Understanding the power of digital identity

SMART Access & Identity 2024 Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)


Shanaaz Trethewey.

The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, Chief Operating Officer for Comcorp South Africa, emphasises the pivotal role of individuals’ digital identities in unlocking this transformative potential.

In South Africa, where an estimated 38 million people are above 18, a significant proportion of the population can transact as adults. However, only a fraction of them (one in six) can provide verifiable income through a payslip, leading to increased risk and the need for extensive checks and balances in transactions.

Astonishingly, the country processes approximately four million credit applications each month, resulting in 48 million applications annually that invariably require proof of identity, often involving multiple verification checks during the transaction process. This number does not even account for verifications at healthcare facilities, educational institutions, and insurance claims, to name a few other examples.

An individual’s identity journey has evolved considerably over time. In the 1950s, manual registers and handshakes, to paper form, were all it took before being replaced with ID books and smart cards that stored various personal information, for example, on a bank card.

“The advent of fingerprint biometric technology today has shifted the focus to appreciating the uniqueness of individuals. Digital identity is no longer just a tool; it represents a vision of seamless interaction and integration in all sectors of our economy, but especially finance,” says Trethewey.

Digital inclusion and the role of digital identity in enabling frictionless transactions is another crucial factor in unlocking an individual’s potential for economic engagement. Platforms that facilitate the ease of fund exchange internationally exemplify the growing union between technology and financial activities.

“Companies across the globe are already leveraging open banking capabilities to provide digital identity verification services, bypassing traditional waiting periods. In emerging economies, the speed and efficiency of digital payment platforms like WhatsApp Pay in India and Brazil, for example, have facilitated the flow of money, reducing reliance on cash transactions and contributing to the formalisation of economies,” she adds.

As always, the concept of consent within the realm of digital identity holds immense significance. Trethewey emphasises the need for critical analysis of what consent entails and the opportunity it presents to revolutionise how individuals interact with the world and access products and services.

How the future may look

As artificial intelligence proliferates and identity fraud becomes a pressing concern, the need for robust tools to ensure undeniable identity verification will only grow. Trethewey urges businesses to embrace the evolving landscape and adopt sophisticated solutions to combat identity fraud while harnessing the potential of AI.

Trethewey suggests these three powerful principles to guide businesses in this transformative era:

1. Returning to first principles: This is vital, as adding layers to legacy systems may not address the underlying challenges effectively. The business community needs clarity on what they need to achieve. Taking a step back is critical to understanding what served us well in the past, but may not be relevant anymore.

2. Seeing the bigger picture: Adopting a holistic approach and viewing organisations beyond silos is crucial for unlocking a broader range of commercial opportunities. Things like eliminating duplication within a singular organisation can only be done if we take a step back and take stock.

3. Competitive collaboration: This fosters leveraging technical skills and business strengths, amplifying market reach, and unlocking true market potential. A culture of working together rather than solely competing against each other encourages the joint pursuit of mutually beneficial opportunities.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.