Digitally transforming identity ­relationships

April 2016 Editor's Choice, Access Control & Identity Management, Information Security

We have long been living in a world where technology has been used to assist and hopefully improve the business and personal tasks we complete on a daily basis. In the consumer space, however, a digital transformation has taken place which has made almost everything personalised.

This personalisation, consider how you work and play on your smartphone for example, has created expectations for the way things should work in the business world. In short, it has created an appetite among people for the same type of personal relationship in everything they do in business. In the business world to date, this type of relationship has been out of reach because of the limits of technology. Companies have simply not had the technical capabilities to create a more personalised relationship with customers on a large scale.

This is changing, however. Hi-Tech Security Solutions spoke to Mauro Solimene, VP security and API management at CA, along with Michael Horn, security head at CA Southern Africa about the digital transformation happening in the business world that will allowing more personalisation and automation, as well as increased profit per customer, if done correctly.

This digital transformation is not simply about automation, or speeding business processes up, it is all about the relationships companies have with customers, suppliers and partners. It is common knowledge that we privilege those with whom we have a personal relationship, which is why many people stick with their existing insurance broker, for example, even though they can get a better deal somewhere else.

Businesses therefore want to create such a personal relationship with customers to keep them loyal and increase revenue from each one. One way is to have a personal sales person to deal with each customer, but this is unrealistic in terms of the number of people an organisation would have to hire. We therefore need to rely on technology to do the analysis and identification of who the customer is and what their tastes and requirements are.

Central to this ideal, is a digital identity. Solimene explains that this digital identity is not simply an online username and password, or your Facebook identity, or any avatar. The digital transformation we require demands a new identity that encapsulates who you are in totality and puts your identity at the centre of the economy – global, national and personal.

Unfortunately, the more information and the more accurate the digital identity is, the better pickings there are for identity thieves and the more damage they can do if they can get hold of ‘you’. This new digital identity will therefore require advanced security technology to store, maintain and keep the identity current, and protect it.

What is this digital identity?

Mauro Solimene.
Mauro Solimene.

Solimene explains that the digital identity in question is “all digital”, consisting of a rich mixture of data that defines you. And it is interchangeable. For example, if you are travelling and you lose your passport, you are going to have a hard time. If, however, we move to a mechanism that stores our identity digitally in a safe and trusted format, your identity can be verified without requiring a passport or any individual form of identity.

Most people would assume this digital identity would be a biometric of some form that wouldn’t require additional documentation. But the fact is, whatever identity mechanism you select, it can be faked if your opponents have the appropriate resources.

So what would this digital identity consist of? Solimene explains that it could incorporate anything uniquely related to you. This includes your behaviour, tastes, relationships and basically any information that surrounds you and defines you – which can and probably will include biometrics. The digital identity is an amalgamation of all these aspects and is not reliant on one. If someone fakes your fingerprint, for example, the lack of any of the other characteristics would raise a flag.

With access to this digital identity, companies would be able to automatically tailor services and solutions to each person’s requirements and tastes, delivering personal service to all. More importantly, it will enable companies to build trusted relationships that extend beyond their traditional businesses. With a logical identity and access engine securely maintaining identities, business will be able to capitalise on its assets and see you as one individual over multiple encounters. In other words, you won’t need to give your identity information multiple times to the same bank; everyone in the bank will see you as the same person with all the relevant information about you available to them.

The difference in the creation of a single digital identity is trust. It has to be assured and secured to allow all parties to interact and develop a personal relationship. Some companies are already appointing digital transformation officers – or a similar title – to advance this development and develop an identity layer that is abstracted from the physical database, turning what was seen as masses of chaotic personal data into unique identities.

Michael Horn.
Michael Horn.

And this is not something happening far away. Horn says digital transformation initiatives are already underway in some large South African companies, looking to ensure they have the edge in gaining and retaining customers for the long term.

Understanding that it is a trust relationship must obviously ensure that security and privacy is at the centre of the transformation, yet, while being secure it must not limit the scope of organisations’ digital transformation exercises. This implies that security must be central to the organisation at every level to ensure there are no weak points through which customers’ identities can be compromised.

For more information contact CA Southern Africa, +27 (0)11 417 8645, joanne.cawrse@caafrica.co.za, www.ca.com/za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...