Story image

Sphere Identity launches self-sovereign identity platform

02 Apr 2019

Digital identity system Sphere Identity has launched its two-part business platform and mobile application, which will allow businesses to sign up customers in a secure, compliant, and global way, while also giving users simple control of their data.

Sphere Identity is a self-sovereign identity platform built for digital commerce, backed by distributed storage technologies, providing one-click consumer onboarding that helps businesses navigate GDPR and other regulatory compliance risks.

From a business perspective, companies can integrate Sphere Identity into their Know Your Customer (KYC) process, providing an alternative to online forms and streamlining their customer experience offering in a way that is adaptable to the regulatory and compliance landscape.

For consumers, the mobile application provides individuals with easy access to personal documentation, such as passports and driver’s licenses, saving them the hassle of re-entering the same information numerous times, while also giving them complete control of their personal data.

Sphere Identity CEO Katherine Noall says, “Customer dropoff, revenue loss, data harvesting, and security breaches have become characteristic of this digital age, for both businesses and consumers.

“In the wake of hacks, data breaches, and regulatory responses, we are seeing an increasing rejection of this reality, with more businesses searching for solutions that uncomplicate KYC processes, make sign-up simple, and keep identity safe.”

Noall adds, “In a similar vein, customers are realising that their online identities are multiple, exposed, and easily exploited, and are increasingly frustrated at having to enter the same information over and over again, with little information on how that information will be used by third parties.

“By adopting digital identity procedures in e-commerce transactions, businesses can introduce trust and automation, which has spurred a distinct market for self-sovereign identity solutions.”

With 22% of customers currently abandoning the sign-up process due to the burdensome process of filling in online forms, Sphere Identity aims to combat the dropoff by providing consumers with a consolidated digital identity that can be easily accessed and applied as required.

The Sphere Identity platform is built with the principles of privacy and security by design, making use of distributed storage technology, ensuring that customer data is decentralised and fully encrypted, aiming to reduce the chances of hackers stealing data from one central source.

Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.