Page 31 - FNSV_Catalog_01_211213
P. 31

BSA : Meeting the Customer Requirements

















                                  BSA KEY VALUES                                                                      CUSTOMER KEY REQUIREMENTS                                                                                                        BSA KEY FEATURES




                                                                                                                      - How easy is it to install and operate the solution?                                                                            - Simple and Intuitive installation in Android and iOS


                                     User Experience                                                                  - How does the solution encourage user adoption?                                                                                 - Passwordless One-stop Authentication experience

                                                                                                                      - How convenient, ubiquitous and portable?                                                                                       - Does not require additional device (BYOD)

                                                                                                                      - Choice of authenticators for user preference?                                                                                  - Additional Authenticators: Biometrics, Patterns,PIN, OTP, etc.






                                                                                                                      - Resist most common cyber attack?                                                                                               - Free from hacking attempts toward Mobile App and Server


                                     Security                                                                         - Expected Vulnerability in the near future?                                                                                     - No single point of vulnerability and hacking opportunity
                                                                                                                      - Comply with current security standards?                                                                                        - Rest API to integrate other authenticators, IdP, eKYC, 3rd Party MFA


                                                                                                                      - How complete is the solution?                                                                                                  - End-to-end services with mobile app, server and admin.





                                                                                                                      - Cost of implementation and maintenance                                                                                         - No upfront cost for Cloud. Min. cost for On-premise.  User/Usage cost



                                     Sustainability                                                                   - Actual ROI                                                                                                                     - Proven ROI and VOI from passwordless features
                                                                                                                      - Integration Capability with legacy security system                                                                             - Provide standard REST API for Integration with legacy and cloud


                                                                                                                      - Secondary effect from environmental aspect                                                                                     - No need of additional device and Minimum server specs





                                                                                                                      - Privacy data storage: Central or Distributed?                                                                                  - Store Non-critical user data in blockchain nodes


                                     Privacy                                                                          - Consent management feature                                                                                                     - Integration capability with consent management system

                                                                                                                      - Capability to enhance privacy                                                                                                  - By Design, BSA doesn’t store sensitive privacy data

                                                                                                                      - Choice for users regarding how much data to share?                                                                             - Provide alternative options to share user information





                                                                                                                      - Vertical/Geographical/Demographic Scalability                                                                                  - Provide scale out capability on the fly basis and future proof



                                     Scalability                                                                      - Performance for high demand                                                                                                    - SLA of 3 seconds of latency @10,000 concurrent connection
                                                                                                                      - Error rate of the authentication solution                                                                                      - SLA of 0.02% of error rate


                                                                                                                      - Continuity and Recovery strategies                                                                                             - Provide HA and DR strategies with HA architecture design





                                                                                                                                                                                                                                                                                                                                                                                     31
   26   27   28   29   30   31   32   33   34   35   36