Share:
Written by:
Tags:
InTouch is open for integration.
Share:
Written by:
Tags:
The InTouch Tech Stack at a glance.
InTouch Use Cases
Install a secure and compliant platform to run and authenticate your business processes.
Share:
Written by:
Tags:
Install a secure and compliant platform to run and authenticate your business processes.
InTouch Platform
The InTouch Platform is able to reduce manual effort, set up compliant mechanisms and combat fraud.
Share:
Written by:
Tags:
The InTouch Platform is able to reduce manual effort, set up compliant mechanisms and combat fraud.
Authenticated Instruction
A secure and intuitive way to receive authenticated instructions from your clients. This enables real self service for the user and automated user instruction, request and query processing for your Organisation. Fraud is reduced through the increased level of trust
Share:
Written by:
Tags:
A secure and intuitive way to receive authenticated instructions from your clients.
This enables real self service for the user and automated user instruction, request and query processing for your Organisation. Fraud is reduced through the increased level of trust brought by the biometric authentication.
Watch the demo video below:
InTouch – Authenticated Instruction
Staying InTouch amid quarantine (and thereafter)
Countries, cities, businesses and schools across the world face quarantine and closures, in the wake of COVID-19. While this global panic will doubtless have far-reaching economic consequences, the need to remain in touch, engaged and in communication with the world
Share:
Written by:
Tags:
Countries, cities, businesses and schools across the world face quarantine and closures, in the wake of COVID-19. While this global panic will doubtless have far-reaching economic consequences, the need to remain in touch, engaged and in communication with the world remains essential. Although COVID-19 has sparked this shift in behaviour, the world has changed and organisations will have to adapt to remote ways of doing their business to remain relevant and keep their key stakeholders safe and secure.
As many are forced to work from home and clients aren’t walking through office doors as regularly, the question arises; how do organisations continue business and ensure constant communication with employees and clients, without exposing the business to fraud? “The key is to establish secure and compliant communication channels between organisations and their stakeholders. These channels should enable authenticated transactions, real world processes and free chat to carry on with business as usual – remotely on users’ own devices,” confirms Karl Nimmo, Founder and CEO of InTouch.
Especially in instances where security, regulation and governance are key, organisations are under obligation to manage their communications and business processes in a responsible manner.
Enter InTouch – purpose built for secure and trusted real world processes. With trusted onboarding and advanced biometrics, organisations and individuals can trust in the identity of the key stakeholders they are communicating and running dynamic processes with. This all takes place through secure and compliant communication channels – on which every message is encrypted. Users can comfortably share confidential information and documentation, authenticate transactions and run validations.
“InTouch is a trusted engagement and authentication tool to navigate real world processes, both securely and efficiently. Featuring an intuitive user interface, decreased administrative burden and increased revenue for organisations, it also ensures regulatory compliance and decreases the risk of fraud,” adds Nimmo. Organisations can send their employees’ payslips in a secure way, for example, or authorise transactions with their clients.
In a world that is rapidly retreating from face-to-face interaction, the need for communication channels that offer authenticated transactions and business processes increases exponentially. As such, InTouch has partnered with Impression Signatures to provide a unique Authenticated Signature offering to the FSP market. Each successfully completed eSignature and Authentication workflow is logged, offering an easily consumable Audit Trail.
“Many real world processes require signatures in conjuncture with facial recognition software and fingerprint reading technology to verify the user’s identity. With Impression software built in, organisations can easily manage this process through InTouch. For example, businesses can sign mandates with clients or distribute a new document to be signed by all employees, acknowledging that they’ve received and read a new policy,” states Andy Papastefanou, founder of Impression Signatures.
With or without a global state of emergency, the way the world communicates, operates and transacts has changed and will continue to evolve. Although keeping pace may appear to be challenging, innovative solutions offer vital rungs in the ladder to truly staying in touch – with the world, with employees, with clients and with stakeholders.
Originally published on ITWeb on the 1st of April 2020
https://www.itweb.co.za/content/VgZeyvJo8J37djX9
Sybrin, InTouch partner to enable a social digital process experience
Sybrin has joined forces with InTouch, a secure transaction and business process platform, to add a social channel to the omni-channel experience already provided by Sybrin’s platform and business applications. By using InTouch’s chat-enabled platform, users will be able to
Share:
Written by:
Tags:
Sybrin has joined forces with InTouch, a secure transaction and business process platform, to add a social channel to the omni-channel experience already provided by Sybrin’s platform and business applications. By using InTouch’s chat-enabled platform, users will be able to interact with business processes through an intuitive messenger, which is a well-known experience to most users.
Imagine opening a new account, authenticating a transaction, or putting in a claim by just chatting via your mobile phone. The InTouch application embeds a complete set of security features to ensure a bank-grade solution. InTouch will also embed a specific set of Sybrin Micro Services in their application to enrich the user experience.
“We are very proud and excited to announce our partnership with InTouch. Their technology is well designed, easy to use, and embeds all the security features important to our customers,” says Marius Maré, CEO at Sybrin
“We are incredibly excited to announce our partnership with Sybrin, which is set to ignite a whole new world of doing business. We look forward to creating unique interactions and transactions for customers across the African continent together,” says Karl Nimmo, CEO at InTouch.
Partnering with InTouch will allow us to:
- Add an additional engagement channel to the user experience;
- Create new distribution channels for both companies;
- Incorporate services such as identity management and KYC to the InTouch application; and
- Provide quick to market, highly scalable solutions.
Together, we create both a secure and trusted channel to interact and transact.
Originally published on ITWeb on the 9th of September 2019
https://www.itweb.co.za/content/mYZRXM9PWjK7OgA8
Not all encryption is created equal
Cyber attacks against corporate networks have become more sophisticated each year and are no longer limited to massive enterprises. No business is safe from attackers, irrespective of the size of their security budget. Moreover, vast amounts of personal data are now
Share:
Written by:
Tags:
Cyber attacks against corporate networks have become more sophisticated each year and are no longer limited to massive enterprises. No business is safe from attackers, irrespective of the size of their security budget.
Moreover, vast amounts of personal data are now managed online and stored in the cloud or on servers with a constant connection to the web. It is practically impossible to conduct business today without personal data ending up on a networked computer system somewhere, which means keeping that data private and safe is increasingly crucial.
This is where encryption comes in: an enterprise grade process engine that delivers secure, authenticated and audit trailed workflows through an intuitive messaging interface. Encryption is essentially the process of helping protect personal data by encrypting it, meaning it cannot be read by anyone without an encryption key.
But not all encryption is equal. It’s not only important to ensure your communications are encrypted, but to know how effectively they are secured too.
The first step towards really effective encryption is end-to-end encryption (E2EE). This is an exceptionally safe way to communicate privately and securely online. By encrypting messages at either end of a conversation, E2EE prevents anyone in the middle from snooping on private communications.
When using E2EE to send a message of any type, no one – neither attackers nor the government – would be able to eavesdrop on your messages. This is more secure than the encryption employed by most businesses, as it doesn’t only protect the data in transit between the device and the organisation’s servers. An example would be sending an email from Gmail that doesn’t offer EE2E, as Google could access the content as they have an encryption key. EE2E removes this possibility.
Then there’s the question of standards and protocols. It is advisable to only use encryption tools that employ an advanced encryption protocols available, such as AES-256, which offers highest level of security possible. AES stands for advanced encryption standard, and is a symmetric block cypher, meaning it encrypts and decrypts data in blocks of 128 bits. It employs a specific cryptographic key, either 128, 192 or 256 bits in size, to do this.
Businesses should also ask themselves whether, in the event a company device is stolen or hacked, they can really trust all their most sensitive or proprietary data to a single key. Encryption is very effective until it isn’t. Too many encryption tools, such as Pretty Good Privacy (PGP), render your most valuable data only as secure as a single key, which if it fell into the wrong hands, would see all your current and past communications becoming readable to the hacker.
This is why cryptographers developed “perfect forward security”, which ensures that the encryption system automatically and frequently changes the keys it uses to encrypt and decrypt information. In this way, should the most recent key be compromised, only a small portion of private data would be exposed. The best encryption tools with perfect forward secrecy switch their keys with each individual message in a text-based conversation or each phone call when using an encrypted calling app.
This is why it’s called “forward secrecy”. It ensures that security mistakes of the future don’t endanger secret communications of the past. It makes use of ephemeral keys, which are generated for each execution of a key establishment process. Without a forward secrecy cipher, a single private key is used to encrypt all connections, meaning that encrypted communications could be recorded by an attacker, who could get his hands on a private key at some point in the future, and decrypt all the information.
An ephemeral key exchange works by a per-session key that is generated using a random prime number. It is called ephemeral because it isn’t stored anywhere, and therefore cannot be stolen by attackers to decrypt previously recorded communications. Essentially, you are continually generating new keys for new messages. In this way, if a device is lost, hacked or stolen, it matters less. The worst case scenario would be a single message being compromised.