Think about the experience you have when shopping on Amazon, driving to a location you’ve never been before using Waze, or trying to determine which television show to binge next on Netflix. The businesses that win in this moment are the ones striving to delight their customers in ways both big and small.
We are in the midst of a digital revolution where both the Internet and digital technologies formulate and drive the way we live and communicate. Both elements have changed the world, connecting dispersed endpoints, and creating an entirely new culture of communication. Through the use of mobile technologies, we are now more connected than ever before.
Uniken Launches REL-IDverify 2.0 at InVest Summit in New York on Tuesday, July 11th.
Robert Levine, COO of Uniken, demonstrated the newest version of REL-IDverify on the main stage for all attendees. REL-IDverify 2.0 ensures that customers' digital channels have controls required to survive zero-day attacks while maintaining a great customer and brand experience. REL-ID's omni-channel security technology protects against credential compromise, network attacks and device malware, satisfying the user experience, security and compliance needs in a mobile-first world.
DDOS impact to Digital Channels remain out of control!
When teenagers are able to run successful enterprises offering DDOS attack services for hire, it’s clear the cost Vs. benefit gained are way too low. To stop DDOS we must figure out a way to make the cost of perpetrating beyond the benefit gained. The current approach of combining extreme bandwidth with protocol break, volumetric and heuristics (examples: machine learning & shared intelligence) checks are not sufficient to break the cycle. Volumes and rates of attacks keep growing and the costs to attack remain low and in some cases have been lowered by dark net tools.
Uniken's CEO, BImal Gandhi, speaks at the Cyber Investing Summit.
The conference was held on May 23rd at the New York Stock Exchange. The event focused on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the next five years (according to Cybersecurity Ventures’s quarterly Cybersecurity Market Report).
By Penny Crosman
Published May 18 2017, 3:19pm EDT
Wells Fargo is putting more focus and effort into its partnerships with tech companies — from giants like Apple, Samsung and PayPal to the smallest startups.
In so doing, the $2 trillion-asset bank is adapting to a truth more banks are acknowledging: that customers are no longer coming directly to their branches, apps, websites or call centers.
Mark Calvey, Senior Reporter, San Francisco Business Times
May 17, 2017
A shakeout already could be underway in the burgeoning fintech sector, forcing some to close their doors while others look for partners, said Steve Ellis, head of Wells Fargo’s innovation group.
“We’re seeing some people without strong sales going away and other people partnering more,” Ellis told the San Francisco Business Times in discussing fintech industry conditions as part ...
Uniken has been selected to participate in the Wells Fargo Startup Accelerator. Over the next six months, the US bank’s programme will collaborate with Uniken on its REL-ID security platform aimed at consumer mobile applications deployed in strongly regulated environments.
“We are excited to have been selected for the programme by the Wells Fargo Startup Accelerator, and for their time and financial investment in Uniken,” says Bimal Gandhi, CEO at Uniken.
Uniken's CTO, Nishant Kaushik makes One World Identity's top 100 Identity Leaders.
Per OWI, 2016 was a year of innovation and explosive growth in the identity industry. Over the course of a 15-day open nomination period, we received over 1,000 nominations for 355 individuals. After compiling all of the nominations, the top 100 were selected based on the following selection standards:
When you think of customer identity and access management (CIAM), what do you think of? One of the first things I think of is a network. That's because I believe security teams need to map out all the different ways in which your customer interacts with you, and how they end up authenticating themselves in each of those flows. Think of them as the different points in your "business network" that customers use to get in. If you haven't mapped out each and every one of them, you have a problem. To use a different analogy, making the front door stronger won't matter much if you've left a window open somewhere. ...