By Shamsh Hadi, CEO & Co-Founder of ZorroSign, Inc.
As CEO of ZorroSign, Inc. I am committed to advancing technology while advancing sustainability. With regard to technology, I am always looking for ways to stay ahead of the curve—especially in cybersecurity.
But lately, there’s an emerging technology that keeps me up at night: Quantum computing.
While quantum computing promises potential breakthroughs in AI, chemistry and medicine, physics and materials science, it also presents a significant threat to cybersecurity.
Think of it like this: The locks guarding our digital data are built on complex mathematical problems (cryptography). Today’s computers struggle to crack these problems, taking years with longer encryption keys, keeping our information safe. But quantum computers, capable of massively parallel processing, could potentially shatter these locks and access encrypted data with ease.
A sufficiently powerful quantum computer could break the public-private key encryption that secures digital communications, data, and transactions today, explains ScienceNews. “’All of those public-key algorithms are vulnerable to an attack that can only be carried out by a quantum computer,’ says mathematician Angela Robinson of NIST, ‘Our whole digital world is relying on quantum-vulnerable algorithms.’”
PQC is the next generation of encryption—designed to withstand the challenges of quantum computing by providing greater cybersecurity resilience. While the market is still evolving, PQC initiatives are rolling out and it is crucial to start assessing PQC solutions to future-proof your data security:
Protecting sensitive information — from financial records to customer data, a data breach can be catastrophic but strong PQC safeguards your most valuable digital data assets.
Maintaining customer trust — consumers expect their data to be safe, and implementing PQC demonstrates your commitment to robust, future-proof data security.
Staying competitive — businesses that embrace PQC early will be recognized as leaders in cybersecurity, gaining a potential edge in competitive markets.
The future of quantum computing is uncertain, but one thing is clear: Business leaders cannot afford to be unprepared.
By proactively adopting PQC, you can ensure your business data and your customer data remains secure—no matter what the future holds. I invite you to start exploring PQC solutions today and safeguard your business for the quantum tomorrow. Please connect with me on LinkedIn or email me to start a conversation . . .
A recent Crowdstrike blog argues how “like so many legacy technologies, legacy data loss prevention (DLP) tools fail to deliver the protection today’s organizations need.”
Crowdstrike notes that with rising attacks, new attack vectors, and higher cost data breaches, organizations are desperate for a modern alternative to traditional cybersecurity solutions, where (as the blog summarizes):
Unstructured data on endpoints is at great risk of misuse or breach
More than a third of data loss prevention deployments fail
Your data is too complex for legacy data loss prevention tools
Legacy data loss prevention tools lack visibility into real-world data flows, and so lack context to stop breaches
While I agree with all of Crowdstrike’s arguments, I believe blockchain technology improves cybersecurity and propose that storing your data on blockchain is a necessary leap forward in security versus legacy technologies.
Why is it vital that your organization moves to blockchain-based data storage? Four key reasons:
Immutable Records One of the main benefits of blockchain technology is its ability to provide secure and tamper-proof record keeping, as the use of cryptography and peer-consensus mechanisms ensures that once data is recorded on the blockchain, it is extremely difficult to alter or delete. This immutability and transparency provide important chain-of-custody audit capabilities for courts and ensure peace of mind to users. Such security also makes blockchains ideal for use in financial transactions, real estate agreements and other high-value exchanges, where a record of every step is essential for ensuring the integrity of the process.
Secure Authentication One of the main issues in cybersecurity is the vulnerability of traditional authentication methods such as passwords. Passwords can be easily hacked or stolen, leaving sensitive information vulnerable to attack. This can be a threat to businesses, especially those who store their users’ personal information. Blockchain technology can provide secure authentication through the use of public-private key cryptography, eliminating passwords from the process.
Decentralization Unliked centralized databases which can be breached at unsecure endpoints (users and devices)—or even at MSPs hosting them—giving attackers complete control once they gain central access, blockchain technology distributes data across geographically separate nodes.
The decentralized nature of blockchains ensures that there is no single point of failure, which also means that hackers cannot easily compromise the system. By decentralizing data storage, blockchain effectively prevents any one endpoint (even if compromised) from gaining control of the full data set.
This distributed nature defeats those attacks seeking to breach a system and holistically encrypt the data files stored therein. For example, breaching a single endpoint node and attempting to hold data “for ransom” fails, as the larger data set cannot be controlled by any one endpoint (or central authority) and so attackers cannot capture the full data set for encryption, ransom, or shutting down the network.
Further, with private, permissioned blockchains, each endpoint node (or user) has a unique encryption key to access and write to the distributed ledger. If any one of those endpoints is successfully attacked (presumedly compromising their access key), the private blockchain can simply remove distributed ledger access for that compromised key, issue the endpoint a new key, and allow that endpoint to quickly regain distributed ledger access (effectively as a new endpoint).
This unique recovery process effectively maroons any ransomware on the endpoint it attacked—ending its access and threat—while allowing the endpoint to re-engage the larger data set: With a new key and without needing to pay any ransom to the attackers for restored access.
Identity Verification Identity verification is another area where blockchain can be used to enhance cybersecurity. It ensures that the individual claiming a particular identity is actually who they say they are. With blockchain, users can have greater control over their personal information, allowing them to manage their digital identities more securely. This makes it more difficult for hackers to steal personal information or create fake identities.
ZorroSign’s Data Security Platform Built on Blockchain
As the world becomes more digitized and interconnected, the importance of cybersecurity will only continue to grow, and blockchain storage will play a crucial role in ensuring that our digital world remains safe and secure.
ZorroSign was built from the ground up on Hyperledger Fabric to deliver digital signatures with the superior privacy and security of blockchain. We recently announced our advanced integration with Provence Blockchain, adding their DLT to our architecture as well.
Our Z-Vault® enables ZorroSign users to store, structure, organize and search documents in folders and subfolders natively with the peace of mind that comes from blockchain-based data privacy and security—leaving legacy technologies behind for good.
ZorroSign’s platform can be accessed via PCs and mobile devices, allowing your staff to efficiently generate, negotiate, communicate, and sign agreements. And with Z-Vault, contracts reside on an immutable document management system where they can be saved, searched for, and easily managed from a single, intuitive user interface.
Z-Vault Benefits for Your Organization
Superior privacy and security to PKI-based solutions using a centralized database
The latest privacy and security technologies, delivering powerful encryption safeguards
Ability to share and review Z-Sign and architectural drawings, adding your own comments
Save time with access to specific folders and documents in seconds, no loss of records
I believe blockchain-based data storage is critical to improving cybersecurity, and I invite you to learn more about Z-Vault to securely store contracts, data, and documents on blockchain instead of legacy technologies.
Learn more about Z-Vault or connect with me on LinkedIn to start a conversation today!
Digital Transformation in the Healthcare Industry
Over the past decade there is no question that the healthcare industry has experienced profound transformation when it comes to technology. This shift has brought enhanced patient care and streamlined processes.
One prominent advancement in technology for healthcare was the created of electronic health records, or EHRs. Healthit.gov defines an EHR as “a digital version of a patient’s paper chart. EHRs are real-time, patient-centered records that make information available instantly and securely to authorized users. EHRs have becomes an instrumental technological advancement through the way they can:
“Contain a patient’s medical history, diagnoses, medications, treatment plans, immunization dates, allergies, radiology images, and laboratory and test results,
“Allow access to evidence-based tools that providers can use to make decisions about a patient’s care, and
”Automate and streamline provider workflows.”
One of the main reasons EHRs were created was to ensure health information can be created and shared across authorized providers in a digital format readily managed by multiple health care organizations. This allows for a broader network of communication and sharing between medical professionals seeking to diagnose and treat individual patients.
Another remarkable technology advancement has been the rise of telemedicine. According to Telehealth.gov, “Telemedicine, or telehealth, essentially lets your health care provider care for you without an in-person office visit. Telehealth is done primarily online with internet access on your computer, tablet, or smartphone.” Since the pandemic, telehealth has jumped in both the volume of technology solutions and applications across medical fields.
A third example of emerging healthcare technologies can be found in wearables. “With an aging population in much of the developed world, wearables can be effective at prevention of chronic conditions, such as diabetes and cardiovascular disease, by helping patients to monitor and improve their fitness,” notes Proclinical.
Wearable healthcare devices for monitoring and diagnostics are a kind of internet of medical things (IoMT) or healthcare IoT that facilitates remote patient monitoring (RPM) and supports telemedicine. “IoMT enables the use of new technology that facilities patient self-service and minimizes the need for in-person visits,” explains TechTarget. “Consumer-grade wearables give patients access to data that they might traditionally have had to go to a doctor to get.”
The convergence of healthcare and technologies such as these has paved the way for a new era of efficiency, accessibility, and innovation—redefining the way we approach medical services and patient data.
Importance of HIPPA Compliance and Data Security with the Advancement of Technology
With the rise of EHRs, telemedicine, wearables, and other healthcare technologies, there is a growing concern for data security and compliance. This is especially true in the healthcare industry where the data is always personal, and data privacy and security are mandated by law—specifically in the United States with the Health Insurance Portability and Accountability Act of 1996 (HIPAA).
The importance of safeguarding patient data in accordance with HIPAA regulations has driven the development of robust security measures, encryption protocols, and strict access controls. To maintain HIPAA compliance, digital technologies have regular security audits and updates to identify vulnerabilities and ensure that the systems adhere to the latest security standards.
On top of HIPPA compliance, platforms that manage data security healthcare may bolster data privacy and security by leveraging:
Blockchain technologies —by providing a secure, transparent, and efficient way to store and share information (such as patient healthcare records, prescriptions, diagnostic data across providers, etc.), blockchains are making it possible to improve patient care, reduce costs, and streamline administrative processes.
Identity as a Service (IDaaS) — offering a comprehensive solution that addresses identity management, authentication, access control, and compliance, contributing to a more secure healthcare system.
Passwordless authentication — by eliminating the vulnerabilities associated with passwords and delivering a seamless user experience, passwordless authentication methods improve data protection, compliance, and overall cybersecurity in healthcare environments.
ZorroSign Delivers HIPAA-compliant Privacy with the Elevated Security of a Web3 Platform
At ZorroSign, our HIPAA-compliant data security platform built in blockchain supports healthcare organizations with digital records, digital signatures, and document workflows.
Our platform ensures superior privacy and security with blockchain, IDaaS, and passwordless authentication, plus:
Legal enforceability — reducing insurance fraud with digital signatures that are legally binding, tied to the actual person (signatory attribution), and immutable with court-admissible security certificates that never expire
Cost-savings — through automating patient, diagnostic, insurance, payment, and recordkeeping workflows and digitizing paper applications, forms, and records
Improved patient services — digitizing your office operations to quickly execute, store, track, and retrieve:
Claims management, payments, and prior authorization
Facilities management
Human resources processes
Logistics and procurement
Patient sign-in and consent
Power of Attorney and Proxy Agreements
Prescription approval routing
ZorroSign is just one of the new technologies driving improvements in healthcare and expanding the patient services that healthcare providers can deliver.
To learn how ZorroSign can support your healthcare organization’s data privacy and security, visit our Healthcare industry page or contact us today!
It has long been claimed that blockchain technology has the potential to revolutionize the way companies approach security. By leveraging the decentralized and immutable nature of blockchain, companies can enhance your security stack and protect against a wide range of threats.
One of the main benefits of blockchain technology is its ability to provide secure and tamper-proof record keeping. The decentralized nature of blockchains ensures that there is no single point of failure—which also means that hackers cannot easily compromise the system. Additionally, the use of cryptography and consensus mechanisms ensures that once data is recorded on the blockchain, it is extremely difficult to alter or delete.
Another security benefit of blockchain technology is its ability to provide secure and transparent transactions. By using smart contracts, companies can automate and streamline processes, while also ensuring that all transactions are recorded in a transparent and immutable manner. This can help to reduce the risk of fraud and increase trust between parties.
Blockchain technology can also be used to improve supply chain management. By using blockchain, your organization can track products and goods as they move through supply chains—providing real-time visibility into the status and location of products. This can help to improve efficiency, reduce costs, reduce fraud, and increase transparency.
Moreover, blockchain technologies such as Hyperledger Fabric (private, permissioned) and Provenance Blockchain (public, permissionless) can be used to enhance cybersecurity by providing encrypted and immutable identity management. Blockchain-based identity and access management (IAM) systems provide secure and decentralized storage of identity data, making it more difficult for hackers to steal or compromise sensitive information.
By incorporating blockchain technology into your security stack, companies can enhance your security posture and protect against a wide range of threats. Blockchains provide:
Secure and tamper-proof record keeping,
Secure and transparent transactions,
Improved supply chain management, and
Enhanced identity management.
Together, these make blockchain technology an attractive option for companies looking to improve your security. And organizations that leverage blockchain technology to improve your security will be strongly-positioned to succeed in the years ahead!
To read more about the growing risks to digital data in 2023—and learn how adding blockchain technologies to your security stack can combat those risks—download our eBook today or contact us to start a discussion!
Every November 30th, the United States observes National Computer Security Day. This year, we’d like to share some details on the history of this security awareness, how ZorroSign’s data security platform built on blockchain contributes to computer security, and how you can observe National Computer Security Day to improve your hardware and data security.
“It seems like every day we hear about breaches in cyber security. Keeping people and companies safe online is a top priority all over the world. It’s something that stays uppermost in our minds on National Computer Security Day. The story of National Computer Security Day is an interesting one.
“On November 2, 1988, Cornell University researchers uncovered an unknown virus lurking in their computer systems. Within four hours of discovery, the Morris worm virus invaded several other university systems as well as the ARPANET, an early version of today’s internet.
“Six days later, two computer experts with the U.S. Defense Advanced Research Projects Agency (DARPA) recommended assembling a National Computer Infection Action Team (NCAT) to respond 24/7, 365 to these kinds of attacks. On November 14, the Software Engineering Institute (SEI), a research center connected with Carnegie Mellon University, set up the Computer Emergency Response Team (CERT).
“In 1988, the National Computer Security Day sprang out of the Washington, D.C., chapter of the Association for Computing Machinery’s (ACM) Special Interest Group on Security, Audit, and Control as a way to raise awareness about cybercrimes and viruses. According to a 2004 Networld article, ‘November 30 was chosen for CSD so that attention on computer security would remain high during the holiday season – when people are typically more focused on the busy shopping season than thwarting security threats.’ By 2003, CERT and the U.S. Department of Homeland Security joined forces to create the National Cyber Awareness System.
“Whether we’re talking about National Computer Security Day or National Cybersecurity Awareness Month also in October, the goals are essentially the same. Each person must be proactive to protect their online security. Use this month to find out all you can about common-sense ways to stay safe in cyberspace.”
HOW ZORROSIGN’S PLATFORM SUPPORTS COMPUTER SECURITY
ZorroSign is the first company that offers a multi-blockchain data security platform to secure, track, and manage your digital signatures, transactions, and documentation.
By using distributed ledger technologies—originally built on Hyperledger Fabric and now expanded to include the Provenance Blockchain—ZorroSign provides superior privacy and security, while preventing fraud and ensuring regulatory compliance.
Blockchains provide structural layers of protection from cybercrime—like ransomware, malware, or phishing attacks—first, by decentralizing the data set itself (preventing any one breach to access the entire data set), and second, by giving endpoints (or nodes) a quick path to recovery, even if they are themselves breached or their access ransomed. Unlike centralized databases—which can be breached at unsecure endpoints (users and devices) or even at managed service providers (MSPs) hosting them—giving attackers complete control once they gain central access, blockchain technology distributes data physically across separate nodes. By decentralizing data storage, blockchain effectively prevents any one endpoint (even if compromised) from gaining control of the full data set. This distributed nature defeats any attack seeking to breach a system and holistically encrypts the data files stored inside: A single endpoint node might be breached, and its files held for ransom, but the larger data set cannot be controlled by any one endpoint (or central authority) and so attackers cannot capture the full data set for encryption, ransom, and shutting down the network.
ZorroSign has further elevated our security through our patented fraud detection technology we call the Z-Forensics token. This unique digital solution that can:
Prove that the individual who is performing the action to sign the document is who they claim to be (verification)
Apply a digital equivalent of a wet-ink signature to the document (legal intent)
Prove the authenticity of the printed or digital version of an electronically signed document, its content, attachments, and the signatures on it (authenticity)
Plus ZorroSign supports computer security with passwordless authentication capabilities, leveraging the biometric security of Apple and Android mobile devices to login to the device (and ZorroSign app) with hardware biometric capture features such as face, fingerprint, and iris scans. Such biometric login facilitates user authentication at the device-level without passwords (which can be hacked or stolen) for elevated security of digital signatures and your digital documents.
“Create a strong password In computer security, length matters. Passwords that are six characters are easier to hack, especially if they’re only made up of lowercase letters. To beef up your password, weave a nine-character combination of uppercase letters, symbols and numbers. Lastly, avoid using the same password for every account.
“Update spyware and malware protection software First, check to see if your operating system is up-to-date. If that’s set, update your protection software. Run a scan and don’t forget to invite your other devices to the party. Phones and tablets are also major security risks, so be diligent.
“Encrypt and backup your data Encrypt your data to create the brainiest of all brainteasers. But keep this in mind: even the best brain teaser can be cracked. That’s why it’s still important to back up your info on either the cloud or an external hard drive. (Just make sure that everything stays encrypted.)”
Use ZorroSign’s data security platform built on blockchain Tap the cybersecurity of blockchain with ZorroSign’s platform uniting digital signatures (Z-Sign), automated compliance (Z-Flow), intelligent forms (Z-Fill), document storage (Z-Vault), patented fraud prevention (Z-Forensics), user authentication and document verification (Z-Verify), identity-as-a-service (IDaaS), and so much more. Plus elevate computer security with our passwordless login capabilities, and patented Z-Forensics token for fraud detection. When the risk is personal and everything is on the line, Block It Down!
Contact us to learn more or put us to the test: Start your free trial of ZorroSign’s data security platform built on blockchain today!
With more and more businesses, governments, and individuals employing blockchain technology for commerce and operations, ZorroSign stands as key addition to your technology stack.
Whether you’re decentralizing data with web3, securing cloud or software-as-a-service (SaaS) architectures, committing to digital transformation, or elevating sustainability, our multi-chain blockchain solution is the perfect addition to your IT offerings—learn how!
If You’re Decentralizing with Web3
The idea of escaping a centralized authority managing protocols, transactions, and access was built into the World Wide Web from its earliest days.
Web 1.0 was the initial iteration of the World Wide Web in the late 1980’s and early 1990’s. “Web 1.0 is the term used for the earliest version of the Internet as it emerged from its origins with Defense Advanced Research Projects Agency (DARPA),” writes Kuntal Chakraborty for Techopedia. “Experts refer to it as the ‘read-only’ web—a web that was not interactive in any significant sense.”
From those early static web pages, a platform model of computing soon evolved that would become Web 2.0 or the ‘social web.’ Here, interaction with growing web applications and platforms drove e-commerce and the expansion of the Internet, allowing large providers to aggregate and control much of the shared data. This is the Internet we know today.
The dream of Web 3.0, however, is to break the centralization of information and democratize the Internet more to the vision of its earliest founders. “Web3, ” claims Chris Dixon from Andreesen Horowitz in a recent article in The Economist, “combines the decentralized, community-governed ethos of web1 with the advanced, modern functionality of web2.”
“The rise of technologies such as distributed ledgers and storage on blockchain will allow for data decentralization and create a transparent and secure environment, overtaking Web 2.0’s centralization, surveillance and exploitative advertising,” writes Charles Silver in a recent Forbes article. “Indeed, one of the most significant implications of decentralization and blockchain technology is in the area of data ownership and compensation… Web 3.0 will bring us a fairer internet by enabling the individual to be a sovereign.”
Blockchains are distributed ledger technology (DLT) leveraging cryptography—user authentication, data encryption and verification—to secure information records (blocks) distributed across peer-to-peer (P2P) networks. DLTs replicate, share, and synchronize digital data geographically spread across multiple sites (nodes), with no central data storage or administrator. They can run publicly (open) or privately (permissioned).
Perhaps most importantly, blockchains can support smart contracts—where terms, conditions, and permissions written into the digital code that require an exact sequence of events to take place to trigger the agreement of the terms mentioned in the blockchain contract. This hardwiring of contract details greatly increases speed (via automation), trust (where accuracy and backup are built into the transaction), and autonomy (as no third parties are required to mediate or control the exchange) of transactions.
As such, centralized solutions such as blockchains have immense potential to transform business contracts, real estate deals, digital rights, supply chain security and provenance, estate planning, and many other legal transactions.
And here is where ZorroSign shines!
We have built our digital platform from the ground up using blockchain technology. Launched with Hyperledger Fabric, our multi-chain platform now supports the public Provenance Blockchain as well, giving our users an entirely new world of decentralized digital transactions.
Our web3 technology platform also provides identity-as-a-service (IDaaS) capabilities through a patented Z-Forensics token plus fraud prevention, user authentication, and document verification. Web3 features such as artificial intelligence (AI) and machine learning (ML) allow us to automate form completion for digital documents, and can improve regulatory compliance across global standards for legally enforceable digital signatures.
Paired with Provenance Blockchain—which reduces the need for third-party intermediation, drastically reducing costs and freeing up capital in financial transactions—ZorroSign’s platform promotes greater transparency and liquidity for organizations, and allows for new kinds of financial engineering and business opportunities.
If You’re Securing SaaS or Cloud Solutions
More than 90% of all cyber attacks begin with phishing but blockchain architecture, originally built for zero-trust environments, can deliver a compelling alternative to centralized databases and a strong protection against cyber attacks. How?
In phishing attacks that seek to steal data, blockchain presents a data architecture where no single endpoint node controls the data set. Even if an individual endpoint is hacked through phishing or other social engineering, the data set is distributed across many nodes. This decentralization of data and access means even successful phishing attacks that penetrate a blockchain endpoint only gain a small piece of system access.
In cyber attacks that seek to inject malware such as ransomware, the distributed nature of blockchain defeats those seeking to breach a system then holistically ransom the data files stored therein. Again, a single endpoint node might be breached, but the larger data set cannot be controlled by any one endpoint (or central authority) and so attackers cannot capture the full data set for encryption, ransom, and shutting down the network.
Recovery is quicker with blockchain, too. With blockchain, each endpoint node has a unique encryption key to access and write to the distributed ledger. If any one of those endpoints is successfully hacked (compromising their access key), the blockchain can simply remove distributed ledger access for that compromised key, issue the endpoint a new key, and allow that endpoint to quickly regain distributed ledger access (effectively as a new endpoint). This speedy recovery process effectively maroons any ransomware on the endpoint it attacked—ending its access and threat—while allowing the endpoint to re-engage the larger data set with a new key and without needing to pay any ransom to the attackers for restored access.
ZorroSign technology leverages the biometric capabilities of hardware endpoints to verify user identities—for example, PC and mobile device fingerprint scans, iris scans, and face recognition to ensure users are who they claim to be.
And ZorroSign multi-factor authentication (MFA) provides maximum security, as before a user can sign a document, our platform can validate multiple dimensions of authentication based upon your transaction security needs: What you know (i.e., your ZorroSign login password ), what you have (e.g., your laptop or mobile device), who you are (e.g., biometrics such as fingerprints or eye iris on the device securing who can access it), etc.
ZorroSign has further elevated our security through our patented fraud detection technology we call the Z-Forensics token, our unique digital solution that can:
Prove that the individual who is performing the action to sign the document is who they claim to be (verification);
Apply a digital equivalent of a wet-ink signature to the document (legal intent); and,
Prove the authenticity of the printed copy or digital version of an electronically signed document, its content, attachments, and the signatures on it (authenticity).
Unlike any other digital signature solution, ZorroSign seals all your documents with our Z-Forensics token—capturing the complete audit trail and accompanying attachments and signature workflow. The token is encrypted and contains all the details about the transaction: Time stamps, user authentication, documents and attachments.
And like your SaaS solutions, ZorroSign’s SaaS model can be deployed in various cloud configurations, making it seamless to integrate into your existing platform as a public, private, hybrid, or on-premise cloud:
Our standard deployment is on Amazon Web Services (AWS) public cloud computing network
In our private cloud configuration, all your data and the ZorroSign application run in a private and secure cloud network dedicated to your organization
In a hybrid cloud configuration, your data can be stored on either ZorroSign data centers or in the private cloud, while the ZorroSign platform and applications run on their standard public cloud configurations
On-premise deployments require your department to manage and maintain your own data centers, but gain the benefits of unlimited API calls and total control over identity access management (IAM), data privacy and security, and data integrity processes
If You’re Committed to Digital Transformation
For years, organizations have steadily moved more and more of their operations to digital data and delivery. Such advances save time and effort, automate key processes, and drive greater efficiency and effectiveness. With digital transformation, customers or constituents can receive services faster and gain self-service options, and employees get more time to work on the most important projects.
“Digital transformation is no longer an option, but an imperative,” notes the Harvard Business Review. “Recent research from Accenture has found that in the three years prior to 2018, firms who led their industry in enterprise technology adoption grew two times faster than laggards. Today, they are growing five times faster. The risk is no longer merely getting left behind, but being eliminated altogether.”
For organizations leveraging digital data, apps and SaaS, IoT, or any of the multitude of other digital solutions, adding ZorroSign can be an important consideration.
To transact business, commerce, government, or individual trade in such a digital ecosystem also requires legally enforceable digital signatures to prove agreement and intent. Our multi-chain blockchain platform delivers such digital signatures and ensures the digital chain-of-custody necessary to successfully defend digital signatures in a court of law.
And by digitizing paper-based workflows, ZorroSign’s digital signature and document management platform can decrease costs, reduce errors, and increase productivity across digital operations . . . a massive benefit for any organization committed to digital transformation!
If You’re Focused on Sustainable Business
Digital operations also eliminate paper so “going green” with paperless operations may readily align to your IT organization’s corporate social responsibility goals or vision.
At ZorroSign, we help IT organizations deliver paperless operations. We all understand that switching from doing business using paper to digital records is not only a smart business decision, but it is also good for the environment. Each time you use ZorroSign to digitally transact agreements, contracts, and other documents—instead of printing, faxing, scanning, shipping documents overnight to collect signatures—you save trees and water, plus reduce carbon emissions.
Further, ZorroSign is dedicated to advancing sustainability while advancing new technologies, promoting a paperless life and leading sustainability programs that support environmental conservation. The company’s Save-a-Tree, Plant-a-Tree program, for example, plants a tree on behalf of customers every time they save 8,000 pages of copy paper. As one tree produces roughly 8,000 pages of copy paper, this amounts to a double incentive: Reducing the destruction of trees via reduced paper use, plus increasing the number of trees as a reward for reducing paper use.
For all these reasons and more, if you are using blockchain technologies—or planning to in 2023—consider ZorroSign as a strong complement to your technology stack! You can start with a free 14-day trial to see what we can deliver or contact us to learn more!
Last year, I shared how ZorroSign’s early roots in Dubai, UAE, helped us grow into an international company. I want to update that theme today and talk about ZorroSign’s role as a global company providing global solutions that improve data democratization, privacy, and security.
As CEO and co-founder of ZorroSign, I have dedicated my career to advancing technology while simultaneously advancing sustainability: Ensuring the new technologies we bring to market elevate information privacy, data security, and data democratization while not coming at the expense of future generations.
At ZorroSign, we saw very early a market need to push past web2 solutions for digital signatures and digital transactions—escaping centralized information architectures that consolidate data with a provider (and expose that data to the risks of single-point-of-failure cyber-attacks) while simultaneously pulling data ownership away from users (to be housed and monetized by the web2 provider). Alternatively, ZorroSign empowers our users by deploying web3 solutions that decentralize data and ensure users will always own their documents and transaction metadata—even after their subscriptions with us end.
Dubai Start, Dubai Strong
As a long-time resident of Dubai, I was greatly inspired by the Digital City Vision—Smart Dubai of H.H. Sheikh Mohammed bin Rashid Al Maktoum. ZorroSign’s technology very purposefully supports Dubai’s paperless initiatives for Digital Dubai and helps to advance Dubai’s leadership in digital operations, specifically focused on:
Security—providing superior digital privacy and security by leveraging a private, permissioned blockchain technology
Digital Signatures—a platform that is easy-to-use and legally compliant to global standards
Chain of Custody—delivering immutable records of every step of every digital transaction: Authenticating users, securing data, and verifying documents for legal enforceability
Advancing UAE’s 10 Principles for the Next 50 Years—specifically helping Dubai to build the best and most dynamic economy in the world; defining new UAE development with digital, technical, and scientific excellence; and promoting a value system based on openness and tolerance
Initially, our company served government departments in UAE but soon grew into an international business—helping people to build, sign, store, and track mission-critical documents on the blockchain in Sri Lanka, India, and the United States.
Last year, ZorroSign was named Blockchain SaaS Innovator of the Year at the UAE Business Awards 2021, then at the turn of the year, Unlock News Desk showcased a story on UAE Based ZorroSign introducing six new features to our blockchain platform.
This spring, Tech Channel wrote a great article on ZorroSign making waves in digital signature space using blockchain technology, and TahawulTech.com interviewed me on how ZorroSign helps tackle identity theft on our now multi-chain blockchain platform.
I am incredibly proud of our continued success in my home town, and while ZorroSign expands our global presence, the UAE and other Gulf Cooperation Council countries will be a strategic market for us.
Success in South Asia
From the start, ZorroSign has had close ties with the south Asia countries of India and Sri Lanka. While operations started in Dubai, our development center of excellence has always been in Colombo!
Our blockchain architecture was conceived, coded, and cultivated entirely in Sri Lanka with a vision to provide global customers with the ability to securely transform paper-based workflows to digital operations. I could not be prouder of our Sri Lanka team, and though they are struggling through that beautiful country’s difficult political and economic crisis, they have proven again and again the resilience and tenacity of their engineering genius.
Recently, APAC Business Headlines recognized the ZorroSign team as the “Most Innovative Blockchain Company from Sri Lanka” for 2022! The award validates the hard work of our center of excellence team, and further proves blockchain’s prominence on the global stage.
This recognition followed our 2021 success where the International Business Awards® named ZorroSign a Gold Stevie® Award Winner for Blockchain Solutions. The Stevie’s are the world’s premier business awards program, where in 2021 more than 3,700 nominations from organizations across 63 nations and territories—of all sizes and in virtually every industry—were submitted for recognition. We were delighted to be awarded a gold Stevie for our blockchain solution and to be recognized as a Company of the Year, and Most Innovative Tech Company of the Year. Most flattering, the judges were quick to note that ZorroSign is “one of the few companies that are able to use blockchain technology to solve a real business problem” . . . a strong endorsement of our digital signature technology, built on blockchain, and paired with identity-as-a-service (IDaaS) and patented fraud detection, to authenticate users and verify documents across digital transactions.
Tackling North American Markets
As a U.S. citizen who has lived in Canada, China, and the UAE at various times over the past forty years, my goal was always to return home and bring ZorroSign’s blockchain solutions to North American users.
In August 2020, we opened our global operations hub in Phoenix, Arizona—ushering in a new phase of business growth. We quickly established local partnerships with Arizona State University, Grand Canyon State University, the Arizona Commerce Authority, Arizona Technology Council, City of Phoenix, Global Chamber®, the Greater Phoenix Economic Council, and many other incredible organizations!
And we’ve engaged government agencies, financial services providers, IT businesses (and departments), legal services firms, real estate companies, and several other verticals to prove the value of a paperless life and the most private, secure, compliant digital transactions hosted on blockchain. Early adopters of our web3 solutions are excited to embrace ZorroSign’s robust platform to advance their digital operations and gain a competitive advantage in a market place still dominated by legacy, web2 technologies.
Global Privacy and Security Compliance
Our unique combination of blockchain architecture, web3 technologies, artificial intelligence/machine learning, and patented fraud prevention grants ZorroSign compliance across many international standards for privacy and security.
The list continues to grow as we expand our markets, but already includes:
Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA)
Canada’s Uniform Electronic Commerce Act (UECA)
The European Union’s Data Protection Regulation (GDPR) for data privacy and security
EU’s electronic IDentification, Authentication and trust Services (eIDAS) regulation
India’s Information Technology Act 2000 (IT Act of India)
International Standard on Assurance Engagements (ISAE) No. 3402, Type II audited
International Organization for Standardization (ISO) 27001 certified
PDF Advanced Electronic Signatures (PAdES) is a set of restrictions and extensions to PDF and ISO 32000-1
The UAE’s Federal Law No. 1 of 2006 regarding Electronic Transactions and E-Commerce granting electronic signatures legal force and effect
The American Institute of Certified Public Accountants (AICPA) SOC 2 Type I audit
USA’s California Consumer Privacy Act (CCPA)
USA’s Department of Commerce’s National Institute of Standards and Technology (NIST) encryption standards
USA’s Digital Millennium Copyright Act (DMCA)
USA’s Electronic Signatures in Global and National Commerce Act (E-Sign Act)
USA’s FDA Title 21 of the Code of Federal Regulations; Electronic Records; Electronic Signatures
USA’s Health Insurance Portability and Accountability Act (HIPAA)
USA’s Uniform Electronic Transactions Act (UETA)
I am proud of all ZorroSign has achieved for our international customers and incredibly excited about some big announcements later this summer! ZorroSign is truly a global company delivering global solutions, and we are not resting on our laurels—the best is yet to come.
Contact us to learn more . . . or start your free trial to put our digital signature software to the test!
Our CEO and co-founder, Shamsh Hadi, was recently interviewed by two technology news outlets—Tech Channel News and TahawulTech.com.
Tech Channel News helps C-level executives in India and Gulf identify technologies and strategies to empower and streamline business processes. Their portal at techchannel.news informs leaders of what’s new in tech and why it matters.
TahawulTech.com, published by CPI Media Group, is the definitive platform in the Middle East for IT content. Covering stories across enterprise technology, cybersecurity and the region’s IT channel industry, TahawulTech.com brings business leaders and technology decision makers together to share their stories of transformation.
Here are short summaries of those interviews and links to read the original pieces!
ZorroSign Making Waves in Digital Signature Space Using Blockchain Technology
In April 2022, Tech Channel News’ Naushad K. Cherrayil interviewed Mr. Hadi on how ZorroSign safeguards the privacy and security of digital documents, and provides an immutable chain of custody for digital transactions, for governments and organizations in the Gulf Co-operation Council (GCC) countries.
The article notes that there are “huge players in the digital signature space, but none of them have figured out how to cost-effectively map their legacy software in technologies and evolve it into Web 3.0 and blockchain solutions today.”
“We have solved all these problems,” said Hadi. “Successfully bringing blockchain to digital signatures—unlike other competitors, big and small, who simply tried to add blockchain onto their legacy software.”
The article explores ZorroSign’s roots in Dubai with development in Sri Lanka, moving the company’s global headquarters to Phoenix, and standing out from the crowd in a competitive eSignature space.
“Our platform was invented to move documentation, digital transactions from a relationship built on trust to a relationship built on truth, providing customers the ability to positively impact the environment with sustainable practices and securely transform their paper-based workloads to digital in a bid to remove errors and increase productivity,” Hadi added.
Tech Channel News uncovers how ZorroSign leverages blockchain’s zero-trust environment to support governments in the Gulf who are looking specifically for blockchain solutions, noting “two countries that are pushing forward are the UAE and Saudi Arabia.”
In May 2022, TahawulTech.com’s Anita Joseph interviewed Mr. Hadi on how ZorroSign not only provides digital signatures built on a blockchain architecture, but also integrates identity-as-a-service (IDaaS), biometrics, KBAs, and patented Z-Forensics token to prevent fraud and address identity theft risks.
Ms. Joseph also starts with ZorroSign’s founding in Dubai and how HH Sheikh Mohammed bin Rashid Al Maktoum’s Digital City Vision for Smart Dubai has been a guiding principle for ZorroSign—including his goal of a paperless life in the UAE by 2030.
The article then talks of identity theft and how ZorroSign technologies confront the issue: “Not only does our web3 platform leverage the cryptographic security capabilities of blockchain,” said Hadi. “But it also integrates Identity-as-a-Service technologies into our solution set to combat fraud, identity theft, and cyber-attacks.”
Security trends, cybercrime, and various cyber-attacks are discussed, as well as how distributed ledger technologies such as blockchain can help defend and/or recover from such attack vectors. The article ends with ZorroSign’s plans for 2022 and early verticals benefitting from blockchain-based digital signatures.
Learn more about how ZorroSign helps governments, companies, and individuals around the world with digital signatures and maintaining privacy and security with their digital transactions: Contact us today or start your Free Trial.
Since 2013, the security world recognizes the first Thursday of May as World Password Day—promoting better password habits such as changing passwords, moving to more complex passwords, and turning on multi-factor authentication (MFA) to improve digital security.
In advance of this year’s World Password Day, ZorroSign is proud to remind our users that ZorroSign’s platform not only accommodates complex passwords and MFA, but also supports “password-less” logins!
How?
First, ZorroSign leverages the biometric security of Apple and Android mobile devices to login to the device (and ZorroSign app) with hardware biometric capture features such as face, fingerprint, and iris scans. Such biometric login facilitates password-less user authentication at the device-level for subsequent ZorroSign digital signatures and document management.
Further, our multi-chain blockchain platform can validate multiple dimensions of authentication based on the transaction security needs:
What you know — your ZorroSign login password or knowledge-based authentication
What you have — your PC or mobile device
Who you are — biometrics such as finger prints, eye iris on the device securing who can access it
ZorroSign’s dynamic knowledge-based authentication (KBA) feature—provided by LexisNexis—requires the knowledge of private information of the individual to prove that the person providing their identity information is the actual person.
With ZorroSign’s user authentication options, it is almost impossible for an imposter to sign a document on the ZorroSign platform, ensuring:
Legal Enforceability — Using digital signatures with real digital information
Signature Attribution — Incorporating high-level security provisions and multifactor authentication (including biometrics) to ensure signatory attribution to a specific user
To learn more about our password-less login capabilities and how ZorroSign provides superior privacy and data security with our blockchain platform, contact us today or sign up for a Free 14-Day Trial to see for yourself!
Block it down! Now, you can count on regulatory compliance and the immutability of your signed documents within your stored data and workflow records on ZorroSign’s blockchain.
Z-Vault enables ZorroSign platform users to store, structure, organize and search documents in folders and subfolders natively, with the peace of mind that comes from superior privacy and security.
Digital Signatures on Blockchain
Since 2000, several technologies have come to market to deliver digital signatures, but when a distributed ledger technology—or DLT, such as blockchain—is used for digital signatures, signers gain the unique advantages of:
Privacy — with a private blockchain, only participants to the transaction can see details of the transaction, and those participants share equal access to such details
Immutability — all records and changes are tracked and cannot be changed, providing important chain-of-custody audit capabilities for courts
Security — all records are individually encrypted and distributed for better protection from phishing and ransomware attacks
ZorroSign was built from the ground up on Hyperledger Fabric to deliver digital signatures with the superior privacy and security of blockchain. And we recently announced a partnership with Provence Blockchain to add their DLT to our architecture as well, effectively becoming a multi-chain blockchain platform.
Z-Vault for Better Contract Lifecycle Management
Contract lifecycle management, or CLM, spans the entire process of generating contracts, the workflows of approving and negotiating changes to contracts, the signing (or executing) of the contracts, storing and archiving the executed contracts, plus tracking and audit trails to retrieve contracts and review their lifecycle of approvals, iterations, and signatures.
If contracts are critical to your business or organization, then a secure, reliable solution for managing the contract life cycle is imperative.
Key functionality to look for when assessing CLM solutions include visibility (a dashboard or overview of where individual contracts are in the life cycle), integration with communications and storage systems, automation (as few contracts start from scratch—most are iterations of previously created agreements), and of course change tracking to readily see how contracts changed during negotiations and what final version was executed by all parties.
ZorroSign’s platform unites and uniquely delivers:
Digital signatures via Z-Sign to quickly execute legally binding contracts
Patented Z-Forensics token to prevent fraud and tampering
Z-Flow workflow automation to quickly build templates and approval chains
Z-Verify to know exactly who signed what and when, with full validation of every document’s authenticity and immutability
Z-Vault to securely store contract and transaction records immutably on blockchain
ZorroSign’s platform can be accessed via PCs and mobile devices, allowing your legal department, operations and procurement teams, and sales teams to efficiently generate, negotiate, communicate, and sign agreements. And with our Z-Vault, contracts reside on an immutable DMS where they can be saved, searched for, and managed easily from a single, intuitive user interface.
Z-Vault Benefits
Superior privacy and security to PKI-based solutions using a centralized database
The latest privacy and security technologies, delivering powerful encryption safeguards
Ability to share and review eSign and architectural drawings, adding your own comments
Time savings with access to specific folders and documents in seconds, no loss of records
ZorroSign Privacy & Security Compliance
Our combination of security architecture and data privacy functionality ensure your compliance across many international standards for privacy and security, including:
Canada: The Personal Information Protection and Electronic Documents Act (PIPEDA)
Canada: The Uniform Electronic Commerce Act (UECA)
EU: Data Protection Regulation (GDPR) for data privacy and security
EU: The electronic IDentification, Authentication and trust Services (eIDAS) regulation
India: The Information Technology Act 2000 (IT Act of India)
International Standard on Assurance Engagements (ISAE) No. 3402, Type II audited
International Organization for Standardization (ISO) 27001 certified
PDF Advanced Electronic Signatures (PAdES) is a set of restrictions and extensions to PDF and ISO 32000-1
UAE: Federal Law No. 1 of 2006 regarding Electronic Transactions and E-Commerce granting electronic signatures legal force and effect
USA: American Institute of Certified Public Accountants (AICPA) SOC 2 Type I audit
USA: California Consumer Privacy Act (CCPA)
USA: Department of Commerce’s National Institute of Standards and Technology (NIST) encryption standards
USA: The Digital Millennium Copyright Act (DMCA)
USA: The Electronic Signatures in Global and National Commerce Act (E-Sign Act)
USA: FDA Title 21 of the Code of Federal Regulations; Electronic Records; Electronic Signatures
USA: The Health Insurance Portability and Accountability Act (HIPAA)
USA: The Uniform Electronic Transactions Act (UETA)
To learn more about Z-Vault and how ZorroSign can help you securely store contracts, data, and documents on blockchain, contact us today or start your 14-day Free Trial subscription!
The Move to Digital
Since the invention of microchips and semiconductor transistors in the 1950’s, the world has moved steadily to more and more digital information. Computers for government, then computers for business, then home computers brought vast amounts of data into digital formats, and with the birth of the World Wide Web digital information has exploded in volume.
Today, we rely on digital documents for our business operations, our finances, our government, our healthcare, our legal system, and vast amounts of news and information—both personal and public. Trusting such digital documents is critical to ascertaining truth and accurately conveying facts.
“Documents comprise evidence, and are generally assumed to amount to evidence upon which the parties and the court can rely,” explains Helen Brander for Counsel magazine. “For every point that is made, one hopes there is a document to support that point.”
The Risk of Fraud
Throughout history, there have been various techniques to authenticate documents. In the pre-industrial age, it was common in Europe for someone to sign a document in ink and to then press a wax seal on the document to indicate the authenticity of that document. It was always possible, of course, that someone could tamper with the document and forge signatures, information, or the wax seal itself.
In the modern age, the United States has notary publics who can witness a person signing a document and endeavor to authenticate the signer’s identity by inspecting a driver’s license, passport, or other form of identification for that person. Again, the risk remains that it is possible to forge such identity materials, or alter the actual documents or signatures after signing.
More recently, with the popularity of electronic or digital documents, the digitization of business processes is taking place. In other words, from the creation of documents, to the signing of documents, to the storage and subsequent retrieval of documents, one or more steps may be conducted digitally.
For example, a document may be created on a computer and subsequently printed, signed with wet ink or electronically, then faxed, delivered via courier, or scanned into the computer and finally shared electronically via email or by using other file transfer mechanisms. Despite the technology advances, such documents can still be tampered with and signatures can be forged within this process as well.
“Detecting fraud within documents that have been digitally altered with graphics editors or ‘print-manipulate-scan’ evasion techniques requires more sophistication,” notes Martin Rehak in a Help Net Security article. “Often undetectable to human fraud specialists, building an automated solution requires specialist knowledge of the metadata and digital footprints left by scanning and printing devices.”
As such, modern digital documents require a level of security as evolved and nuanced as the technologies producing, storing, and sharing the digital documents themselves.
The Security of ZorroSign
Facing this historical need, ZorroSign has developed a unique digital solution that can:
Prove that the individual who is performing the action to sign the document is who they claim to be (verification);
Apply a digital equivalent of a wet-ink signature to the document (legal intent); and,
Prove the authenticity of the printed copy or digital version of an electronically signed document, its content, attachments, and the signatures on it (authenticity).
ZorroSign’s patented Z-Forensics token is a tamper and fraud-detection seal for your digital documents, creating an unprecedented, immutable audit trail and complete chain-of-custody validation.
This revolutionary security system allows a validated user to create an electronic document, then allow one or more other users to complete and sign that document in a particular sequence—”the workflow”—all the while capturing the chain of custody and an audit trail of the changes made to the document by the parties in the workflow, such as recording key authentication, security and validation information when an action took place.
Unlike any other digital signature solution, ZorroSign seals all documents with our Z-Forensics token—capturing the complete audit trail and accompanying attachments and signature workflow. The token is encrypted and contains all the details about the transaction: Time stamps, user authentication, documents and attachments.
Only the Z-Forensics token:
Allows ZorroSign customers to manage permissions as to who gets to see what level of information about the transaction and the contract
Stores the ZorroSign security encryption certificates, which—unlike other digital security certificates—never expire
Can verify, validate and authenticate both digital and printed (paper) version of electronically signed contracts
Our Z-Forensics feature enables ZorroSign users to create a virtual seal for every uploaded document: initiating a verifiable trail, tracking every step of a document’s journey through users, so that any attempts at tampering, fraud, revision or other alterations are immediately captured.
To learn more about Z-Forensics and how ZorroSign can help you prevent fraud with digital documents, contact us today!
Banks, credit unions, investment groups, lenders, and other financial service providers use ZorroSign’s digital platform to lower operating costs while protecting privacy and data security. Only ZorroSign pairs digital signatures with blockchain technology—delivering 21st century security to the age-old ceremony of signing agreements.
FINANCIAL SERVICES INDUSTRY NEEDS
Anyone managing technology for a financial services provider feels the stress of managing data, networks, and endpoint devices in a world where cyber attacks, regulatory compliance, and customer needs are changing quickly.
To ensure their financial organizations are secure, compliant, and delivering easy to use customer-facing solutions, IT departments need the latest technologies but also proven solutions. ZorroSign is proud to protect financial services data—for customers, for regulators, and for the institutions themselves.
TRANSFORM YOUR FINANCIAL SERVICES WITH SUPERIOR SECURITY
Whether you’re a financial advisor or lender, a bank, credit union, or other services provider, you need fully compliant, automated, blockchain-level security and digital transactions you can trust. ZorroSign delivers:
Unbeatable user authentication, validation and privacy, with superior data and document security
A secure, paperless digital signature solution that’s easy to use, so you can “sign it and forget it”
Workflow automation that saves times and eliminates paper—streamlining approvals, signatures, and workflows
Error-free forms filled out and processed faster via artificial intelligence and machine learning
Financial institutions need privacy and security, but also need to know their technology solutions meet regulatory compliance. ZorroSign’s platform is compliant with the Digital Millennium Copyright Act, UETA, the ESIGN Act, GDPR, plus ISAE 3402 Type II certified, SOC II Type 1 certified, and ISO 27001 certified while supporting HIPAA, ADA, WCAG 2.1, CCPA, New York SHIELD Act, and other standards varying country by country.
For banks, credit unions, and other financial service providers that desire to securely transform paper-based workflows, ZorroSign’s digital signature and document management platform can decrease costs, reduce errors, and increase productivity.
As a private blockchain, ZorroSign can ensure privacy is always maintained as only approved nodes (endpoint users) can write to ZorroSign’s blockchain. As a result, ZorroSign’s architecture has even tighter privacy and security measures than other blockchains.
ADD IDENTITY-AS-A-SERVICES (IDAAS) TO KNOW-YOUR-CUSTOMERS (KYC)
Beyond digital signatures, ZorroSign delivers identity-as-a-service (IDaaS) to verify financial services users and support know-your-customer (KYC) requirements:
ZorroSign technology leverages the biometric capabilities of hardware endpoints to verify user identities
ZorroSign is the first to adopt password-less login amongst our digital signature competitors
ZorroSign MFA provides maximum security, as before a user can sign a document, our platform can validate multiple dimensions of authentication based on the transaction security needs: What you know (i.e., your ZorroSign login password), what you have (e.g., your laptop or mobile device), who you are (e.g., biometrics such as fingerprints or eye iris on the device securing who can access it), etc.
Additionally, ZorroSign users can optionally use our dynamic knowledge-based authentication (KBA) feature provided by LexisNexis. KBA requires the knowledge of private information of the individual to prove that the person providing identity information is the actual person.
Moving forward, ZorroSign will be adding further user verification capabilities, including integrations with U.S. driver licenses via state motor vehicle departments, verification via passports (with approximately 72 countries to start), other government-issued identities (with approximately 100 countries to start), and even tapping U.S. credit union databases for identity verifications.
Further, we will be implementing a blockchain-based audit trail for all user activities—including profile updates, signature changes, etc.—and will maintain a separate blockchain to maintain users’ signatures. With these immutable blockchain records, we can uniquely validate users in ways no competitive solution can.
We invite you to request a copy of our ZorroSign Security Brief to learn how our private blockchain architecture, document storage and protection, and platform security measures can support your financial service clients today!