Our presentation from the FinDEVr 2017 conference in London is now live! Watch CEO Prakash Sundaresan present the Trusted Key Digital Identity Platform, and how it addresses critical problems such as KYC, Secure Authentication and Fraud Prevention. Check it out and see why Trusted Key was voted a “Crowd Favorite” this year.
Trusted Key named “20 Most Promising Identity Governance & Administration Solution Providers 2017” by CIOReview
Trusted Key is honoured to have been highlighted in CIOReview’s “20 Most Promising Identity Governance & Administration Solution Providers – 2017”.
“The Digital Identity ecosystem is growing at an incredible pace with a wide range of players and approaches,” commented Prakash Sundaresan, CEO Trusted Key “Our inclusion in CIOReview’s Top 20 Most Promising Solutions provides excellent industry validation for our Digital Identity approach, and recognition of our strong progress to date”.
To keep up to date with […]
Trusted Key will be at Finovate Fall, September 11-14 in the NYC Hilton Midtown. There are a few ways to interact with us at the show:
- Trusted Key CEO Prakash Sundaresan will be presenting our latest solutions on Sept 12 around 3:20pm.
- Stop by our booth to see the latest demos and talk with a Trusted Key representative
- Schedule a meeting by emailing us at firstname.lastname@example.org
You can find more details on […]
I just spent two very productive days this week at the FinDEVr London event where we unveiled the Trusted Key Platform. It was great to have opportunity to talk to and hear from representatives from a variety of financial industry players, from the big banks to challengers to industry regulators and consultant.
It is clear that every financial institution here in Europe is feeling the effects of a number of important cross-currents that are buffeting […]
In addition to GDPR, which I wrote about a few days ago, there’s another regulatory change coming to Europe that will almost certainly cause more significant disruptions. The Revised Payment Service Directive, more commonly known as PSD2, will alter consumer’s relationship with their existing banks and create whole new classes of financial service providers if it fulfills its creator’s objectives. When PSD2 comes into effect next year it will basically terminate the legacy bank’s monopolies […]
In less than two years the European Union’s new General Data Protection Regulation (GDPR) will come into full effect. The GDPR will significantly change not only the ways in which enterprises collect and manage their customer’s personal data, but the data they collect when a user registers for service or transfers service from one provider to another. When the EU Parliament passed the GDPR last year they made clear that one of the primary objectives […]
The widespread (and still rapidly growing) use of e-commerce by consumers has certainly been a benefit to retailers nimble enough to take advantage of it. Fortune magazine reported last year that more than half of consumer purchases now occur online. However, it’s also been a huge boon to the global criminal syndicates nimble enough to take advantage of the weaknesses in the transaction processing systems responsible for executing all of those transactions. No […]
I like Krebs on Security a lot. Brian does a nice job of ignoring the “noise” in the cyber-security ecosystem to focus on the actual “signal”. The post published last week is a good example of why Krebs on Security tends to be must reading for those of us in the security industry. Brian evidently recently received a notification from eBay requesting that he stop using his two factor authentication (2FA) hardware token and start using an SMS […]
Last week I wrote about how the White House sponsored “National Strategy for Trusted Identities in Cyberspace” (NSTIC) report proposed four guiding principles around which a modern identity management solution should be based. In that posting I covered the first two principles, “Privacy enhancing and voluntary” and “Secure and resilient”. Today I’ll take up the final two principles, “Interoperability” and “Cost effectiveness/ease-of-use”.
The NSTIC authors’ definition of “interoperability” is a bit narrow in my view, […]
In April 2011, the Obama White House released a report that identified four guiding principles around which the authors believe that a modern identity management solution should be based. Entitled “National Strategy for Trusted Identities in Cyberspace” (NSTIC), it was a visionary piece that provided some of the original motivation for the founding of Trusted Key. As we design and build the Trusted Key Digital Identity Platform, I return periodically to the NSTIC report […]