Axiom Protect 2.0

Enabling Safe Future With Innovation And Reimagined Application & Data Security

Security

Platform

Implementation

To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference.

Authentication and Authorization

To Establish "Are You the Right Person?" Multifactor Authentication, Frictionless, And Active Ensures. What You Know, What You Have? What Is the Role And Authority You Have? What Systems Resources You Can Access and Manage. Single Sign-On and Role-Based Access Comes Here.

Accounting

Accounting measures resources you consume during access for usage, trends, compliance and something billing.

Non Repudiation

One Can Not Deny Their Authorized Specific Action (Sign Contact, Bank Transaction). This Is the Backbone Of Digital Trust

Identification

Established digital identity allows you to operate system(s). Onboarding is the most critical component.

Audit

At Time Of Dispute Audit Is What Will Save You. Audit Trails Will Help To Prove The Right Or Wrong Doing? Most Regulation Demands Tamper-Proof Audit For 3-7 Years.

Security Stack

Multiple features. Solid Features. achieve compliance. consolidation all applications. one security platform.

Applications

Consolidating Multiple Applications/Systems

Bring strong security to multiple applications - web, mobile, Peer to Peer, custom and standard. Reduce ROI and TCO through a single platform. Learn More

Q&A

Relevant Question Answers

Bank of Q&A coming from documents, LDAP, and external sources to bring self-service
automation for a password reset, upgrade to stronger authentication


Learn More

Radius Service

Inbuild Service To Support User Popular Network Devices

Remote Access using VPN & Virtual Desktop (VDI) And 99% of network devices support
Strong Authentication Option via Radius. Enable it Now. Plus use our Radius Client SDK
for your custom app (IoT Or network appliance).


Learn More

Push Notification

Zero Cost, Reliable Large Data Duplex

No Cost, Reliable, Duplex, Rich & Large Data based Authentication where OTP, Facial,
Voice, E-sign, Location, Device come together to bring for Login, Transactions or
Security Alerts. Consent And marketing too as value adds

Learn More

Data Protection

Consolidating Multiple Applications/Systems

Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. Learn More

Groups

User Grouping With Default Profiles

Each system has users, operators, groups with different roles with complex access roles. Default To Custom groups to suit all apps. 
Learn More

Dynamic Image

User Defined Color Text Image

Simple, easy yet powerful mutual authentication method to build visual confirmation and assurance to users for the right app/portal. Learn More

Geo Fence

On-premise Inbuilt engine for Geo Fence with settings and management.

Control Where Your Users Are Coming from. "Where You Are"? Is Becoming An
Important Authentication Aspect. On-Premise Inbuilt Engine For Geo-Fence With
Settings And Management.


Learn More

Signature OTP

True MFA enabled E-Signature With Biometric AuthN

OTP's are weak and fail against Man-in-the-Middle. Many recent attacks have broken
OTP. Signature OTP (in the form of Mobile Token Or Hardware Token) offers MITM
protection with Data Signing.


Learn More

Single Sign On

Authentication + Authorization Consolidation

Consolidation of all your web and mobile applications to unify authentication and authorization with MFA and Continuous Security coming in. OATHv2 compliant client SDK as well as Server is way ahead. UMA2.0 support will bring Federated Authorization too. Learn More

Policy Settings

Enforcement And Controlled Administration

Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks.
Learn More

OTP & SOTP

OATH TOTP Mobile, OOB (SMS, email), 3rd Party Hardware, OCRA Time Based

Time-based OATH Compliant Time-Based 2FA token (in the form of Out of Band - SMS
Text, Email, Voice, USSD) along with Software, Mobile (iOS, Android), and Hardware
Token.


Learn More

Trusted Device

Single To Multiple Devices Vs Users

Bringing trust through user's devices makes authentication more flexible and stronger.
Multiple users on a single device or multiple devices for a single user is a business need.
It's not hard if you have a good platform.


Learn More

Tokenization

Consolidating Multiple Applications/Systems

Privacy demands external parties (like online merchants, clinics, chemists, aggregator
platforms) to not have customer PII, PHI, and similar private data. Tokenization from the web,
mobile, or server to server is the perfect protection


Learn More

Facial Biometric

99%+ accuracy to build your EKYC

99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometric and recognition. High speed, highly accurate and scalable on-premise deployment with dependency on cloud service. APIs and SDK available. Learn More

Complex Password

LDAP Synchronized / Inbuilt DB / Ext. Source

Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Learn More

Google Token

Support For Google Authenticator OTP Token

Google Token , Authy Token, Microsoft Auth Token all support OATH. Imagine support for all these from a single system. Save Cost and Reduce Open Source Learn More

Digital Certificate

User App Server Certificate Management

The complete internet relies on SSL/HTTPS via digital certificate. Users, Devices, Applications, Servers all need digital certificates through on-premise own CA along with monitoring service. APIs to any app integration Learn More

PDF Security

Sign, TimeStamp, Password Protect, QR Embed

The most used document format "PDF" needs security. Password protection, ESIGN, Digital
Signature with Timestamp, And Custom QR code embedded. Complete On-premise system
with the user, doc, and workflow management. No Per document cost.


Learn More

Risk Base AuthN

AL/ML Powered Intelligent Anomaly Finder

On-Premise Machine Learning based 20+ attributes to build intelligent risk-based transaction
authorization and access authentication engine. Integrates with your mobile, web, or core
engine using APIs. Gives intelligence to your workflow & systems.


Learn More

IntelliOCR

Smart Face, Signature, MRZ, Contextual Data Extractor

IntelliOCR

OCR is too plain and useless for today's digital workflow. AI/DL powered,on-premise, high performance, 100% data control and ownership, no external 3rd party call and easy to integrate with through Web API. Making OCR smarter and structured. Learn More

Passive AuthN*

User Behavior Coupled With Risk & System Policies

On Premise Machine Learning based 20+ attributes to build intelligent passive authentication engines. Integrates with your mobile, web or core engine using APIs. Gives intelligence to your workflow & systems. Learn More

On-premise AV

On-premise secured, 100% data ownership

AWS, Google, Twilio, Zoom are all 3rd parties & your video+audio calls can be copied and
stored on their servers. On-premise secured, 100% data ownership, webrtc compliant Audio &Video Gateway with multiple recordings. 

Learn More

ESign

Bring ESIGN to your systems and automate with on-premise option.

DocuSign is expensive and you do not have control over documents, flow and digital
certificate is also Docusign. Same for others. Own your ESIGN system with the user,
secure, documents and flow. Bring ESIGN to your systems and automate with on


Learn More

IntelliMask

Images As Well As True PDF Extract, Sensitive Data Mask/RedAct

Scanned copies and True PDF have trapped sensitive data. Any data breach on these files will
lead to major damage. API-driven Smart Masking and Redaction with 100% software-based
APIs.


Learn More

Certificate Manager

On-premise full control over your certificates.

Users, Applications, Servers let them be external or internal all need certificates (self signed or trusted 3rd party). VPN, VDI, WIFI Router, Web Server Mutual AuthN and many more can use certificates. On-premise full control over your certificates. Learn More

Speech To Text Extract

AWS, Google, Azure are all 3rd parties for STT (data theft is easy).

Google Token

AWS, Google, Azure are all 3rd parties for STT (data theft is easy). On-premise secured, 100%
data ownership, STT module helps in voice-activated and content-context knowledge extraction.
Achieve regulation at least TCO.


Learn More

Certificate Discovery

Detailed reports for each targeted IP, domain and group with complete control.

Weak, Expired Or Wrong Name Certificates are very common vulnerabilities. Automated Scheduled as well as manual checking with real time alerts and detailed reports for each targeted IP, domain and group with complete control. Learn More

Coming Soon

Voice Biometric*

Pure software AI/DL based voice biometric and recognition engine with 92% accuracy

Underrated but extremely powerful pure software AI/DL based voice biometric and recognition engine with 92% accuracy brings alot of automation, passive authentication as well as active commands. APIs and SDK available to work with on-premise deployment.Learn More

Hand Sign Biometric*

World's first AI/ML based handwritten signature matching feature

World's first AI/ML based handwritten signature matching feature that brings real = digital for EKYC and also E-Signature. Web APIs give the ability to integrate in your app. On-premise deployment gives complete data control and protection. Learn More

FIDO Web AuthN*

Popular connectivity for Enterprises to use in their applications along with our SSO and MFA

FIDO standard is becoming popular for passwordless authentication. This feature brings more popular connectivity for Enterprises to use in their applications along with our SSO and MFA. Learn More

AML/PEP Validation Check*

save time, effort and money with automation service

Along with namescan.io, AML/PEP real-time check will be made bringing you the ability
for the customer, employee, and partner onboarding and regular checks. This saves
time, effort, and money with automation service


Learn More

UMA 2.0*

Owner's control on data sharing authorization & protected-resource access

brings both consumer & enterprise applications with resource owner's control on data sharing authorization & protected-resource access. Privacy & consent implications for mobile, web and IoT apps. Works well with SSO and MFA. Learn More

IntelliParser*

Extract, Register, Recognize, Authenticate, Relearn

Documents clicked from mobile and scanned copies need smart parsing to extract trapped data
inside. Build your own templates to extract any data in structured JSON/XML including tables.
Excellent automation for Loans, Procurement, Accounts, Audit, and many more.


Learn More

Threat Insights*

Global STIX/TAXII With Local System Feed

STIX-TAXII compliant open sources to pull threats feed to be mapped to your Identity Protection (users, apps, servers, ips, devices) to be real time allowed or blacklisted. Add multiple sources and make it work passive and risk based authentication. Learn More

Connect*

Brings Secure Messaging with military grade complete onpremise system

Brings Secure Messaging with military grade complete onpremise system with Video calling,
Facial bio, Voice bio, user - security keys management. All data "at rest" and "at transit"
encrypted with ephemeral message destruction and many more features.


Learn More

How It Works

Deliver a mission critical single sign-on (SSO) and two-factor authentication (2FA) service for applications and APIs.
1

Consolidation Applications

2

Groups

3

Policy Settings

4

Password

5

Question and Answer

6

Dynamic Image

7

One Time Password

8

Google Token

9

Radius Service

10

Geo Fence

11

Trusted Device

12

Digital Certificate

13

Push Notification

14

Signature

15

One Time Password

711-scaled.jpg

Our Packages

Major packages, Key slient features, Progressive Growth And Values

Webinar Resource

Major packages, Key slient features, Progressive Growth And Values

EKYC, Adaptive and Passwordless - Future of security.

This video discussion shares with you the strategy that influence new companies and independent ventures and also Dissecting the new strategy that helps your IT security needs.

Continuous Security Is The Future

Continuous security start with friction-less trusted on-boarding and matures over time through policies, behavior and insights. In this webinar we share the future of continuous authentication to help your IT security compliance and future readiness for evolving digital systems.

Case studies

Major packages, Key slient features, Progressive Growth And Values

Core Banking Access Security

Core System Access Security for Large Retail Bank in ASEAN
Problems
Institute had web dashboard access to their core banking, CRM and other systems (like Card management, 3DS/ACS, internet banking, Agency Banking). Shared passwords, Different OS, Remote Branches, Hardware Logistics were some problems. They did not want to change any application and very fast security upgrade plus consolidation
Solution Deployed
Their Virtual Desktop Solution (running on web) with Axiom Protect 2.0 with Radius authentication integration along with Software MFA Tokens was the fastest rollout with no changes in any application. VDI was MFA for access was added to ensure it is the right employee accessing their applications.
Benefits
  • No Distributed Changes In Multiple Applications. Single Point of Control for Strong Access Security.

  • Complete 100% software. Quick high velocity high volume rollout.

  • Cost effective. Quick ROI and Low TCO.

  • No recorded fraudulent attempts by rouge employee or stolen card/pin.

Alternates / Upsells

Introduce Facial BIOMETRIC with real time facial biometric using web camera or mobile camera.

SSO (single sign on) for consolidation

Passive Authentication to be added to bring frictionless, less steps authentication.

Threat Insights to find rouge elements and give more indirect continuous security.

License And Deployment
  • 8 weeks Rollout deployed remotely for 10000+ employees and 100+ vendors connecting.

  • Enterprise Deployment with (2 Production, 1 Dev And 1 Disaster Recovery)

  • Perpetual License with AMC.

Co.
No recorded fraudulent attempts by rouge employee or stolen card/pin.

SWIFT Alliance Strong Security​

SWIFT Alliance Security for Large Retail Bank in ASIA PACIFIC
Problems
After the attack in SWIFT from Bangladesh, SWIFT asked all the BFSI (banks and merchants) to have added more security into their SWIFT portal access. They wanted to complete users from their Active directory. They did not want to roll out a hardware-based solution.
Solution Deployed
Axiom Protect 2.0 with Radius and Software Tokens was the fastest rollout. 2FA for SWIFT access was added to ensure it is the right employee/partner accessing and conducting the transaction. Axiom was configured to point to Active Directory for user in sync management. Users went through self service onboarding with fast 2 days making it highly secure (quick upgrade is best).
Benefits
  • Complete 100% software. Quick high velocity high volume rollout.

  • ZERO attacks reported post solution rollout.

  • Comply with SWIFT IT Security Compliance to continue business.

  • Cost effective. Quick ROI and Low TCO.

Up-Sell opportunities:

Passive Authentication to be added to bring frictionless, fewer steps authentication.

OTP Hardware Token OR Clientless OTP Token. Digital Certificate based Mutual Authentication is quite powerful option.

Mobile Driven Facial App can validate the device, geo location, face and time sensitive OTP for each login (authentication and/or authorization).

License And Deployment
  • 6 weeks Rollout deployed remotely for 2000+ users.

  • Perpetual License with AMC.

  • Enterprise Deployment with (2 Production, 1 Dev And 1 Disaster Recovery)

Digital Certificate Issuance

Class 2 Digital National Certificate Authority (CA) Issuance in ASIA PACIFIC
Problems
Class 2 digital certificates are used for financial, legal authorization esp. in Corporate and High Value/Critical workflow. But it can only be issued once user’s identity is verified to be real and authentic. National CA wanted to remove paper, emails and reduce human involvement. They wanted full control over process with transparent, secure system that can validation of proof of identity, address, alive/mentally stable, presence inside country, live photo, hand signature attributes (all human interaction, email, error prone and covid19 readiness).
Solution Deployed
On-premise Axiom Protect 2.0 with Valydate gave single, one stop, plug&play solution to their comprehensive requirements. Solution gave complete paperless, secure customer identity verification using mobile app with proof of identity-address, liveliness check, handwritten signature, capturing along with geo-device profiled video call with operator (recorded & water marked for audit compliance) prior to issuance class 2 certificate. CA appointed agent will have their mobile app; client accesses web/mobile meeting for 5min onboarding & verification.
Benefits
  • Complete 100% software. Quick high velocity high volume rollout.

  • No Paper, No visit, Pre and Post covid19 process automation with solid security.

  • Reduce Time And Effort with fast customer acquisition.

  • Huge Cost Saving. Transparency Achieved. Error reduced to near ZERO.

License And Deployment
  • 2 months Rollout deployed remotely with 10,000 verifications and certificate issuance daily.

  • Perpetual License with AMC. Deployed Onsite And Remote Support.

  • Enterprise Virtual Instances Deployment with (2 Production, 1 Dev And 1 Disaster Recovery).

Additional Options
  • Digital Signing for Transaction Approval.

  • Offer “Identity as Service” to Businesses.

Embedded Authentication And Data Security

Data Security And Authentication for Medium Sized Bank in Europe
Problems
This European Bank did not want have user to open a different security token app for generating OTP or signature OTP. They wanted Geo Fence, Device Profile along with data integrity for each transaction. As per compliance they must secure the data above and beyond HTTPS/SSL. Protection from Man-in-The-Middle and DNS poisoning was must.
Solution Deployed
Institute deployed Axiom Protect 2.0 with its Mobile Trust SDK (for iOS, Android and Web) module was embedded inside their workflow mobile and web applications where user authentication, transaction data security and authorization was all done within the app. Each login and transaction was protected by Signature OTP, Geo Fencing and Encryption + signed data (that only Axiom Protect can open for Bank’s Application).
Benefits
  • No friction. No User Education. No Extra Steps.

  • Complete 100% software. Quick high velocity high volume rollout.

  • Achieved desired output with strong security working in background.

  • Eliminated MITM, MITB, Replay and many other fraud attempt without impacting user experience.

  • Huge Cost Saving. Human Effort Reduction.

Alternates / Upsells

Biometric can be introduced for customer onboarding and security.

Passive Authentication to be added to bring frictionless, less steps authentication.

License And Deployment
  • 8 weeks Rollout deployed remotely for 12000+ investment banking customers.

  • Per user Per Annum User License.

  • Enterprise Deployment with (2 Production, 1 Dev And 1 Disaster Recovery)

Intelligent Sensitive Data Extraction

Loan Process Automation with Sensitive Data Extraction, Large Retail Bank in India
Problems
Institute had loan process where salary slips, proof of identity, address and financial health check was needed. Photocopy of scanned, skewed documents were manual processed. Slow, Error, Manual, Low Velocity And volume With Data theft were key problems. 12 people team was doing manual processing with 12% error with 5700 pages day with demand for 10,000 document pages done. They could not outsource because of Data Security and Compliance.
Benefits
  • Complete 100% software. Quick high velocity high volume rollout.

  • Eliminated slow, vulnerable human depend process with 24x7x365 machine processed.

  • No data/Identity theft. No Need to Outsource.

  • Huge Cost Saving. Human Effort Reduction.

Solution Deployed
Our Axiom Protect 2.0’s intelliOCR module was deployed exposing Web APIs to process the multi page documents for unstructured to structured data extraction(json/XML) with AI/ML lead corrections in contents and context both. 50+ documents were trained, and system learned to do extractions. 12 down to 4 team size for this mundane repetitive work. Errors reduced from 12% to 3% with machine automation.
Up Sell opportunities

Data Masking for sensitive data can extend more value.

Water Mark documents to embed purpose, source, file name ensures authenticity and purpose.

Document Signing And Encrypting all received documents eliminates many insider threats.

License And Deployment
  • 8 weeks Rollout deployed remotely for 10000+ multi page documents processed daily.

  • Perpetual License with AMC

  • Enterprise Virtual Instances Deployment with (4 Production, 1 Dev And 2 Disaster Recovery).

Identity As A Service

Tier 1 MVNO in ASEAN envisions Identity as Service
Objective
Future is all about digital identity, assets and collaborative ecosystems. Digital Identity Management with right verification, right experience, complete control and security is what this MVNO was looking to be game charger in the ASEAN Market. System that gives all needed EKYC, API Access, Extension SDKs for mobile with management dashboard. Time was critical.
Solution Deployed
Axiom Protect 2.0 With Valydate (Onboarding) And Service Guard (API Enablement) all 3 platforms deployed to rollout Federated Identity Management through Mobile App, Dual Level Verification, Telco Mobile Number Verification, Multi Factor Authentication, Identity Provider (IDP), Single Sign On (SSO) along with Partner Management, Sandbox, API usage/monetization. Maximum Automation through IntelliOCR and Biometric modules with 3rd Party AML and Bank Account Checking gave 99.5% user identity verification accuracy. Reduced 3 days onboarding to 10 mins with regulation compliant on-premise solution.
Benefits
  • Single Principle, Multiple platforms, White labelled.

  • Complete 100% software. Quick high velocity high volume rollout.

  • Huge Cost Saving as all in one. No integration headache or project delays.

  • Future Business Readiness with maximum automation and least human effort.

Alternates / Upsells

Blockchain and Smart Contract Extension to build next generation collaboration ecosystem.

Customers’ Transactional & Behavioral Insights for business growth.

License And Deployment
  • 3 months Rollout deployed remotely with 1million user base capacity

  • Perpetual License with AMC. Deployed Onsite And Remote Support

  • Enterprise Virtual Instances Deployment with (6 Production, 3 Dev And 4 Disaster Recovery).

Data Masking (Redact) “At Rest” Security

Sensitive Data Masking, Large Retail Insurance in Asia Pacific
Problems
Institute had health insurance customer acquisition and claims processes where sensitive personal, private; identity, health data and financial data was captured through mobile agent and coming in as email attachments as scan PDFs. Documents are printed and stored without any data masking and water marking. Compliance demanded redacted/masked data and they wanted to outsource the long term digital and physical storage but could not as data was visible. None was possible. They had 7500 applications coming daily.
Solution Deployed
Our Axiom Protect 2.0’s intelliFind module was prefect solution that exposed Web APIs to process the multi page documents to find desired sensitive data and redact/mask it. IntelliFind’s AI/ML intelligently finds sensitive data (based on type, context and training given). With intelliFind in action, institute could redact all data, outsource document storage with regulatory compliance.
Benefits
  • Complete 100% software. Quick high velocity high volume rollout.

  • Eliminated slow, vulnerable human depend process with 24x7x365 machine processed.

  • No data/Identity theft. No Need to Outsource.

  • Huge Cost Saving. Human Effort Reduction.

Alternates / Upsells

Data Masking for sensitive data can extend more value.

Water Mark documents to embed purpose, source, file name ensures authenticity and purpose.

Document Signing And Encrypting all received documents eliminates many insider threats.

License And Deployment
  • 4 weeks Rollout deployed remotely with 7500+ applications proceeded daily..

  • Perpetual License with AMC

  • Enterprise Virtual Instances Deployment with (4 Production, 1 Dev And 2 Disaster Recovery).

“Similar but not same” Multiple Systems Need

Security Islands Consolidation in Large Retail Enterprise, ASIA Pacific
Problems
Security Sizing and its variation for multiple applications (cloud, hybrid, legacy, on-premise with web, mobile, machine to machine) with 10,000+ employees and million+ customers. Need varied from Remote Access, Customer Authentication, Authorization, Data Security, SSO, Non Repudiation for loads of applications running from legacy to cloud. They had 6-7 different application security systems with different integration, licensing, support and service commitment. IT Security was too hard and too spread out.
Solution Deployed
Axiom Protect 2.0 platform was deployed to gradually replace old legacy security systems. It’s Application/Channel management gives unique segregation of user and their (AAA-authentication, Authorization and Accounting) need. Each channel offered different security. Some extended AD/LDAP. Few used mobile trust SDK and Verification APIs to embed security inside their application. RADIUS and Single Sign On added internal and remote security need. Axiom Protect consolidated all applications to give complete IT security compliance with needed flexibility, control over Systems:Security:Data:Identity:Users:Devices:Services.
Benefits
  • Single Principle, Multiple platforms, White labeled.

  • Complete 100% software. Quick high velocity high volume rollout.

  • Huge Cost Saving as all in one. No integration headache or project delays.

  • Future Business Readiness with maximum automation and least human effort.

Alternates / Upsells

API Gateway for API security and monetization.

IntelliValue for OCR, Masking, Collation Requirements.

Adaptive Authentication for High Volume Low Value Applications.

License And Deployment
  • 8 weeks rollout deployed remotely for 200 Requests per second and 2million customers load.

  • Perpetual License with AMC. Enterprise Deployment with (6 Production, 2 Dev And 3 Disaster Recovery)

Inhouse Strong Security Protected Payment Gateway

Omnichannel Non 3DS Payment Top Retail Bank in ASEAN
Problems
Many ASEAN countries see huge growth in digital lifestyle but digital payments lack as 90% population did not have credit & debit (Mastercard/Visa/JCB) card. Our client had CASA (saving/current accounts) with 100s of 1000s customers. They wanted to offer digital payments through web, mobile, and through APIs coupled with faceless merchant onboarding, management. They wanted inbuilt Security for each transaction (to ensure cyber assurance is high and matches Visa/Mastercard level)
Solution Deployed
Our XPAY 2.0 (payment gateway) along with Axiom Protect 2.0 (complete continuous security platform) was deployed that extended Core Banking And Card Management system to manage the complete lifecycle of users, transactions, merchants, payouts, refunds, settlements along with APIs and SDK for merchant application integration. 80% of customers opted for this new service with huge boost to Ecommerce. Embedded End to end Data Security And Out of Band Multi Factor Authentication was offered by Axiom Protect.
Benefits
  • End to End Platform as In-House Payment Gateway with inbuilt Security Platform.

  • Complete 100% software. Quick high velocity high volume rollout.

  • 90% Time Saved in Merchant Onboarding. High customer retention. More Revenue Generation.

  • ZERO frauds, Zero Compromise and Least Risk Score.

Up Sell opportunities

Next Bank to get API banking.

XPOS – Point of Sale. XPAY insights and predictive forecasting.

License And Deployment
  • 3 months Rollout deployed remotely with 1million user base capacity

  • Subscription License. Deployed Onsite And Remote Support

  • Enterprise Virtual Instances Deployment with (6 Production, 2 Dev And 4 Disaster Recovery).

API Manufacturing, Collation And Monetization

API Manufacturing And Collation Large Retail Bank in India
Problems
Retail Bank had 15+ Core Services (Finnacle, CMS, FEBA & more) to be bring out with 60+ standard to complex APIS with 30+ partners asking for changes every day. They wanted
1

Human dependency for each project and partner engagement. IT Security compliance for each project integration and rollout. Project Rollout time was too long. Too many systems and patches to maintain.

2

Billing for each merchant or partner was different. Adding more business logic to existing APIs and build New APIs.

3

Data Security extended to be Server, Web, Mobile transactions.

Benefits
  • Reduce project rollout time from 2 months to 3 days. Major Business Boost.

  • No Code change in any core service. No Developer Needed. Security By Design.

  • Huge Cost Saving. Human Effort Reduction.

Solution Deployed
Combination of Next Bank 4.0 for API Economy Enabler coupled with Axiom Protect 2.0 for User, Data, API Security was rolled out. Next Bank 4.0 gave API Building, Transformation, Visibility, Enrichment And Monetization Engine to aggregate different services for different partners with IT Security Compliance enforced with maximum automation. Faceless onboarding through Self Service Onboarding for partners along with varied billings solved most manual and monetization problems. Lastly they were able to add more business logic thru’ API Enrichment without changes any core service. Axiom Protect 2.0 Mobile Trust SDK and APIs gave needed user authentication and data security to strengthen Next Bank 2.0 processes.
Alternates / Upsells

Identity as Service.

Customers’ Transactional & Behavioral Insights for business growth.

License And Deployment
  • 3 months Rollout deployed remotely with 1million+ API calls base capacity.

  • Perpetual License with AMC. Deployed Onsite And Remote Support.

  • Enterprise Virtual Instances Deployment with (4 Production, 2 Dev And 2 Disaster Recovery).

MFA Embedded E-Signatures

Next Generation ESIGN for Property Management in Australia
Problems
Most processes in property management are very paper, email, call and people driven. Its slow and error prone. Most painful part is coordinate between multiple parties to sign the document. Docusign was used but abuse was found in that as who is signing, which person is staying in rented properties was always questioned. Plus cost was way too high if any average company managed 1000+ properties.
Solution Deployed
Our Axiom Protect 2.0 with its embedded Multi Factor Attributes in ESIGN was deployed that replaced Docusign to give the needed agreement signing by multiple party with complete automation and high security. Via text/email rental applicant(s) were send invite, on click each will go thru’ facial, one time password, hand signature, device and geolocation capturing process; all information gets embedded inside PDF or Webform agreement. Achieved Goal: Higher Security, No Fraud, Complete Data Control.
Benefits
  • ZERO frauds, Zero Compromise and Least Risk Score.

  • Huge Cost Saving as all in one. No integration headache or project delays for future applications.

  • Complete 100% software. Quick high velocity high volume rollout.

Up Sell opportunities

Software MFA token for their employees.

Data Extraction from unstructured to structured (XML/json) for further automation.

Water marking the documents to embed the purpose, source, file name ensures authenticity and purpose.

License And Deployment
  • 2.5 months Rollout deployed remotely with 10,000/- agreements per month.

  • Subscription License. Remote Support.

  • Enterprise Virtual Instances Deployment with (2 Production, 1 Dev And 1 Disaster Recovery).

Our Success Stories

Huge 5x Business growth, High ROI. One stop solution, Least CAPEX. Brand Booster. Complete Control. Future Ready
Acleda Bank
Acleda BankTop 1st Bank in Combodia
Read More
Customer Onboarding ,Saving Account Opening, Mobile Merchant verification Security for VPN and Remote Access, Security for Mobile Banking, Security for Internet Banking, Security for3Ds 3DS2 payments, Fintech offered with Banking APIs
 Alliance Bank
Alliance BankEstablished Bank in Malaysia
Read More
Embedded Security, Corporate and Retail Banking, Both Mobile & Hardware Tokens, Complete iAAAAN Implementation, Non Repudiation & Authorization, Hybrid ESIGN + signature OTP
HDFC Bank
HDFC BankIndia's 2nd Biggest Bank
Read More
Document itelligent OCR, Data Masking in PII Documents, Data Masking in statements, End To End Server Security, Facial Matching, Handwritten Signature Matching
Telekom Malaysia
Telekom MalaysiaMalaysia Telco
Read More
Customer Onboarding, API Billing and Managment, Employee Access Control (Facial), Service Cross Selling, Trust Broker for SMEes for identity, MFA for internal Apps, Single Sign On for multiple mobile apps
Previous
Next

Get in touch with us

Axiom Protect 2.0 is owned by Blue-bricks Pty Ltd


    I allow to contact me.

    Our Location

    Level 2, 11 Mounts Bay Road, Perth, WA 6000, Australia

    Send Us Email

    upasana@blue-bricks.com

    Call Us

    +61 2 8376 6284

    Axiom Protect 2.0 is owned by Blue-bricks Pty Ltd