Our Focus - G2C
Citizen service is undergoing rapid and systemic change. UNIFY is focused on assisting governments to adopt the latest technologies to improve the speed, quality and accuracy of the services they deliver, at the same time as benefiting from lower cost models in adopting emerging technologies. Citizens, especially younger generations, expect automated services and to have the same experience engaging with government bodies as they would with their bank or an online shopping site. As technology advances, customer expectations keep changing, and it is critical that their governments keep pace.
The User Experience
We understand that government service users want their information and service to be secure and reliable. They also want it 24/7. They want processes to be easy to understand and to use. This means that the services must be designed for people with a myriad of needs. And primarily they are looking for speed of this reliable service.
UNIFY is building solutions and demonstrating benefits of the user experience offered by Azure AD B2C and complementary technologies for government agencies across the Indo-Pacific region, including Sri Lanka, New Zealand and several Australian State governments.
We also specialise in the security challenges posed by automation of government services – for example, Identity-proofing digital government services. Identity proofing establishes that the person trying to access is actually who they claim to be. Digital authentication is the process of determining the validity of one or more authenticators used to claim a digital identity. Successful authentication provides reasonable risk-based assurances that the person who is accessing the service today is the same as that who accessed the service yesterday. Digital identity presents a technical challenge because this process often involves the proofing of individuals over an open network, and typically involves the authentication of individual subjects over an open network to access digital government services. There are multiple opportunities for impersonation and other attacks to fraudulently claim another subject’s digital identity.