Understanding the power of digital identity

SMART Access & Identity 2024 Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)


Shanaaz Trethewey.

The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, Chief Operating Officer for Comcorp South Africa, emphasises the pivotal role of individuals’ digital identities in unlocking this transformative potential.

In South Africa, where an estimated 38 million people are above 18, a significant proportion of the population can transact as adults. However, only a fraction of them (one in six) can provide verifiable income through a payslip, leading to increased risk and the need for extensive checks and balances in transactions.

Astonishingly, the country processes approximately four million credit applications each month, resulting in 48 million applications annually that invariably require proof of identity, often involving multiple verification checks during the transaction process. This number does not even account for verifications at healthcare facilities, educational institutions, and insurance claims, to name a few other examples.

An individual’s identity journey has evolved considerably over time. In the 1950s, manual registers and handshakes, to paper form, were all it took before being replaced with ID books and smart cards that stored various personal information, for example, on a bank card.

“The advent of fingerprint biometric technology today has shifted the focus to appreciating the uniqueness of individuals. Digital identity is no longer just a tool; it represents a vision of seamless interaction and integration in all sectors of our economy, but especially finance,” says Trethewey.

Digital inclusion and the role of digital identity in enabling frictionless transactions is another crucial factor in unlocking an individual’s potential for economic engagement. Platforms that facilitate the ease of fund exchange internationally exemplify the growing union between technology and financial activities.

“Companies across the globe are already leveraging open banking capabilities to provide digital identity verification services, bypassing traditional waiting periods. In emerging economies, the speed and efficiency of digital payment platforms like WhatsApp Pay in India and Brazil, for example, have facilitated the flow of money, reducing reliance on cash transactions and contributing to the formalisation of economies,” she adds.

As always, the concept of consent within the realm of digital identity holds immense significance. Trethewey emphasises the need for critical analysis of what consent entails and the opportunity it presents to revolutionise how individuals interact with the world and access products and services.

How the future may look

As artificial intelligence proliferates and identity fraud becomes a pressing concern, the need for robust tools to ensure undeniable identity verification will only grow. Trethewey urges businesses to embrace the evolving landscape and adopt sophisticated solutions to combat identity fraud while harnessing the potential of AI.

Trethewey suggests these three powerful principles to guide businesses in this transformative era:

1. Returning to first principles: This is vital, as adding layers to legacy systems may not address the underlying challenges effectively. The business community needs clarity on what they need to achieve. Taking a step back is critical to understanding what served us well in the past, but may not be relevant anymore.

2. Seeing the bigger picture: Adopting a holistic approach and viewing organisations beyond silos is crucial for unlocking a broader range of commercial opportunities. Things like eliminating duplication within a singular organisation can only be done if we take a step back and take stock.

3. Competitive collaboration: This fosters leveraging technical skills and business strengths, amplifying market reach, and unlocking true market potential. A culture of working together rather than solely competing against each other encourages the joint pursuit of mutually beneficial opportunities.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...