Time & Location
About the Event
The term cyber profiling has previously been associated with the vetting of employees by specialist companies and recruiting organisations to confirm their credentials and background.
RMSS has engaged the concept of cyber profiling using advanced technology that delivers immediate business benefit by considerably enhancing the involvement experience of non-licensed users of the product. The RMSS Suite captures personal datasets that significantly streamline and authenticate non-licensed users as they participate in the workflows associated with risk, compliance and organisational event/incident management at client organisations.
RMSS delivers cyber profiling and cyber identity in its purest form; when there is a non-licensed user access /hit on the product (a person not contained within our accredited user base) then The RMSS Suite immediately understands, based on very little cyber data, who this person is in order to streamline and determine the most appropriate workflow. Using this limited cyber footprint The RMSS Suite collects, analyses and determines the specific workflow and access to information and dataset workflows this ‘casual user’ is able to gain access to.
The team at RMSS has gone beyond available technology that allows user credentials and profiles to be synchronised with authentication datasets or a pre-populated datasets.
Our innovation team defeated the challenge and have broken this widely accepted software development process by extracting the necessary criteria and information from the touch point of the user hitting the product URL and almost submissively being able to extract relevant criteria that forms the non-licenced user profile. The RMSS Suite overcomes the extreme challenge of using extracted criteria to instruct the product how to behave and what data, workflow and information that user can and should have access to.
The RMSS Suite effectively launches multiple technology tentacles into the IP address and email address to determine all factors that can possibly be determined in relation to proving the most appropriate access and ability to participate in the desired workflow. The innovation team invented the software engineering capability to discriminate the information received and discard irrelevant aspects but identify and then put into use relevant information that will then determine the datasets, information and workflow that this originally unknown user access.