Page 11 - FNSV_Catalog_01_211213
P. 11

BSA for Security, Trust & Privacy









                              Eliminates security risks for accessing applications, network, data and systems, while




                              ensuring compliance with security regulations and industry standards





















                              01 User Experience                                                                                                                                                                                                  03 Privacy by Design







                              For the first time ever, enterprise customer and end users can                                                                                                                                                       Ensure compliance to national and international data protection

                              have  a  secure,  fast  and  convenient  access  to  their  accounts,                                                                                                                                               and privacy regulations and standard such as PDPA, GDPR,


                              protecting their security and privacy with high level of assurance                                                                                                                                                  RMiT, PCI-DSS, HIPAA, etc. High level of assurance on compliant

                              and trust.                                                                                                                                                                                                          with security regulations and standards.







                              02 Security by Design                                                                                                                                                                                               04 Trust by Design







                              Ensure high assurance level of security with no point of                                                                                                                                                            Ensure user device are validated with user and device profile

                              penetration with lowest level of errors of 0.02% and within 3                                                                                                                                                       before verification and authentication process. Provide


                              seconds transaction. Leverage on patented technologies of MIRC,                                                                                                                                                     guarantee to end users that only limited mandatory data are

                              OTSK, MDV and KernelChain (KNChain), for hybrid blockchain                                                                                                                                                          stored and used for authentication in compliance with security


                              verification, validation and authentication. Eliminate windows of                                                                                                                                                    regulations and standards. Never store 2FA data such as

                              opportunities for internal and external threat actors on phishing,                                                                                                                                                  face/fingerprint biometrics that is always belong to end user


                              ransomware, account takeover (ATO), credential theft, fraud and                                                                                                                                                     and it's always stored at user device.

                              other attacks targeting the enterprise.










                                                                                                                                                                                                                                                                                                                                                                                     11
   6   7   8   9   10   11   12   13   14   15   16