SlideShare uma empresa Scribd logo
1 de 29
WELCOME TO
A Presentation by Pitney Bowes
pbSecure
TM
Secured HR Documents + Instant ‘Issuer Independent’ Verification
May 6, 2013 PBI Internal use only 2
letter
May 6, 2013 PBI Internal use only 3
 According to a report 1 in 5CV’s are tampered
 HR experts feel 20% of the application received are suspect
 Attrition levels in the IT companies are at an average of 20%
 Top companies prepare thousands of documents in a year to process entry &
exit of employees
 Document process consumes huge HR man hours
 Verification is time consuming and tedious
Situation Today (Challenges)
Are you not concerned that,
as an HR professional
You & Your Resources
are burdened with
ever increasing Verification Requests
Of employees who have since long, left your organization
As an HR professional, are you concerned that
An employee trained by you might be leaving
for a better pay ONLY & ONLY because
they got away by projecting Incorrect
Salaries/Designations
May 6, 2013 PBI Internal use only 7
Introducing
pbSecureTM
A World’s 1st in Securing HR Documents
CONCLUSIVE SOLUTION for
Preventing Fraud/Tampering of HR Documents
Leading to Zero
Verification Overheads
Already adopted by
WIPRO & FADV
May 6, 2013 PBI Internal use only 9
the SOLUTION
Document Evidencing & Verification Solution
Enabling Security
of the Information/Data
Unique | Inventive | Really Simple
the KEY to the SOLUTION is …
Based on Pitney Bowes’
Proven Core Technologies
pbSecureTM allows an
entity to protect Digital or
Physical Asset/Data
at the
Point of Origination
Based on Pitney Bowes’
Proven Core Technologies
pbSecureTM allows an
entity to protect Digital or
Physical Asset/Data
at the
Point of Origination
May 6, 2013 PBI Internal use only 11
Who are we?
What Qualifies us to solve the
problem?
May 6, 2013 PBI Internal use only 12
We are ‘THE’ Global Experts in Evidencing Secure Transactions
pbSecure is built on Pitney Bowes’
90+ Years Proven Platform
May 6, 2013 PBI Internal use only 13
 Founded on April 23, 1920 by Arthur Pitney & Walter Bowes (First patent in 1902)
 $5.4B company, Stamford, Connecticut, USA, >28,000 employees (>100 countries)
 2Million Customers in more than 130 Countries
 Listed on NYSE since 1950
 Continuous member of the S&P 500 since 1957 (one of the other 87 existing)
 $25B - Securely Handle Government Revenue Globally … Every Year
 107th in Software Magazine (2009) world’s 500 Largest Software & Service Providers
 $ 2B in acquisitions since 2000
20
pbSecureTM provides tamper-evidence capabilities for degree/diploma
certificates, stamp paper, tax collection, vouchers etc.
Education
Records
Verification
Citizen
Services –
Birth
Certificates, L
and Records
etc.
Stamp
Duty and
Tax
Collection
Healthcare
– Secure
Prescriptions
Secure
Track/
Store
Logistics
Law
Enforc-
ement
Vouchers /
ID Cards
pbSecureTM secures physical and digital data and provide verification
21
Create secure HR documents in 3 easy steps – Step 1 – create the
template
Varia
ble
Data
22
Step 2 – upload data for processing
Column Headers match
Variable data names in
template
23
Step 3 – Print or mail secured document
Secure Barcode contains all variable data &
unique signature of your organization.
Document cannot be tampered from this point
forward
24
Summary of solution benefits
 Data always resides within your organization and is
not stored/uploaded to a central repository
 Verification can be done independent of issuer –
saves organizations time and effort
 Does not need network connectivity to either issue
or verify the documents
 Copies of the document can be verified – original
document is not needed
25
pbSecure can be deployed as desktop – or standalone application
Hardware
device
 Secures data at source
 Can be used in an interactive or batch mode
 VAULT device provides the hardware for encryption
 Data once encrypted can be moved to any other storage repository
XML to
Encrypt
Encrypte
d XML
26
pbSecure can also be deployed as a web service (within the
enterprise network)
Hardware
device
 Secures data at source
 Can be deployed within the enterprise
 Integrates with existing enterprise applications and workflows
pbSecure
ServerEnterprise
Application
XML to
Encrypt
Encrypte
d XML
27
Several modes for verification are available to suit the
needs of the ecosystem
Offline Verification – can be
accomplished through the use of off-
the-shelf scanners. Software provided
by pbSecure integrates into existing IT
systems of the verifier.
Online Verification – verification through
a web-interface. Can be accomplished
without creating a centralized database
to ensure privacy of customer data
Mobile Verification – smartphones
based on Blackberry, Andriod or iPhone
can download pbSecure App to verify
28
Exclusive & Patented
29
Every connection is a new opportunity™
Every connection is a new opportunity™

Mais conteúdo relacionado

Semelhante a Secure HR Documents Solution

BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Vinod Kashyap
 
Zero fraud tolerance of HR documents
Zero fraud tolerance of HR documentsZero fraud tolerance of HR documents
Zero fraud tolerance of HR documentspbsecure
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwCACCASG Community Manager
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Invessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceInvessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceTheo Paraskevopoulos
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)Peter Bihr
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 
EU data protection laws and impacts on healthcare applications and health data
EU data protection laws and impacts on healthcare applications and health dataEU data protection laws and impacts on healthcare applications and health data
EU data protection laws and impacts on healthcare applications and health dataSpeck&Tech
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keystrueidentity
 
Introduction to QuickBooks Online
Introduction to QuickBooks OnlineIntroduction to QuickBooks Online
Introduction to QuickBooks OnlineIntuit Inc.
 
2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf
2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf
2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdfTracy Dixon
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
The 5-Step Formula for Reducing Document Capture Costs
The 5-Step Formula for Reducing Document Capture CostsThe 5-Step Formula for Reducing Document Capture Costs
The 5-Step Formula for Reducing Document Capture CostsAIIM International
 
Information Governance Checklist and Privacy Impact Ass.docx
Information Governance Checklist and Privacy Impact  Ass.docxInformation Governance Checklist and Privacy Impact  Ass.docx
Information Governance Checklist and Privacy Impact Ass.docxcarliotwaycave
 
Webinar: Top 5 Challenges of Life Sciences Companies
Webinar: Top 5 Challenges of Life Sciences CompaniesWebinar: Top 5 Challenges of Life Sciences Companies
Webinar: Top 5 Challenges of Life Sciences CompaniesAlexandra Sasha Tchulkova
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceMindfields Global
 

Semelhante a Secure HR Documents Solution (20)

BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
Zero fraud tolerance of HR documents
Zero fraud tolerance of HR documentsZero fraud tolerance of HR documents
Zero fraud tolerance of HR documents
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Invessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceInvessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket Science
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
EU data protection laws and impacts on healthcare applications and health data
EU data protection laws and impacts on healthcare applications and health dataEU data protection laws and impacts on healthcare applications and health data
EU data protection laws and impacts on healthcare applications and health data
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
 
Introduction to QuickBooks Online
Introduction to QuickBooks OnlineIntroduction to QuickBooks Online
Introduction to QuickBooks Online
 
2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf
2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf
2023.04.04, Automating Data Extraction with UiPath Document Understanding.pdf
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
The 5-Step Formula for Reducing Document Capture Costs
The 5-Step Formula for Reducing Document Capture CostsThe 5-Step Formula for Reducing Document Capture Costs
The 5-Step Formula for Reducing Document Capture Costs
 
Information Governance Checklist and Privacy Impact Ass.docx
Information Governance Checklist and Privacy Impact  Ass.docxInformation Governance Checklist and Privacy Impact  Ass.docx
Information Governance Checklist and Privacy Impact Ass.docx
 
Webinar: Top 5 Challenges of Life Sciences Companies
Webinar: Top 5 Challenges of Life Sciences CompaniesWebinar: Top 5 Challenges of Life Sciences Companies
Webinar: Top 5 Challenges of Life Sciences Companies
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process Intelligence
 

Último

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Último (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Secure HR Documents Solution

  • 1. WELCOME TO A Presentation by Pitney Bowes pbSecure TM Secured HR Documents + Instant ‘Issuer Independent’ Verification
  • 2. May 6, 2013 PBI Internal use only 2 letter
  • 3. May 6, 2013 PBI Internal use only 3  According to a report 1 in 5CV’s are tampered  HR experts feel 20% of the application received are suspect  Attrition levels in the IT companies are at an average of 20%  Top companies prepare thousands of documents in a year to process entry & exit of employees  Document process consumes huge HR man hours  Verification is time consuming and tedious Situation Today (Challenges)
  • 4. Are you not concerned that, as an HR professional You & Your Resources are burdened with ever increasing Verification Requests Of employees who have since long, left your organization
  • 5.
  • 6. As an HR professional, are you concerned that An employee trained by you might be leaving for a better pay ONLY & ONLY because they got away by projecting Incorrect Salaries/Designations
  • 7. May 6, 2013 PBI Internal use only 7
  • 8. Introducing pbSecureTM A World’s 1st in Securing HR Documents CONCLUSIVE SOLUTION for Preventing Fraud/Tampering of HR Documents Leading to Zero Verification Overheads Already adopted by WIPRO & FADV
  • 9. May 6, 2013 PBI Internal use only 9 the SOLUTION Document Evidencing & Verification Solution
  • 10. Enabling Security of the Information/Data Unique | Inventive | Really Simple the KEY to the SOLUTION is … Based on Pitney Bowes’ Proven Core Technologies pbSecureTM allows an entity to protect Digital or Physical Asset/Data at the Point of Origination Based on Pitney Bowes’ Proven Core Technologies pbSecureTM allows an entity to protect Digital or Physical Asset/Data at the Point of Origination
  • 11. May 6, 2013 PBI Internal use only 11 Who are we? What Qualifies us to solve the problem?
  • 12. May 6, 2013 PBI Internal use only 12 We are ‘THE’ Global Experts in Evidencing Secure Transactions pbSecure is built on Pitney Bowes’ 90+ Years Proven Platform
  • 13. May 6, 2013 PBI Internal use only 13  Founded on April 23, 1920 by Arthur Pitney & Walter Bowes (First patent in 1902)  $5.4B company, Stamford, Connecticut, USA, >28,000 employees (>100 countries)  2Million Customers in more than 130 Countries  Listed on NYSE since 1950  Continuous member of the S&P 500 since 1957 (one of the other 87 existing)  $25B - Securely Handle Government Revenue Globally … Every Year  107th in Software Magazine (2009) world’s 500 Largest Software & Service Providers  $ 2B in acquisitions since 2000
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. 20 pbSecureTM provides tamper-evidence capabilities for degree/diploma certificates, stamp paper, tax collection, vouchers etc. Education Records Verification Citizen Services – Birth Certificates, L and Records etc. Stamp Duty and Tax Collection Healthcare – Secure Prescriptions Secure Track/ Store Logistics Law Enforc- ement Vouchers / ID Cards pbSecureTM secures physical and digital data and provide verification
  • 21. 21 Create secure HR documents in 3 easy steps – Step 1 – create the template Varia ble Data
  • 22. 22 Step 2 – upload data for processing Column Headers match Variable data names in template
  • 23. 23 Step 3 – Print or mail secured document Secure Barcode contains all variable data & unique signature of your organization. Document cannot be tampered from this point forward
  • 24. 24 Summary of solution benefits  Data always resides within your organization and is not stored/uploaded to a central repository  Verification can be done independent of issuer – saves organizations time and effort  Does not need network connectivity to either issue or verify the documents  Copies of the document can be verified – original document is not needed
  • 25. 25 pbSecure can be deployed as desktop – or standalone application Hardware device  Secures data at source  Can be used in an interactive or batch mode  VAULT device provides the hardware for encryption  Data once encrypted can be moved to any other storage repository XML to Encrypt Encrypte d XML
  • 26. 26 pbSecure can also be deployed as a web service (within the enterprise network) Hardware device  Secures data at source  Can be deployed within the enterprise  Integrates with existing enterprise applications and workflows pbSecure ServerEnterprise Application XML to Encrypt Encrypte d XML
  • 27. 27 Several modes for verification are available to suit the needs of the ecosystem Offline Verification – can be accomplished through the use of off- the-shelf scanners. Software provided by pbSecure integrates into existing IT systems of the verifier. Online Verification – verification through a web-interface. Can be accomplished without creating a centralized database to ensure privacy of customer data Mobile Verification – smartphones based on Blackberry, Andriod or iPhone can download pbSecure App to verify
  • 29. 29 Every connection is a new opportunity™ Every connection is a new opportunity™

Notas do Editor

  1. This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010!For more sample templates, click the File tab, and then on the New tab, click Sample Templates.