to Pradotec as customers of their products. A Roadmap for Success Pradotec is keeping abreast of the seismic shifts that are shaping the government and private sectors, including increasingly popular innovations like smart technology and the Internet of Things (IoT). Pradotec regards a recent ASEAN Defense Ministers’ meeting, which emphasized the need for biometric hardware to manage information in the fight against terrorism as the ideal opportunity to press its advantage internationally. “My vision for Pradotec revolves around two key principles,” reveals Dato’ Lee, “Firstly, to become a global brand and, secondly, to deliver capabilities that matter just as much in the future as they do today.” Crafting the Future The world is witnessing a steady and inevitable shift from physical to digital solutions in every aspect of technology. The Internet of Things, Augmented Intelligence (AI), and the transition to the Cloud provide versatility, speed, and convenience hardly imaginable not long ago. With this change comes an increased potential for lapses in security. Dato’ Lee anticipated this and his efforts at Pradotec have focused on creating systems that are designed to address this inherent deficiency. Dato’ Lee’s has a cohesive plan to make that vision a reality focuses on innovation driven by authentication, integration, and sustainability. The Dato’ expounds, “Authentication involves the use of embedded software to verify that a person or source is who they say they are. Integration comprises a range of techniques that combine various identification roadmaps into a single, trusted information highway. Sustainability refers to our core design principle that aims to prolong the relevance and value of our products across traditional limitations of time and space.” Another pressing need for security exists in the nascent world of smart, interconnected living. We already hear the term “smart cities” but Pradotec realizes that these cities will arise out of interconnected facilities. It is only when a network of smart facilities are interlinked will the smart city appear. The competition is intense at the elite levels of any industry and the verification and eID ecosystems are no different. However, Pradotec has at its disposal a key advantage that its competitors do not – a holistic suite of products and services. Pradotec is already developing secure systems for the IoT and for access and identity management. These components will form the backbone of the smart complex, however large or small. Most authentication specialists are completely software- driven. Their products have to be integrated into externally- produced hardware before they can be utilized. This discontinuity can potentially be the root of both incompatibility issues and security breaches. The myriad developments will lead to what Pradotec calls “One Identification”. The One Identification concept will be an individual’s gateway to every government service and every private transaction they require. Through its clients, Pradotec will deliver faster, smoother transactions devoid of traditional bottlenecks. With Pradotec, this situation does not arise. Their organically-developed symbiosis of hardware and software is unrivalled. In fact, companies that would otherwise be The future looks bright indeed. 39 |April 2019|

  30. Mark rees Chief Operating Officer Secucloud GmbH 40 |April 2019|

  31. MENTOR’S STANDPOINT Leadershipskills essential for organizational? growth? Trust is the key for sustainable development of organizations C Taylorism; French & Raven; Blanchard; McGregor; Maslow et al. At the end of the semester I have them test their knowledge in a tricky exercise involving a climbing rope and blindfolds. They have to – whilst blindfolded – form, storm, norm and perform as a team and lay the rope (which they are not allowed to let go of) in a predetermined shape on the ground. And yes, they always achieve the objective – one way or another. In contrast I have experienced this exercise as a team member of highly paid and experienced managers and witnessed first-hand the utter failure to even manage a plan, let alone achieve even half of the objective. Although to be fair, what the managers did achieve (as opposed to the students), was a whopping great conflict of personal differences, with which the rest of the seminar was used to sort out. So what was the difference between these two groups? an one learn leadership? Every winter semester I pull my students through the whole spectrum of “Leadership Theory Parts I and II”: and Raven, it is the positional power of coerciveness and reward – the proverbial carrot and stick. That works for a while as long as the (micro) manager exclusively owns the processes and information as a means of control. I believe in the long run, this strategy fails. No (high performing) employee deliberately hangs around for very long in such a situation. I’ve seen this happen numerous times. Again considering the group of students and the experienced managers with their climbing ropes and blindfolds, what I perceived was extreme differences in levels of trust. The students – in their seventh semester – were close-nit. They were just entering their final thesis, they have common objectives and after 3 and half years spent on campus, an intrinsic trust to one another. In contrast the managers came from varying business units of a large company and were “thrown” together to improve their leadership skills and develop as a leadership group within the company. Each manager had his (the group was all male) own agenda and personal career objectives etc. Each was competing for power and influence before the board. Instead of collaborating to achieve the climbing rope objective, all the micro- politics came out in the exercise and trashed any trust that might have been there at the outset. The evening log fire at the beach was a flop. A business acquaintance of mine once introduced me to the “power of trust” as a basic concept of leadership. He argued that if there is no trust between the leader and the led, then the possibilities for sustainable leadership are extremely limited and indeed most probably restricted to a short period. Without trust in human relationships there is however a form of leadership and to reference French 41 |April 2019|

  32. Trust as a subject is rationally difficult to grasp. It is one of those things we intuitively feel as being present (or not) in human relationships. To get a grip on the term, let us start with Peter Drucker’s definition of management “turning resources into production”. Now consider that what leadership does in a company is to apply strategies (resources) to achieve objectives (production). On the one hand the objectives should be such that they inspire people, bringing out their best qualities both in skills and collaboration. Secondly and as a rule, it is the leader who drives the strategy in order to achieve those objectives and this is the key area where trust within the team and across teams can emerge. It is the means utilized to achieve the ends that define so much about an enterprise. There are of course coercive means, non-compliant means, even illegal means etc., thus the old excuse for bad behavior “the ends justify the means”. In such an environment sub groups form, secrecy becomes endemic and there can only be mistrust and suspicion between people. About the Author Mark Rees is the Chief Operating recfO at Secucloud GmbH, Hamburg. In his last position Mark Rees was Managing Director of E-POST Development GmbH in Berlin, a subsidiary of Deutsche Post. There, he led an international team comprised of several hundred employees in agile DevOps development teams, and was responsible for employee direction, as well as the entire budget in the areas of IT security, DevOps, quality assurance, operations and user experience. In his work as COO at Secucloud, Rees applies his expertise in agile leadership and his many years of experience in interdisciplinary IT organizations in the Media and IT security industries. Approaching the skill of leadership whith consideration of social and ecological factors allows decisions to be made under the reflection for example, of waste reduction, for the good of the many, for sustainable growth etc. In utilizing social and ecological factors in decision-making processes, our unique human form of emotional intelligence is an influential force that significantly influences behavior both of oneself as a leader, and as a member of the collective (the business unit being led). Over time common values and understanding emerge in the group, which in turn develop (forms and storms) and fortifies the culture (the norms), thus producing the high performance unit that every person blessed with the opportunity to lead can aspire to. If you get there it’s the best job in the world! Trust is a human trait that is available to us all. You can´t simply buy it by attending a leadership seminar, doing an MBA or reading a book. Trust has to be earned and shared unconditionally as a gift. It can be rejected, withheld, it is breakable and can be destroyed in a second. Yet for all its non-tangibility and fragility, it has more power to achieve than anything else in the leadership toolbox. 42 |April 2019|

  33. 1 The Most Trusted Authentication Solution Providers 2019 Signicat: An Innovative Digital Identity Service Provider B platform in the market and trusted to reduce the burden of compliance in highly regulated markets. The company is a leader in verified digital identity, making it possible for organizations to securely onboard and authenticate new and returning customers. Signicat is dedicated to innovate in the areas of electronic identity and signatures, and to offer customers, solutions that enable them to offer their products and services in new and innovative ways. Dynamic Solutions ased in Trondheim, Norway, and founded in 2007, Signicat operates the largest Digital Identity Hub in the world, offering the only complete identity With Signicat, service providers can build and leverage existing customer credentials to connect users, devices and even ‘things’ across channels, services and markets transforming identity into an asset rather than a burden. By ditching manual, paper-based processes and replacing them with digital identity assurance, customer on-boarding is accelerated and access to services is made simple and secure. Signicat’s Identity Hub is a complete solution that offers compliance and a route to better customer engagement. Its solutions fulfill operational capabilities in Signicat is the winner of the International Identity Deployment of the Year Award and Best Innovation Award at the Cards and Payments Europe Awards. Signicat’s solutions are used by banks and financial institutions, insurance companies, government agencies and large corporations as well as small and medium sized businesses. Customers trust Signicat with the responsibility of authenticating users, providing electronic signing, identity proofing, and document preservation. Signicat’s vision is to be the preferred provider of electronic identity services to customers in regulated industries across the world. “Our vision is to be the most comprehensive provider of electronic identity services to customers in regulated industries across the world.” The company has a local presence in Norway, Sweden, Denmark, Finland, Germany, Portugal, United Kingdom, and the Netherlands. These countries are in the forefront in the world with the usage of digital identities and electronic signatures. 44 |April 2019|

  34. line with international standards and requirements, such as Privacy, Anti-Money Laundering (AML) and Anti-Terrorist legislation and regulations, as well as Know Your Customer (KYC) requirements for onboarding of new users. Company has over 400 financial services organizations as clients, connects to more than 20 schemes globally and verifies more than 10 million identities per month. Personifying Expertise The Nordics are well respected for their adoption of verified, reusable digital identities, by being able to have a single, verified identity to access government, bank, and other services online. This approach was pioneered a decade ago, and Gunnar Nordseth, the CEO of Signicat, is one among the handful of executives in the world, who has been in this industry for its entire journey. Gunnar has helped shape this industry through its founding and subsequent maturation. He is now helping to shape the next phase of this industry by leading a push to provide cross-border identity across Europe and beyond. Gunnar Nordseth CEO Signicat is a large focus area for the company currently. Signicat is also able to integrate technologies into its platform to ensure its delivery of cutting-edge authentication offerings. Implementing the Lessons Learnt Future Insights The team at Signicat has learnt many lessons among which one of the key lessons was the power of reusable identities. One of Signicat’s customers named Komplett, a large online retailer in the Nordics, realized that by using verified digital identities, it could not only authenticate its customers quickly, but also could deliver credit services to its customers. Th is was so successful that Komplett was able to open its own bank to service its customers. As per Signicat, Biometric authentication is important for the future, as is pattern recognition and more generally AI and data analytics. More and more mobile devices will be the key to authentication and Signicat will be able to use the various sensors within these devices to help ensure the user is who they say they are. The firm is exploring technologies such as gait analysis, movement user patterns, the way users hold their devices and more as examples of potential authentication data sources. Additionally, Signicat focuses on regulated industries with which it learnt that there is a need to take a highly customizable approach while delivering solutions to its customers. Each organization, in each market, requires unique functionality and so it has developed its platform to ensure it can quickly respond to unique requests to meet the needs of the regulated businesses. Signicat’s goal is to enable customers to do business more effectively by delivering great user experiences for the end users and at the same time reduce the risk by using advanced security technology. Overcoming Hurdles As Signicat deals with regulated industries, it faces new regulations, compliance requirements, and cultural requirements quite frequently. The addition of new technologies (smartphones, smart watches, etc.) further requires flexibility. It tackles these problems by working with some of the smartest technology providers out there, as well as its experienced team. It continues to innovate around authentication, with biometric authentication which 45 |April 2019|

  35. 5 INTERESTING CATEGORIES OF ‘GPS TRACKERS’ G precisely and accurately has now been utilize by citizens (directly or indirectly), and businesses all across. It has become a vital thing which is needed to carry out day-to- day operations in many verticals. Today, this technology is benefitting many individuals and businesses to navigate and track their objects in a hassle free and timely manner that too with a single click of their electronic gadget. GPS has already spread its deep footprint in automobile navigation systems, mobile phones, and timekeeping systems and is ready to make a far deeper impression in some other sectors in coming times. However, many people do not exactly know the different types of GPS trackers available in the market, their usage and working pattern. Here we have clear those confusions and come up with interesting details concerning various types of GPS trackers. TO TRACE LOCATION Asset Tracker lobal Positioning System (GPS) which was originally envisioned as a military project to assist guiding missiles to target the key objects more Many people got confused between a personal tracker and an asset tracker. Although, there is a very thin line that differentiates these two, but both are completely different as per their use. An asset tracker is use to track any non-vehicular item with the assistance of a small radio chip to a large satellite tags. Largely, supermarkets use such trackers to find their stolen or lost item. For example, previously, supermarkets use cart blocking barriers to prevent it from getting stolen or lost but/since that process was time consuming which also demands extra manpower to manage those numerous shopping carts, supermarkets have now switched to using asset trackers. Interestingly, by using such tracker in their carts, supermarkets have witnessed a significant drop in the share of their lost or stolen carts. And even of that get stolen, the rate of recovery is quite high. This is what the real benefit of using an asset tracker. Personal Tracker Moreover, such trackers also provide some extra benefits to a business rather than just tracking or recovering a misplaced or stolen shopping cart. These trackers also have the ability to identify the items placed inside the customer’s grocery cart. By analysing such data, a business owner can find interesting details like customers buying pattern, buying frequency among more. And can then effectively plan a customised marketing plan focusing on an individual customer’s shopping habits to boost more sales in the future. Gone are those days when people used to stick posters of their lost pet in their nearby colony. People now-a-days are using personalized tracker to monitor their pets. GPS-equipped collars have replaced ID collars which have been in use for a very long time. What’s interesting about these GPS-equipped collars is that it can be remotely monitored with the assistance of a personalised device. Moreover, such tracker is also gets use to track human beings with the help of pocket chip or bracelet. Such device provides a huge peace of mind since anyone can find their pets and even the close ones without taking the help of anyone and that too in a very quick time. Cell-based GPS Vehicle Tracker There was a time when delivery companies used to call their drivers to know the exact position of their vehicles and 46 |April 2019|

  36. TECH CONCERN keep themselves updated on regular intervals. Especially those delivery companies who transport precious as well as vital objects like gold, metals, cash, and other items. Such companies were under uncertainty and tension regarding the safe delivery of their goods till the time its reaches safely to the destination. But with the introduction of Cell- based GPS vehicle tracking, that worry has reduced to a minimum level. Such devices capture data from the device and then reports that data back to the business operator with the help of cell phones towers. What’s interesting about this device is that as compared to a satellite tracking, cell-based vehicle tracking costs less and reports faster to the business operator. This is one of the reasons behind its huge popularity in the vehicle-tracking segment. Satellite-based GPS Vehicle Tracker What if your vehicle moving through a remote area which does not have cell towers for long distances, gets lost? Would you be worry? Definitely yes! Then what is the solution. The answer is Satellite-based GPS vehicle tracker. Since, the Satellite-based GPS can be able to track a vehicle no matter from where it is moving (remote village, dense forest, hilly regions etc.), it can sends regular updates to the owner even from the location where cell phones do not work or the area which does not have cell tower present in nearby areas. Cellular-based Tracker Don’t get confused between Cellular-based Tracker and Cell-based GPS Vehicle Tracker. Both are different in their application of usage. Let us clarify with an example. What if you are into a logistic business, have plenty of warehouses but no vehicle. In such cases many times it happens that the third party who handles the transportation operations does not get convince to install a GPS device into their vehicle. In such scenario Cellular-based Tracker gets use, since it only require to install the business app into the driver’s cell-phone and no other devices in the vehicle. As the vehicle moves, it sends the location information to the owner without installing an in-vehicle tracking device which is required in Cell-based GPS Vehicle Tracker. This is how a Cellular-based tracker can assist in your business operations. 47 |April 2019|

More Related