Understanding the power of digital identity

SMART Access & Identity 2024 Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)


Shanaaz Trethewey.

The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, Chief Operating Officer for Comcorp South Africa, emphasises the pivotal role of individuals’ digital identities in unlocking this transformative potential.

In South Africa, where an estimated 38 million people are above 18, a significant proportion of the population can transact as adults. However, only a fraction of them (one in six) can provide verifiable income through a payslip, leading to increased risk and the need for extensive checks and balances in transactions.

Astonishingly, the country processes approximately four million credit applications each month, resulting in 48 million applications annually that invariably require proof of identity, often involving multiple verification checks during the transaction process. This number does not even account for verifications at healthcare facilities, educational institutions, and insurance claims, to name a few other examples.

An individual’s identity journey has evolved considerably over time. In the 1950s, manual registers and handshakes, to paper form, were all it took before being replaced with ID books and smart cards that stored various personal information, for example, on a bank card.

“The advent of fingerprint biometric technology today has shifted the focus to appreciating the uniqueness of individuals. Digital identity is no longer just a tool; it represents a vision of seamless interaction and integration in all sectors of our economy, but especially finance,” says Trethewey.

Digital inclusion and the role of digital identity in enabling frictionless transactions is another crucial factor in unlocking an individual’s potential for economic engagement. Platforms that facilitate the ease of fund exchange internationally exemplify the growing union between technology and financial activities.

“Companies across the globe are already leveraging open banking capabilities to provide digital identity verification services, bypassing traditional waiting periods. In emerging economies, the speed and efficiency of digital payment platforms like WhatsApp Pay in India and Brazil, for example, have facilitated the flow of money, reducing reliance on cash transactions and contributing to the formalisation of economies,” she adds.

As always, the concept of consent within the realm of digital identity holds immense significance. Trethewey emphasises the need for critical analysis of what consent entails and the opportunity it presents to revolutionise how individuals interact with the world and access products and services.

How the future may look

As artificial intelligence proliferates and identity fraud becomes a pressing concern, the need for robust tools to ensure undeniable identity verification will only grow. Trethewey urges businesses to embrace the evolving landscape and adopt sophisticated solutions to combat identity fraud while harnessing the potential of AI.

Trethewey suggests these three powerful principles to guide businesses in this transformative era:

1. Returning to first principles: This is vital, as adding layers to legacy systems may not address the underlying challenges effectively. The business community needs clarity on what they need to achieve. Taking a step back is critical to understanding what served us well in the past, but may not be relevant anymore.

2. Seeing the bigger picture: Adopting a holistic approach and viewing organisations beyond silos is crucial for unlocking a broader range of commercial opportunities. Things like eliminating duplication within a singular organisation can only be done if we take a step back and take stock.

3. Competitive collaboration: This fosters leveraging technical skills and business strengths, amplifying market reach, and unlocking true market potential. A culture of working together rather than solely competing against each other encourages the joint pursuit of mutually beneficial opportunities.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.