VOL 12 | ISSUE 02 | 2020
+
The Age of DNA Nanotechnology Age of Advancement
Digital Transformation
i-Sprint
Challenges in the Time of CrisisChallenges Ahead
Providing World Class
Mr. Dutch Ng
Innovations
Executive OfďŹ cer
Identity and Access Management Solutions
The 10 Most Intelligent
Identity & Management Solution Providers, 2020
Editor’s Desk Securing Data, Enabling Growth
I
n the present time where advancement is at its peak organizations need to know who is accessing their data when, where, why, what, and how. This is where Identity and Access Management solution comes into play. Identity and Access Management solution, a must-have for organizations which are dealing with critical information and data, and is not something to be ignored. In a digital age where cyber threats are becoming increasingly frequent, securing data has become more important than ever. Identity and access management (IAM) is essential for safeguarding the hybrid cloud enterprise. Smart, advance identity solutions deliver a smooth and secure experience for every consumer, asset and data interaction providing a foundation for a zero trust strategy. Insights Success in its upcoming edition “The 10 Most Intelligent Identity & Access Management Solution Providers, 2020� has listed the Identity & Access Management solution providers which are helping organizations with an easy to access solution and swatch of information, grant access rights, enhance security with multifactor authentication, provide single sign-on from any device, protect privileged accounts, enable user lifecycle management, and more for their secure journey. If one is looking for the source of an Identity & Access Management solution that will help in solving challenges related to online threats, then this is the list.
In this edition, we have profiled the top 10 Identity & Access Management solutions providers for easy assessment. These providers will also be armed with the knowledge and will answer every question related to field and will help to make the best decision possible. The cover features i-Sprint, accompany which helps organizations to govern the verification of their users’ identity and access protection. Leveraging the solution suite, enterprises can implement strong authentication, single sign-on, access control, identity management and end-toend encryption solutions to safeguard asset, data, and transaction. Also, while flipping the pages, do not forget to go through the articles and CXOs written by our in-house editorial team and the industry experts respectively. Have a pleasant read!
rohit.chaturvedi@insightssuccess.com
COVER STORY
I-Sprint
Providing World Class Identity and Access Management Solutions
26 Business Outlook Living Through Fourth Industrial Revolution
34 Age of Advancement The Age of DNA Nanotechnology
ARTICLE
42 Challenges Ahead Digital Transformation Challenges in the Time of Crisis
10
18
Easy Secure Expert in Identity Management
20
IdentiďŹ Global Finding Gems from a Haystack
22
Seceon
Eliminating Threats in its Real-Time
30
Sedicii
Proving Identity, Digitally in Real-Time
38
Tindo
Making Security Possible
46
Tinfoil Security Security for Developers and DevOps
C O N T E N T S
Editor-in-Chief Sumita Sarkar Managing Editor Anish Miller
Executive Editor
Assistant Editors
Rohit Chaturvedi
Jenny Fernandes
Visualizer
Art & Design Director
David King
Asha Bange
Associate Designer Kushagra Gupta
Co-designer Kartik Balapurkar
Senior Sales Manager
Business Development Manager
Kshitij S
Peter Collins
Marketing Manager
Sales Executives
John Matthew
David, Martin, Sagar
Technical Head
Business Development Executives
Jacob Smile
Steve, Joe, Aidan, Binay
Technical Specialist Aditya
Digital Marketing Manager Marry D'Souza
SME-SMO Executive Amol Wadekar
Research Analyst Frank Adams
Database Management Stella Andrew
Circulation Manager Robert Brown
Technology Consultant David Stokes
sales@insightssuccess.com December, 2020
Follow us on :
www.facebook.com/insightssuccess/
www.twitter.com/insightssuccess
We are also available on : Copyright Š 2020 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success.
1
Most Intelligent
The
IDENTITY & ACCESS
Management Solution Providers, 2020
Company Name
Featured Person
Brief
Aicue aicue.com
Danil Korchagin Founder
Aicue mission is to provide with innovative solutions in the area of ICT (information and communication technologies).
EasySecure International easysecure.com
Werner Roest CEO
EasySecure International, established in 2005, is a specialist when it comes to identity management.
identifi Global identifiglobal.com
Peter Sanders & Gary Fay Founder
identifi global was founded by Gary Fay and Pete Sanders in 2015 to be the recruitment business that offered a human touch and kept its promises.
Ilantus Technologies ilantus.com
Arun K Singh CEO
Ilantus Technologies specializes in the Identity and Access Management domain.
I-Sprint Innovations i-sprint.com
Dutch Ng CEO
i-Sprint is a world class Solution Provider in Identity and Access Management Solution enables individuals, organizations and societies to build trust and identity assurance for powering huge productivity gain through digital identity and identity of things.
Seceon seceon.com
Chandra Pandey Founder & CEO
Seceon pioneered the industry’s fully automated platform empowering Enterprises and MSSPs to analyze operational security data, detect cyber threats and vulnerabilities, and respond to security incident threats in real-time.
sedicii sedicii.com
Rob Leslie C.E.O. & Founder
Sedicii is creating a federated, global identity verification network which enables real-time identity verification by certified, trusted identity providers ensuring that businesses can react quickly to new government, regulatory and industry demands for real-time identity verification, authentication and trust services.
Tindo tindogroup.com
Barney Chan CTO & Co-Founder
Tindo is a system integrator which focuses on cybersecurity solutions and services only. Tindo provides organizations of all sizes with the best, most trustworthy IT security solutions.
Tinfoil Security tinfoilsecurity.com
Ainsley Braun CEO
Synopsys technology is at the heart of innovations that are changing the way people work and play.
Triox Nano smartriox.com
Roy Farfara MD, Founder & CTO
TrioxNano specializes in utilizing DNA nanotechnology in the fields of oncology and infectious disease.
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
Providing World Class Identity and Access Management Solutions
‘‘
More 20 years of experience in providing our own unique bank-grade Digital Identity solutions to server more than 250 leading financial services institutions, multi-national corporations and security-sensitive government agencies in the Asia Pacific Region.
Mr. Dutch Ng Chief Executive Officer i-Sprint
‘‘
A leading Bank-g
Cybersecurity Ide
Access Managem
Provider with soli
records in the As Region.
grade
entity and
ment Solution
id track
sia Pacific
COVERSTORY
i
-Sprint Innovations (i-Sprint) was founded by Mr. Albert Ching and Mr. Dutch Ng in 2000, Singapore. Back then, Albert and Dutch were working for a global bank, Citibank N.A. Through their years of security management experience, they had foreseen the upcoming trend for companies needing Identity and Access Management solutions (IAM). With this vision of creating IAM Solution that enables individuals, organizations and societies to build trust and identity assurance for powering huge productivity gain, they had moved on to take up the challenge of setting up i-Sprint to start their entrepreneurship journey. Currently, Albert is the ViceChairman and the Chief Technology Officer, and Dutch is Chief Executive Officer in i-Sprint. One of i-Sprint's core values is its Customer-Centric philosophy. Currently, i-Sprint is serving over 250 organizations worldwide, of which over 100 of them are from the banking and financial institution industry (FSI). With the strong experience in the FSI sector that demands the highest security protection and compliance requirements than any other industries, i-Sprint's products have been battle-tested to meet those stringent requirements. They have earned high praises from its customers for its security design and innovative product features. Extensive Cyber Security Solutions i-Sprint's Digital Identity Solutions help organizations to govern the verification of their users' identity and access protection. Leveraging the solution suite, enterprises can implement strong authentication, single sign-on, access control, identity management and end-to-end encryption solutions to safeguard asset, data, and transaction. i-Sprint's Digital Identity Solutions have embedded many of its patented technologies: A Hierarchy Model: This hierarchy model, when implemented, can allow security administrators to centrally manage user and application security-related attributes (authentication methods, access rights, privileges, access control rules) and other application attributes. One-Time Password Generation and Verification: The invention discloses a one-time password generation method and device, an authentication method, and an authentication system. Out-of-Band Dual Channel Authentication: This invention relates to the technical field of network-centric application security, more particularly to use dual communication channel to authorize an authentication or authorization request using two separate data communication channels.
COVERSTORY End to End Data Protection: This invention is to provide the end to end data security protection to address the security deficiency of traditional SSL connections and avoid the potential reply attacks for web services. Offering Solutions as per Business Requirements i-Sprint's key industry focus has been in the FSI industry, which demands the highest security standard solutions for deployment to meet the compliance requirements and deliver security protection for their business requirements. i-Sprint has been delivering bank-grade security solutions which are designed to exceed global financial services regulatory requirements and standards. i-Sprint's Digital Identity Solutions have been proven to meet the Compliance Guidelines, and Security Standards mandated the regulatory agencies such as Monetary Authority of Singapore's Technology Risk Management Guideline(TRM), Hong Kong Monetary Authority Internet Banking Guidelines, China Banking Regulatory Commission Guidelines, Payment Card Industry – Data Security Standard (PCI-DSS). Other standards include SOX, HIPAA, ISO/IEC20000, ISO/IEC27001, ISO27036 and CoBit4.0. In recent years with the widespread of cybersecurity threats, i-Sprint has expanded its customer base focus to serve enterprises in other industry sectors across the Asia Pacific region with their proven digital identity solutions to help organizations to tackle the threats.
business development strategy and product directions. He plays a key role in managing the financial and business performance of the company. Dutch has been in the IT industry for over 25 years. He has held senior management and executive-level positions for high tech companies and took on various challenging and operational roles with regional responsibilities. His vast operational experience has helped him to develop a wealth of practical and hands-on experiences in managing the critical operations from professional services organization, administration, and finance to customer care operations. He has worked in many countries such as the United States, Hong Kong, Taiwan, Malaysia, and Thailand and is fluent in speaking many languages. Before co-founding i-Sprint, Dutch spent four years in Citibank Regional Asia Pacific Technology Group, and he was responsible for implementing and deploying of technology solutions for the bank offices across 14 countries in the Asia Pacific region. Other than managing the global operation of i-Sprint, Dutch is also contributing his time and experience to support industry activities. Currently, Dutch is the Chairman of Cybersecurity Chapter at SGTech, a Singapore premier IT federation representing the industry interests to work with the relevant government agencies, and a member of Technical Work Group for Cybersecurity at WorldSkills Singapore to bring Singapore IT industry to the global scene.
AI in Security Solutions Three Tone Approach Artificial Intelligence (AI) is transforming many existing technologies and processes, which includes Digital Identity Solutions. AI can look at circumstances surrounding access requests, such as time, device type, location and resources being requested. This aid in monitoring any subtle user change in activities and provide necessary actions to automate identity assurance, authentication and authorization based on various risk level situations. For iSprint's product area, AI plays a major role in their adaptive contextual authentication, which dynamic authentication enforcement is already available in their digital identity products. A Renowned Trailblazer Dutch, the Co-founder and Chief Executive Officer of iSprint, has been working for the company since 2000. Dutch is instrumental in providing strategic leadership in
Due to Covid-19 pandemic, many business activities are affected. i-Sprint has adopted a digital approach by using solutions such as virtual meeting, webinar, digital marketing to engage and reach out to their customers. iSprint leverages a three Tone Approach to handle its customer relationship: Web Tone: This is their online content, which provides a one-way communication of their product and company information to their customers. Dial Tone: This is inbound and outbound communication with their customers. Customers may phone in or send email to i-Sprint to request information and i-Sprint will respond within one working day. Face Tone: Once the needs have been qualified, their sales
COVERSTORY organization will arrange for face to face discussion if possible or using online meeting to engage with their clients. i-Sprint has continued to enhance their Digital Identity Solutions to meet the latest market demands and their customers' requirements to have a competitive edge over their competitions: A Comprehensive Process of Analysis and Research Besides working with research firms such as Gartner, Fortune Business Insights, Aqniu, RoarTalk to participate in their research reports, i-Sprint also monitors the news/ popular tech portals for latest technology trends, and news related to the target industries to develop new product features/ update product technologies to serve the markets better. Its research program and methodology are based on information gather and analysis from multiple sources: Ÿ Industry and Technology Trends Ÿ Government and Financial Regulatory guidelines Ÿ Operational needs of their Focused Market Segments: FSI/ Government/ Regulated Industries Ÿ Feedback from the Industry and Thought Leaders Ÿ Continuous Evolution and Co-creation through Client Common Reporting Standard and Enhancement Requests Ÿ Working with System Integrators and other partners in other markets like Japan, Malaysia, Thailand, Malaysia, Hong Kong, China, etc. have also provided i-Sprint with some insights into the importance of PRODUCTIVITY over SECURITY. E.g. Japanese culture places considerable emphasis on PRODUCTIVITY and QUALITY. In this aspect, "security" is already assumed to be of the best that the world has to offer. Mapping the Future i-Sprint's vision is to be the world-class Solution Provider in IAM Solution that enables individuals, organizations and societies to build trust and identity assurance for powering huge productivity gain through digital identity and identity of things – "The Force of IdentityPlus" – to accelerate and extend the Circle of Trust. Over the years, i-Sprint has developed a range of products under Digital Identity Solution - AccessMatrix suite to
provide on-premises and cloud deployment and the product coverage has also been extended to protect the mobile platform via their YESsafe Mobile Security Suite. i-Sprint's Digital Identity Solutions have been deployed to help their clients to implement a seamless Omni-channel platform to engage their customers. The solutions have helped leading global and regional FSI, government agencies, telco providers, public utilities, manufacturers, healthcare providers, multi-national corporations, and others to address their cybersecurity requirements. Its knowledge and know-how in digital identity have enabled i-Sprint to excel its solutions in the Identity of Thing (IDoT) and innovate a new generation of Brand Protection Cloud Service Platform, AccessReal, for anticounterfeiting, track and trace and consumer marketing. The solution is integrated with Blockchain technology to provide the provenance information of the product and issue official product certificates. With its unchangeable nature, blockchain reduces the chances of unintentional mistakes and tampering, and its traceability and transparency also improved the process of a product recall. For the past two years, its solution has been able to win clients in publication, food and beverage, health products, automotive, pharmaceutical, and more. i-Sprint is diversifying its industries coverage to have more companies benefiting from their bank-grade solutions. Asia is still the fast-growing region in the world, and the company will continue to expand its coverage to in the region, especially China, which has been the fastestgrowing country for i-Sprint in recent years.
& & 20 The
Most
SUCCESSFUL
BUSINESSWOMEN to Watch, 2020
kimberly Khoury
Paving her Way in Sustainability Development
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
Expert in Identity Management
D
o you want to have more control in your store, do you want to make expensive key plans and administration unnecessary and do you want to work with the right information? That is all possible with EasySecure! EasySecure International, established in 2005, is a specialist when it comes to identity management. The company has fully dedicated itself to the identity management market with a focus on innovation by using cloud software, biometrics, mobile, and wireless applications. Access Control with Time Attendance The demand for access control, attendance, and time registration solutions are at an all-time high. Companies are faced with more and more temporary employees, different shifts, and opening hours which make it difficult and time-consuming to handle the access control and registration. Having been in the industry for over a decade now, the Netherlands-based EasySecure is well-positioned to offer cloud-based hardware-independent software - the EasySecure software that breaks the barriers of conventional access control, time registration, and integration tools. It all began in the year 2004 when the founder of the company came across some biometric products. It realized that the secret to success with access and identity management is registering with the right information and integrating the right solution with the correct business processes. That is when the team put their heads together to develop a revolutionary software package, EasySecure Software. Today, it is established as an access and identity management solution provider with over 7,000
18 | December 2020
companies using EasySecure's cloud-based software for access control; time, attendance, and visitor management; and project management. Identity Management = More Control The main challenge for organizations in the identity and access management arena is using the right software with the correct employee registration for various environments. As a middleware platform for identity management, EasySecure allows organisations to connect disparate applications to improve overall business efficiency and enhance scalability. For example, HR departments can send employee information to EasySecure, and time registration information can be sent to the client's HR software for planning and payroll. Mobile Registration As far as registration is considered, the software offers many different registration options. EasySecure believes that the ideal access control situation is a combination of the right components. With its software customers can choose from a wide range of registration methods including finger scans, facial recognition, registration by mobile phone, card readers, keypads, wireless cylinders, wireless door handles, lockers, and license plates recognition. This offers organizations the flexibility to decide on the registration methods best suited for every location. Through a card reader or by placing their mobile phones employees can log in to their respective departments, while the software gives managers access to any information related to employees. What further sets EasySecure apart is that the company's software undergoes external quality assurance, code-checks, and
www.insightssuccess.com
“We believe in delivering 'best of breed solutions' for different sections as per customer needs” Daan Kalkman Deputy Director
penetration tests multiple times a year to ensure the security and safety of the software and client data. Integrated Core Solutions The need of the hour is a modernized, dynamic platform that can easily integrate with customers' existing business processes, support multi-location companies, and add real value while creating safe environments. This is precisely what EasySecure brings to the table. Further, with a plethora of excellent software available today, every company wants to use the best available option to better execute everyday business operations. To facilitate this, it delivers 'best of breed solutions' for different sections as per customer needs. In these times EasySecure also sees companies changing from central office buildings to various smaller locations. Working at home is combined with work at different locations in smaller teams. As organizations tend to leverage different authentication methods for diverse environments, integration of all the authentication-based software with business processes is highly valuable. The company's highly secure and easy-to-use software focuses on three core areas: multi-location, integration, and registration. It is designed to support multiple languages and various roles. For example, a company in England can manage their subsidiaries located in different places. The authorized local officer in France can log in to the software using his preferred language and access the necessary location-specific data.
www.insightssuccess.com
About the Leader Daan Kalkman, Director, Werner Roest, CEO, and Evert Hazelhoff, Founder put their heads together and developed the cloud-based EasySecure software. The three believed in innovation, easy identity management, cloud software, and best of breed solutions. Every day since then they are working on a solution that breaks barriers of conventional access control and time registration systems. The Software needs to be intuitive, scalable, and easy to be implemented. EasySecure often sees that the software takes quite a while to learn how to use and the implementation can take weeks. The company's software is easy to use and with its cloud-based software, customer's environment and integration can be online the very same day. The organization focuses on innovation by using cloud software, mobile applications, biometrics, and wireless applications. It continuously invests in the latest technologies and the highest quality. EasySecure will continue to invest in new technologies and bring highquality cloud-based solutions for the customers. Over the next few years, EasySecure is expanding further into Europe.
December 2020
| 19
20 | December 2020
www.insightssuccess.com
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
www.insightssuccess.com
December 2020
| 21
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
22 | December 2020
www.insightssuccess.com
www.insightssuccess.com
December 2020
| 23
About the Author Dr Danil Korchagin is an innovator and senior expert in ICT. He specialises in signal processing, data analysis and software engineering. Having worked for industries, organisations and academia, Danil Korchagin has comprehensive experience in both the industrial and academic worlds. He has managed many ICT projects with outstanding performance outcomes. He is founder of Aicue.
Dr Danil Korchagin Founder Aicue
26 | December 2020
www.insightssuccess.com
Business Outlook
Living Through Fourth
Industrial Revolution
D
anil Korchagin set up Aicue, a technology company that targets to change the way audience videos are consumed on the web, in 2011. In this article, he shares his point of view on ongoing fourth industrial revolution and its impact on everyday life. We live in amazing time of fourth industrial revolution. The industrial revolution surpasses the scope of ICT, transforms the world and businesses, jobs and life styles. The concepts such as digital transformation, artificial intelligence and connected objects, incarnated into smartphones, are already hiding in our pockets. The self-driving cars leave science fiction and arrive into reality. The old professions go into
www.insightssuccess.com
oblivion and get replaced by new exciting jobs. The artificial intelligence based solutions are already present in many cross-domains and quite often used by professionals and businesses to smarter use time and improve productivity. These solutions can manage financial portfolios and decrypt genetic code, pilot robots and drive cars, entertain people and even be creative. As an example, the cliperie.com platform creates new compelling clips by automatically linking audience videos all together from big data cloud. The big data becomes de facto fuel of XXI century and industrial revolution. The amount of
information, which is being gathered and transmitted by digital gadgets, sensors and internet of things, surpasses any imagination. Constantly increasing and improving population of digital objects results in constantly improving quantity and quality of data, while the next 5G mobile networks are going to take care about increasing digital data traffic. The big data surrounds us and helps to come up with efficient solutions. There are already more than fifteen billion connected objects worldwide. The population of connected devices will surpass fifty billions in less than five years. The internet of things, network of connected devices, is already present in commercial and
December 2020
| 27
industrial, consumer and infrastructure areas: from connected wearable heart monitor wristbands to connected pullovers, from connected security cameras to connected alarms, from connected parking lot sensors to connected displays of available places. The internet of things in turn enables smart tiers of technologies as smart homes, smart parking, smart traffic control and smart cities. The smart home hubs control communication among connected thermostats and stores, heating systems and other connected objects to enable home automation, energy savings and higher quality of life. The smart cities enable to reduce traffic jams and adjust public transportation in real-time, tighten security control and predict unforeseen events, reduce noise pollution and improve air quality. Constantly connected digital gadgets continue to pull further more people from reality to social networks and virtual worlds. The choice of remote communication still outfights real life communication. The picture of the family together with each member navigating within its own virtual world on smartphone starts to be everyday occurrence. The same picture can be observed in the trains, airports and other places. However, some people started to apply reasonable moderation. Even when people put away connected gadgets and back to physical world, the following interaction might be with nearby humanoid robot. Powered with same artificial intelligence as their virtual compatriots, they can follow conversations, understand individual social signals and respond appropriately. Their social interaction ability keeps improving, making future humanoid robots irreplaceable companions and assistants in nursing homes and hospitals, hotels and commercial stores.
automate production helps industries to be more competitive on the global market and has positive impact on job market in many countries due to manufacturing stays at home instead of being moved overseas. The tangible shift in professions happens with all industrial revolutions. The current one is not an exception. Some professions get automated, freeing up people to do new tasks: data management, data interpretation, digital marketing management, robot supervision, process control, process moderation, intervention in unforeseen situations, quality control and so on. The automated places can enable work week reduction and equilibrate shift in social insurances caused by increasing life expectancy. The advances in technologies enable to process more data with less energy and smarter use available resources. The paradox in our society is that the focus still stays on profitability and growth over durability and climate sustainability. As consequence, the digital footprint on global energy consumption keeps increasing from year to year and can reach one fifth by 2030, regardless it is feasible to pursue industrial revolution at moderate pace within fixed energetic envelope until there is an excess of renewable energy. The years will pass. The artificial intelligence, big data and internet of things will become ordinary tools in many areas of our life just like electricity and telephones, internet and personal computers did during previous industrial revolutions. No one will be questioning them anymore. They stay under human control. The human society is free to decide up to which extent new technologies and innovations have to be validated, regulated and certified for future everyday use.
The industrial robots are separate topic. The global robot density in the manufacturing industries is accelerating around the world and there is already at least one industrial robot per 100 working people in more than 20 countries worldwide. The ongoing trend to
28 | December 2020
www.insightssuccess.com
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
Proving Identity, Digitally in Real-Time
T
oday when a person uses their credit or debit card to purchase something on the internet via mail order or telephone order, there is no efficient and convenient way for the merchant to confirm that the card is being used by its authorized owner. Additionally, the current methods offered by the card schemes, Verified by Visa and Mastercard 3D Secure, are almost universally disliked as the customer experience is also very poor.
Sedicii has developed a smartphone-based service that addresses this problem. In an interview conducted between Insights Success and Rob Leslie - CEO & Founder of Sedicii, he told us that Sedicii provides a platform that enables organizations to benefit from world-class authentication solutions to deliver easy-to-use strong customer authentication. Below are the highlights of the interview: What led to the inception of the company? Sedicii was established in 2013 after I found myself a victim of fraud when purchasing a camera online. The ensuant resolution from the fraud quickly led me to believe that the internet, while being convenient, was not user friendly when it came to privacy and obtaining recompense. I sought restitution, failed, and quickly came to the realization that the internet had a major accountability issue when it came to the legal enforcement of contracts. Describe the company and its extensive Intelligent Identity & Access Management Solutions which address all the needs of its customers. Sedicii is building the technology to offer a federated, global identity verification network in collaboration with governments, banks, telecoms companies, and utilities that uses privacyenhancing technologies at its core. The network allows for full privacy-preserving verification of individuals' identity which is fully compliant with GDPR and other privacy laws. At the heart of Sedicii's service is the Zero Knowledge Proof (ZKP) protocol. As a security solutions provider company, what contribution has the company made in assisting its clients in achieving measurable goals? Sedicii's services primarily allow customers to deploy real-time, fully digital, KYC/AML compliant verification services for its customers, clients, and end-users. The services ensure that customers have cost-effective, fully compliant information whilst being privacypreserving at all times. This safeguards our customers against regulatory sanctions, reputational damage and will also give end-customers confidence in their service provider.
30 | December 2020
www.insightssuccess.com
“The future of Digital Identity is based on authoritative data, not documents.�
Rob Leslie CEO & Founder
www.insightssuccess.com
December 2020
| 31
federated network by acting as authoritative sources of information. We are actively seeking more authoritative sources to join our network. How do you sustain in the current unpredictable markets and hectic competition? Strangely, in many ways, the Covid 19 pandemic has focused minds on the absolute need for digital solutions more firmly. Digital transformation in no longer optional; it is mandatory. People's lives have been changed unrecognizably in many ways. Business and online transactions have skyrocketed. With this dramatic increase in digital interaction, the incidence of frauds and scams has also increased enormously. Consequently, people want, dare I say it, are demanding, better internet services without the fear of falling victim to fraud, impersonation, scamming, or the risk of loss of either financial or personal identity. Since the beginning of the year, Sedicii has seen a significant acceleration in interest for our services. We are currently working with government agencies, tier-one financial institutions, and public service organizations to help them verify that their customers' credentials are valid and true. The Sedicii team, which currently numbers 17 employees based in Ireland, Canary Islands, UK, Germany, and Belgium are committed to making the federated network a reality. Obviously, as with any start-up, development requires investment and we are happy to say that like-minded entrepreneurs have stepped up recognising Sedicii's potential through their willingness to invest.
What is your vision for the Sedicii? And what would be the best roadmap for getting there? Sedicii's mission and vision is to create a global, federated identity verification network that has a very strong focus on privacy. The network will enable real-time identity verification whilst also complying with GDPR and other privacy laws. The network will be made up of trusted providers – including governments, financial institutions, utilities, telco's, and many other organizations that need to verify their customers are genuine whilst acting in a bona fide manner with regard to their transactions. The key is to be able to verify identity without having to expose customer data in the process. The development of the technology according to our roadmap is underway. As previously mentioned, we are currently working with a cohort of governments, financial institutions and organizations that will form part of the
32 | December 2020
Give a detailed description of your influence over the company and the industry. I am an Electronic Engineer having graduated from DCU in the 1980s. Being selected as a World Economic Forum Technology Pioneer has given me the opportunity to speak at Davos on cybersecurity, digital identity, and other technical issues affecting the world's economies. I worked in Japan for the first 20 years of my career, including at Dell where I was part of the management team that grew the company to almost 300 employees in its first four years with a $300m turnover. Subsequently, I was a partner in PTS Japan which was sold having achieved a $33m valuation at exit within five years of its start. After that, I returned to Ireland and co-founded Kyckr (ASX: KYK) in 2007 which is now listed on the Australian Stock Exchange. As I previously said, Sedicii was set up in 2013 and for three years I spent a lot of time researching the ZKP protocol and experimenting with a lot of things in the authentication and identity verification areas.
www.insightssuccess.com
The Age of DNA Nanotechnology About the Author Dr. Roy Farfara is a serial entrepreneur and innovator in the field of DNA nanotechnology. He specializes in utilizing DNA machinery to develop programmable treatment solutions. Among his inventions are self assembled programmable nanocapsules that can spontaneously capsulate many therapeutic molecules and a novel technology for the treatment of viruses such as Covid-19 that inhibits their infection. He is founder of TrioxNano a leading company in the field of programmable DNA nanotechnology.
D
r. Roy Farfara founded TrioxNano in 2015 with the intention to improve current medical treatments by benefiting from the vast potential of DNA nanotechnology. TrioxNano specializes in utilizing DNA nanotechnology in the fields of oncology and infectious disease. In this article he shares his views on DNA nanotechnology a field that he believes is the next technological health revolution . Most people are aware that DNA is the primordial genesis molecule coding the genetics of all life, yet only little are aware of its infinite potential to humanity in various sectors such as nanomedicine, biotechnology, biophysics, and computer science.
34 | December 2020
www.insightssuccess.com
Age of Advancement
www.insightssuccess.com
December 2020
| 35
DNA’s ability to create life and potential in nanotechnology is based on the following characteristics: 1. DNA is a relatively a stable molecule (we still find DNA from dinosaurs). 2. DNA bases can create long chains (a chromosome is millions of bases long). 3. DNA has a 4 letter coding (A, C, G, T). 4. DNA bases are very small measuring less than 1 nanometer (one divided by one billion of a meter) 5. DNA has a base pairing interaction, it's a “2 bit magnetic trait” it creates bonds between two or more strains, so that the base A is always linked to the base T and the letter G is linked to the base C (and vice versa). These 5 basic traits offer tremendous powers to those creators utilizing it to build things as will be depicted in the following article. By the year 2020 the scientific community is utilizing DNA store information (It is believed that DNA can store all the world data in a few rooms), build nanoscale machines to lift sort recognize materials. Such applications include TrioxNano's DNA based infectious treatments, a drug delivery platform that can be programmed by the treating physician to the specific mutations in the patient's cancer as well as many other solutions. DNA is enabling the fabrication of increasingly sophisticated nanostructures. This manufacturing approach is fully programmable and reproducible as it relies on the accurate specificity of DNA base–pairing interactions. DNA sequences can therefore be rationally designed to self-assemble into constructs of well defined dimensions, tailored shapes, and versatile functionality. Examples of DNA based nano technologies follow:
different pathogen epitopes. This technology has been tried on Covid19 cell based assay and showed preliminary results of up to 80% inhibition of infection. It is currently being optimized to reach higher efficacy and tested for safety followed by clinical trials.
Normal mechanism of receptor induced viral infection
Triox Nano Biotics inhibition of receptor induced viral infection
1. T.N.B Triox Nano Biotics. Is a nanotechnology that binds viruses to each other creating large aggregates that inhibit the virus ability to infect the human cells due to the aggregates size. The advantage of the platform compared to other treatments is that it only requires one binding site per pathogen to exert its action compared to a medicine needed to block infection that requires higher that 95% blockage to be useful. The platform is modular and can be programmed to
36 | December 2020
www.insightssuccess.com
T.N.C Triox Nano Caps are specially designed nano carriers that can be adopted to carry different medication and be programmed at the point of care (treating physician) to the specifics of each patient's pathology for example in the case of Triple Negative breast cancer according to BRCA, PD1, AS1141 positivity or levels of metabolites such as ATP, Zinc and Magnesium. Triox nano capsules offer substantial improvement over free chemotherapies in terms of efficacy and toxicity showing effects similar effect using only 1/100 of the original free chemotherapy dose in different human TNBC cells.
Dr. Farfara "DNA is the primordial molecule of life for the logical reasons explained above, I believe it is one of the most valuable tools offered to humanity to treat diseases. I foresee that DNA based nanotechnology treatments options are just around the corner (5-10 years). Examples for such technologies include TrioxNano's programmable self assembling nanocapsules (TNC) and treatments for viruses like the Covid19 pandemic.
www.insightssuccess.com
December 2020
| 37
Barney Chan CTO & Co-Founder Tindo
38 | December 2020
www.insightssuccess.com
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
TINDO Making Security Possible
I
n today's business climate, every minute counts. Managing IT services can be time-consuming and often frustrating. With winning IT security solutions, Tindo is here to help. The company delivers quality services in the most efficient way, and its experts will work collaboratively with customers to customize its offerings to their particular needs. Since Tindo's inception, it has delivered successful programs for many Enterprise Customers, Financial Institutes & Government Agencies, and growing the solution footprints alongside their business expansion. With modern businesses valuing efficiency and speed, it also helps clients streamline operational tasks through automation, enabling them to focus resources on less mundane tasks and redirect them to their core business. How it Started Barney Chan's co-founder - Terence, and Barney first met when they were colleagues in a security software company, where they worked with many organizations in addressing the cybersecurity challenges. Throughout the years, they noticed that one of the biggest barriers to adoption arises from the fear of
“
A leading system integrator, driven to make security possible in an ever-changing landscape.
www.insightssuccess.com
December 2020
| 39
integration complexity and trained resources. This was during an era where cybersecurity was gaining importance with the explosion of connected devices and users, both onprem and on the cloud. While they realized they can resolve targeted cybersecurity requirements as a software vendor, they wanted to contribute more to ease customer's adoption process and play a bigger role in nurturing like-minded young talents for the future. Driven by this shared passion, they co-founded Tindo in 2013 as a cybersecurity system integrator. Ability to Customise & Automate When Tindo first started in 2013 with a small 2-man team, it needed to be very focused and pivoted its solutions into only a few key pillars, one of them being Identity and Access Management (IAM). Tindo's suite of IAM solutions includes Privilege Access Management, Governance, MultiFactor Authentication, Zero-Trust, and Password-less Technologies. The company prides itself on the ability to customise and automate such solutions to integrate with its customer's unique environment, which is always the key to any successful implementation of Identity Security programs. Maximising the customers' returns on investment by proactively leveraging new technologies to enhance their deployed solutions is also one reason why customers choose to engage Tindo in a long-term partnership. A Holistic Platform Tindo offers a holistic platform to support customer's cybersecurity initiatives from design to operations. Today, it has grown into a team of 30 with an expanded portfolio of solutions, but IAM continues to be the core business pillar, with expanded use cases to support new technologies such as DevOps, AI, RPA, etc. The company prides itself on technical competencies that are backed by a team of certified and experienced professionals, with the ability to understand customer requirements, provide consultation in solution architecting, integrated delivery, and consistent quality support throughout the operational lifecycle.
provider who works with them to understand their business is crucial for any cybersecurity initiatives. The company's relationship with its customers is nurtured on the basis of a long-term partnership, and even in such uncertain times, it remains true to its core beliefs and continues to focus on its customers and making their needs the company's priority. A Sharp & Focused Mind Mr. Barney Chan is the CTO and Co-Founder of Tindo Pte Ltd and has over 15 years of Technical and Pre-Sales experience in the Information Technology sector. He oversees Tindo Group's technology strategy and roadmap. With his deep industry experience and leveraging on leading technologies, Barney works extensively with commercial, government, and leading financial institutions to improve cybersecurity posture. Prior to founding Tindo, Barney was the Senior SE in CyberArk Software Ltd and had previously worked in organizations such as Quantiq International and VASCO. He holds a degree in Bank and Finance from the University of London and a Masters in Computer Science from the University of Wales and is also CISSP certified since 2007. His vision for Tindo is to be the leading cybersecurity System Integrator in ASEAN. Testimonials: “Through Tindo, we have been able to continuously modernize our digital identity infrastructure and securely access and navigate the connected world.” “Due to Tindo's familiarity of Privilege Access Management features and functions, the project team designed customised plugins for the product to work seamlessly in our organization's sophisticated and complex IT infrastructure.” “The project's completion ahead of its scheduled timeline was attributed to the team's expertise and effort. We are a satisfied customer and entrust Tindo with the responsibility to implement the access management solution in our overseas operations in Asia.”
Trusted Provider for any Cybersecurity Having worked with customers from various sectors, with each having unique industry or business-specific requirements, Tindo always starts its customer journey by understanding both their internal and external considerations that govern the success of their cybersecurity initiatives – including business goals, security team, IT operations, regulatory, etc. For customers, having a trusted
40 | December 2020
www.insightssuccess.com
www.insightssuccess.com
December 2020
| 41
Digital Transfor 42 | December 2020
www.insightssuccess.com
Challenges Ahead
T
he world has gone digital, and there's no returning. Nearly everybody uses a mobile phone nowadays which assists them consistently to help decide, discover brands to purchase from or get familiar with an item. Today, the organizations that are ready to utilize technology and re-evaluate their plan of action for the future by optimizing digital transformation, will be ones in front of their competition. While this may look like great change, but it presents some novel challenges for organizations. Here we share probably the greatest challenges faced by the ever-evolving digital world and give a way ahead to each. #1Challenge The Changing Customer Experience We live in an experiential economy. Like never before, clients uphold how they experience brands. That stretches out to both on the web (online) and oine stores, just as social media or other potential touchpoints along the way. Furthermore, most organizations agree that client assistance will be simply the key way that they separate from their rivals.
rmation
Challenges in the Time of Crisis
www.insightssuccess.com
December 2020
| 43
The way to change is to building a client experience from the base up. Your objective ought to be to zero in on client ventures. If you enhance the touchpoints along this excursion rather than only attempting to win deals, at that point you'll have a superior potential for success at keeping clients around longer. This gives the chance to improve deals and maintenance, which means stable development in the years to come. It's likewise imperative to consider what we call the "specialty of the client experience." This expects you to investigate your present nearness, and discover approaches to survey the degree of delight in every client's understanding. #2Challenge Employee Pushback People are one of the mainstays of the business. You can't achieve your objectives without the help of the whole organization. The superseding worry for most organizations considering a digital push is employee adoption and how it will affect the organization's way of life and hierarchical structure. Huge numbers of your "privileged few" of employee may feel that their activity is compromised by these changes, which won't be useful for assurance or efficiency. Additionally, there's a noteworthy ability gap with regards to finishing the kind of progress that most organizations need. The handy people are as of now busy with other basic assignments, and can't be saved to fuel digital or train others. In case you need to make an organization culture that limits representative pushback and spotlights on being agile, you have to fabricate a client-driven culture. Choose to work on these three essential fields:
Customer administration Employee preparation and improvement Culture
#3Challenge Omnichannel Adaptation Nowadays, clients bounce from channel to channel when making a purchase. They'll look on your site, search from cell phones, or even stop by your store just to purchase online later. That implies extending your business by selling on commercial centers, your site, and through other digital methods. What's more, it additionally implies that you have
44 | December 2020
to build up a wide assortment of channels for help, and afterward embrace a client commitment framework that takes into account omnichannel selling. #4Challenge Poor Analytics 53% of present day organizations are disappointed with their examination capacities. There's more information to gather than any time in recent memory, and neglecting to gauge the correct ones could end in a disaster. Implement AI technologies to help improve data collection and personalization endeavors. AI and chatbots are as of now changing the way in which organizations crunch information and customize discussions with clients, and it won't be long until this training is inescapable. It's as yet worth proceeding cautiously into AI, however you have to begin looking in the near future. Better analytics implies better decision making, and the estimation of that can't be downplayed. #5Challenge Legacy Business Models Your business depends on a product and rules that have permitted it to survive to the present. In any case, now and again, that legacy can weight even more than an asset. Getting free from your legacy framework at the opportune time is basic to building yourself up in this digital world. What's more, most advertisers feel that legacy frameworks are as of now hamstringing client experience endeavors. There's no one-size-fits-all answer for this legacy issue. It will require development, an eagerness to acknowledge the danger, and a great deal of hard work. Try not to let the narrative of your business end with an inability to change. Conclusion The digital world will consistently be changing and developing, and it's dependent upon you to change with it. Try not to let the challenges your business faces in today’s digital world become offbeat detours. Rather, face them head on and find innovative solutions which will fuel accomplishment for a considerable length of time to come. -Shruti P Jambhale
www.insightssuccess.com
46 | December 2020
www.insightssuccess.com
The 10 Most Intelligent Identity & Access Management Solution Providers, 2020
www.insightssuccess.com
December 2020
| 47