KYC trends for 2022

Issue 1 2022 Access Control & Identity Management

The way customers are engaging in today's new digital world has changed and is still evolving rapidly. We use technology to open bank accounts, work online and buy products. Technologies empower people to behave differently, which has led to digital disruption and a much more empowered consumer.


Shaun Strydom.

So says Shaun Strydom, founder, executive head and identity futurologist at Contactable, a digital identity orchestration company specialising in digital identity and biometric proofing. “At the same time, we now have legislation protecting consumers' data as it moves from a physical to a virtual world. In contrast, in the past we didn’t because there was no digital mechanism to do this.”

However, he says today's digital world requires different rules, regulations and a focus on the customer channel, which is why digital identity has become such a hot topic.

One clear thing, he says, is that more needs to be done, even though the industry is brimming with new solutions, approaches, strategies and initiatives to try and solve the puzzle of Know Your Customer (KYC) and identity.

"In a digital world, identity cannot be viewed in isolation. There are a multitude of factors that are linked to an individual or entity. How that final identity is made up needs to have context, based on the individual use-case, value, customer-experience and similar."

And while the world has been moving online for some time now, the Covid-19 pandemic accelerated this shift, with increased use of online banking, healthcare apps, mobile wallets, gaming websites and even streaming platforms. There are many more opportunities to defraud businesses and individuals because it's harder to know who that person is in an online world.

The need to prove that an online user is who they say they are have never been greater, but particularly for those organisations who deal with high-risk transactions and sensitive data, such as financial services and healthcare, explains Strydom. "Dealing with the full digital identity and KYC journey within the customer ecosystems enables organisations to implement and provide their products and services to digital consumers. This is the last mile and the most complex part of digitisation."

It's about creating the ability to move the customer from an essential onboarding and digital identity to a customer that can participate in the full digital ecosystem.

Identity orchestration

This, he says, is where orchestration technology fits into the equation. It solves the complex challenges associated with anti-money laundering (AML), KYC, Know-Your-Business (KYB) and fraud management bringing these together to make them more effective within a customer journey.

He says in today's digital and virtual world, where technology is so advanced, traditional KYC strategies are not enough and organisations should instead look to orchestration platforms to properly deal with their digital customer.

Gartner forecast that by 2023, 75% of organisations will be using a single vendor with strong identity orchestration capabilities and connections to many other third parties for identity proofing and affirmation, which is an increase from fewer than 15% today.

Orchestration platforms comprise automated workflow decisioning, seamless third-party vendor integration and workflow builders. However, while many onboarding and identity proofing vendors are known to have 'orchestration' capabilities, they stop at creating one key element. Without the remaining two features, they cannot adequately orchestrate across the entire customer journey and ecosystem.

There is already a plethora of onboarding technologies, including biometrics and other great KYC technologies. Still, these generally do not manage the complexity of how consumers are interacting across an interoperable product and services ecosystem. "This is why digital identity and orchestration platforms are now the hottest topics in town because they were designed to deal with the complexity that organisations need to navigate."

He says there is a requirement to co-ordinate multiple channels, multiple products, multiple services, multiple data providers and multiple vendors across a customer ecosystem. Orchestration platforms enable organisations to navigate this from one singular solution. "Orchestration enables the company to bring these together to make sure the customer experience isn't too arduous or disjointed."

Finally, he says critical to any data protection strategy is one that harnesses the benefits of digital identity verification and authentication. By employing orchestration to help with onboarding and KYC, organisations can protect their customers in today's digital world while digitally improving access to their products and services.

In turn, this will see customers being empowered, gaining more control of their data, and defining who they want to do business with.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...