Vendors
日本語

Security Suite

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)

Overview

Protect your Company with multilevel cyber-security solutions.

Innovate with our solutions and scale your business without losing the security that your ecosystem needs.

We provide robust security solutions to authenticate users and to protect applications and financial transactions from cyber attacks.

Functionalities

Our modular solutions are designed to provide the best strategy for authenticating operations on all your channels.

·Facial Identity

It integrates functions that include registration with facial biometrics, adding processes for proof of life of people, biometric validation verified with ID documentation and photographs to prevent fraud and duplication of users.

·Soft-Token

It has a robust authentication service.


The soft-token is hosted on a specific mobile device to provide OTPs -One Time Passwords-, which are used as a “something you have” authentication type.

·ID Validation

It allows you to capture the data present in ID documents and verify their authenticity with mechanisms such as: Machine Readable Zone (MRZ), NFC Chips, Barcodes, QR Codes and more.

·Mobile Biometrics

It uses biometric validation features of mobile devices such as FaceID and TouchID, which are used as a “something you are” authentication type.

Take advantage of Mobile biometrics in login flows and to approve transactions.

·Credentials

Create and manage static credentials such as “something you know” for use in flows that require simple authentication.

·Self-recording

It allows the recording of a guided video with a specific challenge such as answering a question or reading a text on the screen, and where it is requested to show the front and back of the person's identification document.

Benefits of the Security Suite

·Modular solutions

Our modular security solutions can be adapted to match the strategy and meet the needs of each customer.

·Safety certifications

Rely on certified solutions with the highest industry standards.

·Experts in Cyber-resilience

Innovate and stay calm by relying on our experience in cyber-resilience and a comprehensive suite of proven security solutions.

·Protected Information

Guarantee your users the security of their information, money and transactions at all times.

The Power of the Security Suite

Offer unique experiences to your customers.

·Multi-purpose authentication

Combine our robust suite of authentication solutions with configurable business rules to protect your digital channels in use cases such as:

-Digital Onboarding

-Login

-Account Recovery

-Profile

-Monetary transactions

-Highly sensitive operations

·Security on all your channels

It promotes security in operations that take place on other channels: ATMs, access to safe deposit boxes, calls to the call center, etc.

·Verification according to rules

Validate the identity of your users using business rules, combining our Security Suite solutions with our Business Rules Management service. Accordingly, you can configure the authentication you need depending on the channel, profile and type of operation.

·Payments with facial biometrics

It provides innovative and secure payment experiences in stores, where customers can pay with their facial biometrics, without using a device or physical product.