Delivering legally valid, context sensitive transaction evidence with consistent, resilient security across multiple applications
Information integrity encompasses all the legal, operational and compliance requirements. Biometric technologies, secondary identifiers and authentication techniques enable organisations to guard against electronic fraud and identity theft and supports electronic fraud management in compliance with the South African ECT Act of 2002.
Identity and Access Management (IDAM) is an essential aspect of your overall security posture – both from a physical access perspective – office premises, laptops, documents, etc. – and from a digital viewpoint – data, systems and applications.
Strengthen your ability to guard against electronic fraud
Datacentrix’ enterprise-class system implements consistent, resilient security across multiple applications and delivers legally valid, context sensitive transaction evidence across the protected applications, acting as an impartial witness to sensitive business transactions.
Datacentrix’ enterprise-class system implements consistent, resilient security across multiple applications and delivers legally valid, context sensitive transaction evidence across the protected applications, acting as an impartial witness to sensitive business transactions.
- Eliminates weak password-based logical application access controls with strong multi-factor authenticators (biometrics, smartcards and PKI digital signatures);
- Prevents password sharing/theft through biometric, smartcard and digital signature-based authentication and transaction signing;
- Positively connects a physical person to a transaction;
- Detects when sensitive data or transactions are being amended using built-in intelligence;
- Records the activity by capturing the user details and the details of the transaction in a way that is admissible in a court of law;
- Stores these records in an independent tamperproof archive “Evidence Vault”, to protect innocent people and the organisation against identity abuse; and
- Complies with the requirements of the ECT Act in terms of electronic evidence.
Our step approach ensures impenetrable IDAM
Datacentrix supports our customers throughout the preparatory and planning phases, through implementation and management.
- Design your IDAM programme in the context of overall business and technology strategies
- Mitigate the greatest risks early on
- Garner support at all levels and disciplines within the organisation
- Take a structured, phased approach to the rollout
- Plan for growth, agility and flexibility
The proven success and maturity of Datacentrix' fraud management solution, and the extent of its support services, places it as a top contender in the area of information security.
Head officeCorporate Park North
238 Roan Crescent, 1685 Old Pretoria Road, Midrand PO Box 50722 Randjiesfontein Midrand, 1683 Tel: +27 87 741 5000 Fax: +27 87 741 5100 GPS coordinates 25° 56' 18.48" S 28° 08' 32.58" E |
© 2024 Datacentrix Holdings Limited | POPIA Disclaimer | POPIA requests | Privacy Policy | Legal Disclaimer | Disclaimer of Liability | Terms and Conditions of Sale |
Section 51 Manual for Private Bodies | Data Protection Complaints Procedure