Page 31 - FNSV_Catalog_01_211213
P. 31
BSA : Meeting the Customer Requirements
BSA KEY VALUES CUSTOMER KEY REQUIREMENTS BSA KEY FEATURES
- How easy is it to install and operate the solution? - Simple and Intuitive installation in Android and iOS
User Experience - How does the solution encourage user adoption? - Passwordless One-stop Authentication experience
- How convenient, ubiquitous and portable? - Does not require additional device (BYOD)
- Choice of authenticators for user preference? - Additional Authenticators: Biometrics, Patterns,PIN, OTP, etc.
- Resist most common cyber attack? - Free from hacking attempts toward Mobile App and Server
Security - Expected Vulnerability in the near future? - No single point of vulnerability and hacking opportunity
- Comply with current security standards? - Rest API to integrate other authenticators, IdP, eKYC, 3rd Party MFA
- How complete is the solution? - End-to-end services with mobile app, server and admin.
- Cost of implementation and maintenance - No upfront cost for Cloud. Min. cost for On-premise. User/Usage cost
Sustainability - Actual ROI - Proven ROI and VOI from passwordless features
- Integration Capability with legacy security system - Provide standard REST API for Integration with legacy and cloud
- Secondary effect from environmental aspect - No need of additional device and Minimum server specs
- Privacy data storage: Central or Distributed? - Store Non-critical user data in blockchain nodes
Privacy - Consent management feature - Integration capability with consent management system
- Capability to enhance privacy - By Design, BSA doesn’t store sensitive privacy data
- Choice for users regarding how much data to share? - Provide alternative options to share user information
- Vertical/Geographical/Demographic Scalability - Provide scale out capability on the fly basis and future proof
Scalability - Performance for high demand - SLA of 3 seconds of latency @10,000 concurrent connection
- Error rate of the authentication solution - SLA of 0.02% of error rate
- Continuity and Recovery strategies - Provide HA and DR strategies with HA architecture design
31