Friday, January 22, 2021

Innov8tif Obtained ISO 27001:2013 Certification for its Provisioning of Mission Critical e-KYC Services

Kuala Lumpur, Malaysia, 21st January 2021 - Innov8tif Solutions Sdn. Bhd. (Innov8tif), a fast-leading Artificial Intelligence-powered ID assurance technology company in Southeast Asia, announced today that it has been certified ISO 27001:2013 by Guardian Independent Certification (GIC) after an extensive audit of Innov8tif’s internal operations. GIC is accredited by Joint Accreditation System of Australia & New Zealand (JAS-ANZ) as a conformity assessment body that assesses and certifies organisations conforming to ISO 27001 standards

ISMS certified for ISO 27001:2013 Conformity

ISO 27001 is the most authoritative and widely recognised set of requirements on information security management systems (ISMS). 

“By meeting the extensive criteria of these standards, Innov8tif proves its commitment to protect their customer’s sensitive information, enhance the reliability and security aspects of systems, and improve business continuity management,” says George Lee, CEO of Innov8tif.

George highlights that Innov8tif is also committed to consistently improving the quality of EMAS™ eKYC product suite and improving the customer and business partner confidence with increased business resilience, improved management processes and integration with corporate risk strategies. Gaining the ISO 27001:2013 certification from international authority in information security management marks a significant milestone in Innov8tif's business of provisioning EMAS™ eKYC solutions. 

Friday, January 15, 2021

Why is eSIM the Future?


Image source: Unsplash


In short, the embedded SIM chip, eSIM is precisely the sort of game-changing development in digital automation that could transform the mobile industry. All involved, from customers to chipset producers, and everyone in between, can feel the effect of this new technology.

Wouldn't it be good if there was a way, once you arrive, to simply turn on your phone and instead link to a local carrier at local rates? Interestingly, this technology exists and it's been on the market for several years now. Welcome to the eSIM branch.


What is eSIM? 

eSIM is a shortened version of embedded SIM, where SIM is an acronym for Subscriber Identity Module. So, an eSIM is an Embedded Subscriber Identity Module.

Meaning that unlike standard SIM cards you can’t take it in or out of the device. That might sound like a bad thing, but it’s designed so that you don’t have to, as rather than being locked to a specific network the SIM card can change network when you do.


Future for Travelers

There is no doubt that eSIMs will be a smoother and more convenient way to join carriers. Simply buy a plan from your computer, follow any instructions for authentication, select a form of payment, and you’re done! You can do this from the luxuries of home or the airport.


Image source: Unsplash


eSIMs are perfect for frequent flyers, allowing them to remain connected regardless of how frequently or how unexpectedly they alter locations. However, even for those who tend to be home-based, it makes travel easier, especially for those who go back and forth between two countries regularly.

It also helps with waterproofing as there’s one slot less that can be invaded by liquids. eSIM technology could help lower manufacturing cost, helping it become more attractive, price-wise, to the consumer. Digitization usually tends to be cost-effective.

Monday, December 21, 2020

Why low-code Development Matters, especially during COVID-19


Platforms for low-code creation allow organizations to build personalized business applications and services, removing inadequacies that once went unacknowledged due to a lack of resources. Low-code and no-code platforms, veiled in business-speak and terminology, are simply systems that enable non-coders to develop their own applications. In order to intuitively construct usable and attractive business systems, they typically feature drag-and-drop features. Instead of requiring a developer to work on a process, the individuals involved in the workflow can create an application that satisfies all their needs. There is an intrinsic benefit to functionality like this and using low-code can accelerate digital automation and empower an organization’s digital strategy.

In recent years, low-code and no-code instruments have been gradually recognized. In addition to undermining companies and their continuity, the COVID-19 pandemic has also threatened the core operations of firms. Many depend on low-code or no-code platforms because of their inability to employ experienced programmers, developers and software engineers to build applications, particularly start-ups and small businesses, with businesses trying to create applications to improve their processes and enhance customer experience.


What is Low-code?

Using a graphical user interface, low-code development platforms enable companies to create mobile and web applications and automate much of the manual processes to increase quality and deployment time. The low-code platform provides a way to modernize its legacy apps and develop responsive applications that meet the needs of business users for CIOs dealing with shrinking IT budgets and skills shortages.

In short, these tools make the creation of applications simple. Anyone, regardless of technical skill, can construct applications with drag-and-drop features, intuitive process flow capabilities and visual guidance. This allows some workers, also referred to as 'citizen developers' who are not generally part of the IT team to take control, streamline common development activities, improve productivity and eventually take some of the pressure of the IT and development teams that are overwhelmed.


Low-code and no-code: What are the Differences?

While somewhat similar, a major difference exists between no-code and low-code solutions. Although the distinction is fairly apparent, no-code creation is fitting for those with a minimal background in coding, , while low-code can have major business implications as the low-code platforms do have a coding aspect involved. At the enterprise level, no-code and low-code platforms have taken off with large corporations encouraging citizen developers and tech savvy power users within their organizations to create new processes for their businesses.

Tuesday, November 10, 2020

The development of e-KYC production use cases in Southeast Asia

You may have come across the term e-KYC in the news lately. By removing paper-based procedures, e-KYC (electronic know your customer) can help enhance the entire identity authentication process, which reduces costs and time spent on customer identity authentication while complying to the due diligence. 

Unbanked customers can open new accounts, make a payment, apply for loans digitally or even invest in a financial instrument with just a few clicks on their smartphones and online self-service verification. This enhances the customer experience journey for a digitally savvy consumer based. 

Verifying customers by using paper-based identification and photo ID cards has its drawbacks. Identity verification by human eyeballing is time-consuming as it requires humans to manually read through the documents and verify pictures against identification documents, just imagine how many applications that need verification in a day!

In contrast, eKYC solutions that authenticate customers by using advanced technology such as Artificial Intelligence and machine learning simplifies the identity verification process. The identity verification process only takes a minute or so, making the entire process real-time to customer outreach. 

Southeast Asia surges towards e-KYC

As financial institutions aim to grow their customer bases while preventing fraud, many companies in the Southeast Asian region have also made announcements related to biometrics programmes, deals, as well as awards for technology supporting financial services.

Countries with large populations like Indonesia and the Philippines, are huge archipelagic countries. The strategic location makes financial services conventionally only in urbanized areas. Integrating eKYC solutions makes it more cost effective to drive a financial inclusion agenda, with the simplifying business process and avoiding security risks.

Since the global pandemic COVID-19 outbreak, many businesses realize the fact that physical outreach may not be a suitable permanent solution for customer acquisition, as the pandemic has brought fear to contact-based biometrics systems, such as fingerprint scanners. 

BFSI industry moves towards digital experiences

When talking about digital customer onboarding progress in Malaysia, you may have come across this international remittance, Valyou that offers a fully digital onboarding experience. Valyou is licensed by the Central Bank of Malaysia under the Money Services Business (MSB). With the eKYC solution implemented in their apps, it enables foreign worker communities to create their account without having to go through face to face counter service.

In traditional ways, those who work in remotely located estates or plantations would have to go through about an hour or so to travel to the nearest town.  Not only will it increase customer’s acquisition and retention, but it also drives a seamless customer journey. Ultimately, a more cost-effective remittance fee made possible by advanced technology. 

Wednesday, November 4, 2020

Why is Google changing to phone notification as the default option for 2-step sign-in?


Source: freepik (senivpetro)


We live in a world with advanced security mechanisms such as biometric authentication. However, an important part of staying secure online is the use of something that’s probably been around for much longer; 2-step verification.   

Many services provide 2-step verification and (where appropriate) you can consider using it. It may be seen as troublesome due to the extra steps involved and this is one of the things that stops people from enabling 2-step verification. However, Google makes it simple with "Google Prompt".

In essence, the new "Prompt" simply sends a text alert to your mobile instead of delivering a code asking if you are trying to sign in. You confirm, and that's basically it. It signs you in instantly with the touch of a button. And, on top of that, it is available for both Android and iOS.

What this means is, after you insert your email address and password, you can secure your Google account with an extra login confirmation with a click. Alternatively,  it is possible to perform 2-Step Verification (2SV) through an SMS, Google Prompt, an authenticator app, or a security key.




Google Prompt

Google Prompt has been there for a few years and for users who allow 2-step verification, it's the primary option. Prompt is more reliable than SMS because, rather than a phone number, it is linked to your Google account.

Monday, October 5, 2020

Why Low-code Development Matters?

Developers were afraid when the low-code platform market first started to expand. They worried that their work would be replaced by low-code platforms and had concerns that they were not fit to perform mission-critical tasks. However, in reality, most low-code platforms are very reliable with regard to helping developers respond quickly and in helping them be more agile.

Here are a few reasons why low-code development has become even more relevant and may even reach far beyond mobile.

Picture source: Pexels


Offering simplicity and convenience

Leading transformational initiatives is important given today's business environment climate. Nevertheless, IT teams are spread thin. They handle dynamic IT environments while serving business lines, developers, security and, more and more, remote employees.

That's where creation with low-code will benefit. Using a drag-and-drop interface to organise data and logic elements, a low-code framework helps corporate users to be citizen developers and easily build custom applications, according to one's requirement and departmental system . It lets them get the knowledge they need quickly to solve business challenges and innovate to better satisfy consumer needs. At the same time, development teams can concentrate on more nuanced strategies for change that involve their specific skill sets.


Speed to market

In the past, it was difficult just to find a software engineer. For start-up founders and business teams alike, IT-related skills shortages have remained an issue because they simply lack a supply of healthy, available engineering talent. Low-code/no-code solutions circumvent this issue by letting anyone create his or her own MVP, regardless of technical competence.

Thursday, September 24, 2020

Why Were You Asked to Capture a Selfie Photo When Doing Online ID Verification?

With the current COVID-19 global pandemic crisis and the progress of digital adoption initiatives around the globe, businesses are feeling the brunt of the force. This is in line with a barrage of new practices moving forward. In line with the rise of facets of the new norm, low-touch and physical distancing practices, online ID verification technology is being used more frequently. 

In fact, capabilities for digital verification (including those related to the recognition of faces) are being relied on as companies, retailers, service providers, and brands seek to bring convenience, safety and speed to their online processes and transactions. 

With that being said, there may be some people who still wonder about the significance of capturing their selfies and identity cards when signing up to a digital platform. Is it safe to share selfies online?


Photo source: pexels


There are two main methods of facial ID capturing

For the most part, facial verification standards often require users to submit a selfie of themselves as part and parcel of the ID verification process. There are two frequently used methods for this. The first method is to upload a photo of a selfie, and the second method is to upload a photo of yourself holding your identity document. 

For manual verification process through eyeballing, the second method is the recommended implementation option because it is much more unlikely that hackers can find a victim's portrait photo in this pose readily available from social media profiles or other internet sources. On the other hand, the first method (capturing a selfie from a live camera) is a good option too when the facial verification process is automated with technology. Often, the facial sighting automation would require liveness detection capability to be built as part of the automation, either through the approach of:

i. active liveness detection (require subject to explicitly follow through some prompts such as face feature movements), or
ii. passive (without requiring any explicit movement).