Digitally transforming identity ­relationships

April 2016 Editor's Choice, Access Control & Identity Management, Information Security

We have long been living in a world where technology has been used to assist and hopefully improve the business and personal tasks we complete on a daily basis. In the consumer space, however, a digital transformation has taken place which has made almost everything personalised.

This personalisation, consider how you work and play on your smartphone for example, has created expectations for the way things should work in the business world. In short, it has created an appetite among people for the same type of personal relationship in everything they do in business. In the business world to date, this type of relationship has been out of reach because of the limits of technology. Companies have simply not had the technical capabilities to create a more personalised relationship with customers on a large scale.

This is changing, however. Hi-Tech Security Solutions spoke to Mauro Solimene, VP security and API management at CA, along with Michael Horn, security head at CA Southern Africa about the digital transformation happening in the business world that will allowing more personalisation and automation, as well as increased profit per customer, if done correctly.

This digital transformation is not simply about automation, or speeding business processes up, it is all about the relationships companies have with customers, suppliers and partners. It is common knowledge that we privilege those with whom we have a personal relationship, which is why many people stick with their existing insurance broker, for example, even though they can get a better deal somewhere else.

Businesses therefore want to create such a personal relationship with customers to keep them loyal and increase revenue from each one. One way is to have a personal sales person to deal with each customer, but this is unrealistic in terms of the number of people an organisation would have to hire. We therefore need to rely on technology to do the analysis and identification of who the customer is and what their tastes and requirements are.

Central to this ideal, is a digital identity. Solimene explains that this digital identity is not simply an online username and password, or your Facebook identity, or any avatar. The digital transformation we require demands a new identity that encapsulates who you are in totality and puts your identity at the centre of the economy – global, national and personal.

Unfortunately, the more information and the more accurate the digital identity is, the better pickings there are for identity thieves and the more damage they can do if they can get hold of ‘you’. This new digital identity will therefore require advanced security technology to store, maintain and keep the identity current, and protect it.

What is this digital identity?

Mauro Solimene.
Mauro Solimene.

Solimene explains that the digital identity in question is “all digital”, consisting of a rich mixture of data that defines you. And it is interchangeable. For example, if you are travelling and you lose your passport, you are going to have a hard time. If, however, we move to a mechanism that stores our identity digitally in a safe and trusted format, your identity can be verified without requiring a passport or any individual form of identity.

Most people would assume this digital identity would be a biometric of some form that wouldn’t require additional documentation. But the fact is, whatever identity mechanism you select, it can be faked if your opponents have the appropriate resources.

So what would this digital identity consist of? Solimene explains that it could incorporate anything uniquely related to you. This includes your behaviour, tastes, relationships and basically any information that surrounds you and defines you – which can and probably will include biometrics. The digital identity is an amalgamation of all these aspects and is not reliant on one. If someone fakes your fingerprint, for example, the lack of any of the other characteristics would raise a flag.

With access to this digital identity, companies would be able to automatically tailor services and solutions to each person’s requirements and tastes, delivering personal service to all. More importantly, it will enable companies to build trusted relationships that extend beyond their traditional businesses. With a logical identity and access engine securely maintaining identities, business will be able to capitalise on its assets and see you as one individual over multiple encounters. In other words, you won’t need to give your identity information multiple times to the same bank; everyone in the bank will see you as the same person with all the relevant information about you available to them.

The difference in the creation of a single digital identity is trust. It has to be assured and secured to allow all parties to interact and develop a personal relationship. Some companies are already appointing digital transformation officers – or a similar title – to advance this development and develop an identity layer that is abstracted from the physical database, turning what was seen as masses of chaotic personal data into unique identities.

Michael Horn.
Michael Horn.

And this is not something happening far away. Horn says digital transformation initiatives are already underway in some large South African companies, looking to ensure they have the edge in gaining and retaining customers for the long term.

Understanding that it is a trust relationship must obviously ensure that security and privacy is at the centre of the transformation, yet, while being secure it must not limit the scope of organisations’ digital transformation exercises. This implies that security must be central to the organisation at every level to ensure there are no weak points through which customers’ identities can be compromised.

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected], www.ca.com/za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Autonomous construction site protection
Editor's Choice Perimeter Security, Alarms & Intruder Detection
Ajax provides an autonomous security solution for a German construction site that is easy and flexible to install. It provides security against intrusions and theft via a 360-degree view.

Read more...
SMART and secure estates in Cape Town
Technews Publishing Axis Communications SA Gallagher DeepAlert Nemtek Electric Fencing Products Editor's Choice
In February 2024, SMART Security Solutions emigrated to the Western Cape to host its first SMART Estate Security Conference in the region in many years. For the day, we took over the prestigious D’Aria Wine Estate.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...
Multi-modal access control solutions
Suprema neaMetrics Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Suprema’s latest multi-modal access terminals are top-of-the-range, highly secure, easy to install, and easy to use. They feature biometrics, mobile access, and RFID and are both PoPIA and GDPR compliant.

Read more...
Battery-powered video doorbells
Ring Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Ring has announced the latest addition to its line of video doorbells. The Battery Video Doorbell Pro builds on the capabilities of its predecessor, providing greater value and convenience for homeowners.

Read more...
Tackling estate entrance challenges
Turnstar Systems Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The Velocity Raptor’s retractable spikes deter criminals from entering estate premises; equipped with LED lights, it provides visibility during the day and night, and in adverse conditions.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...
Digital transformation in estate environments
Regal Distributors SA Products & Solutions Access Control & Identity Management Residential Estate (Industry)
Digital transformation has brought all users into digital processes across every industry and activity, interlinking activities and crossing industry boundaries. This complexity leads to significant changes in previously established workflows, especially in visitor management.

Read more...