IT Brief Asia logo
Technology news for Asia's largest enterprises
Partner content
Story image

Hyland wields blockchain power for credential verification

By Sara Barker
Wed 3 Jun 2020
FYI, this story is more than a year old

The blockchain, most well-known as being a decentralised way to distribute cryptocurrencies, has much more to offer beyond eCommerce – credential verification is just one of its many applications. 

Blockchain offers a new public infrastructure for verifying credentials in a manner far more durable, secure, and convenient than relying upon a single authority. 

Through properties of redundancy and immutability, blockchain enables anyone to own their digital assets (including credentials) for life. Anyone can verify those assets instantly, without any special software.

Content services platform provider Hyland is one company that has taken the core concept of blockchain as a secure, distributed ledger and turned it into a way to verify credentials.

Earlier this year Hyland acquired a blockchain credential firm called Learning Machine. This acquisition provided unique capabilities in the application of credentials management through blockchain. Two months later, Hyland launched Hyland Credentials. 

Hyland’s APAC director of sales Eugene Chng explains, “Hyland Credentials is a complete system to issue official records using a blockchain-anchored format that is instantly verifiable anywhere in the world.”

“It is built on the Blockcerts open standard for blockchain credentials, developed at MIT. Blockchain is scalable, interoperable, verifiable, and doesn’t depend on a single-authority tool to verify. Very few technologies will give you that capability to untangle.”

“Hyland Credentials Issuing System allows any organisation to easily design their records, import recipient data, issue records, and manage the entire credentialing life cycle using a blockchain format that is instantly verifiable anywhere in the world.”

Hyland Credentials provides an open standards-based solution for verifiable digital records that are:

  • Independently verifiable: Decentralised ownership and verification 
  • Tamper evident: Highly secure 
  • Owned by issuers and recipients
  • Standards-compliant: Leverages Blockcerts, the international standard for blockchain credentials 
  • Multi-Chain: Allows anchoring to Bitcoin, Ethereum, Hyperledger, and many other blockchains 
  • Scale: Built to meet the needs of governments, corporations, and educational institutions. 
  • Easy to deploy

The company recently launched Hyland Credentials for Education. Digital transformation within education institutions is driving a need for issuing verifiable digital records, such as degrees, diplomas, and certificates. This is where the benefits of blockchain verification shine through.

“Public and private institutions are also required to mitigate risk by issuing and verifying qualifications and identity documents with the highest level of security. In addition, citizens and students are more mobile than ever before," says Chng.

“They need records that are easily portable and not limited to use within one vendor’s platform. Using open standards achieves this portability and interoperability. With Blockcerts, citizens, graduates, schools, governments, and employers can now easily transfer and instantly verify any qualification or identity document—even internationally and at scale.”

“For example, if I go to university, the issuer is the university, but I own the digital certificate. I can share it with people, and that certificate is tamper-resistant and quickly verifiable. If I graduated and an employer wanted to verify who I am, or that I graduated from a particular university, Hyland Credentials for Education offers that ability.”

Hyland Credentials has more to offer, particularly for government organisations.  Chng says that government-issued-records will become increasingly reliant on credentials that are digital and verifiable.

Benefits of Hyland Credentials:

  • Provide ownership, empowering recipients with records they own and can have verified anywhere.
  • Improve efficiency: Blockchain-anchored records don’t require middlemen to send or verify. 
  • Increase security: Know that records are secure, tamper-proof, and vendor-independent. 
  • Promote awareness: Draw attention to your programs and your brand with records that can be shared online. 
  • Prevent fraud: Make it hard to impersonate records from your organization with cryptographic signatures. 
  • Gain insight: Build reports to better understand your credentialing trends.

With the world emerging from the global COVID-19 pandemic, Chng says there are plenty of other potential use cases around – health passports being one. Could governments create a system that verifies information as peoples travel country to country? It is possible – as right now, blockchain applications are very much in a collaboration environment.

“We feel that people are still trying to understand the technology, but they’re not sure how to do it. We’re open for collaboration with people and we want to help them bring their ideas to market faster. We want to encourage a wider blockchain adoption rate across government, and we will support and enhance these systems as new standards emerge.”

Hyland will be hosting a webinar that explores the applications of blockchain-based credentialing.

Participants will learn how to leverage an off-the-shelf, affordable, and standards-based blockchain credential issuing solution that can help to secure digital certificates and to make them verifiable from anywhere.

The webinar will open the door for interested organisations who want to know more about what Hyland can do to help them with this technology.

Hyland is also committed to helping governments and Institutions who are rolling out credentialing systems improve their deployments and protect their investments in this area as this technology continues to be improved and adopted globally. 

To register for the webinar, click here.

Related stories
Top stories
Story image
Cybersecurity
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Multi Cloud
Cloud is a tool, not a destination
For many years, “cloud” has been thought of as a destination which has led to a misguided strategy that sees an enterprise trying to shift all its applications to a single cloud provider – regardless of the specific needs and nuances of each individual workload.
Story image
Infrastructure
Oracle Cloud Infrastructure expands distributed cloud services
“Distributed cloud is the next evolution of cloud computing, and provides customers with more flexibility and control in how they deploy cloud resources."
Story image
Hybrid Cloud
HPE GreenLake advances hybrid cloud experience with new services
"The innovations unveiled today further build on our vision to provide the market with an unmatched platform to spur innovation and drive transformation.”
Story image
Voice recognition
Renesas and Cyberon expand services with voice recognition
“We are honoured to collaborate with Renesas to simplify the development of embedded voice recognition functions."
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
Research
New study reveals 51% of employees using unauthorised apps
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
Story image
Compliance
SentinelOne integrates with Torq to empower security teams
"With Torq, security teams can extend the power of SentinelOne to systems across the organisation to benefit from a proactive security posture.”
Story image
Microsoft
ASI Solutions named finalist of Microsoft Surface Partner of the Year
"ASI Solutions has a strong Microsoft focus, building value by helping customers maximise investment in modern workplace solutions."
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
API
Industry-first comprehensive risk-based API security enhances protection
Application Programming Interfaces (APIs) have become a crucial part of operating web and mobile application businesses and are causing significant economic growth in the digital sector.
Story image
Cybersecurity
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
Microsoft
SAS wins Microsoft ISV 2022 Partner of the Year award
"We formed the SAS and Microsoft strategic partnership with a shared goal of making it easier for customers to drive better decisions in the cloud."
Story image
Mergers and Acquisitions
SAS acquires Kamakura to propel risk technology innovation
Underscoring SAS growth in the domain-specific solutions space, the acquisition will enable SAS to greatly enhance the breadth of its risk solutions portfolio. 
Story image
Robotic Process Automation / RPA
Salesforce announces latest generation of MuleSoft
Salesforce has introduced the next generation of MuleSoft, a unified solution for automation, integration and APIs to automate any workflow.
Story image
Compliance
Stock security features inadequate in face of rising risk
"Organisations must proactively find ways of identifying unseen vulnerabilities and should take a diligent, holistic approach to cybersecurity."
Story image
Cybersecurity
Vulnerable APIs costing businesses billions every year
Large companies are particularly vulnerable to the security risks associated with exposed or unprotected APIs as they accelerate digital transformation.  
Story image
Data ownership
Brands must reclaim trust by empowering data ownership
According to Twilio's new State of Personalisation Report 2022, 62% of consumers expect personalisation from brands, and yet only 40% trust brands to use their data responsibly and keep it safe.
Story image
eCommerce
Robust digital warehouse management crucial in Asia-Pacific
Thanks to a network of “cloud” stores, grocery and food delivery providers such as Foodpanda can arrange for these commonly requested items to get packed up and sent over in almost no time.
Story image
Motorola Solutions
Motorola Solutions deploys communication system to 5th Japanese airport
Motorola Solutions with its partner, Nippon Airport Radio Services deployed the mission critical communication system to Kansai.
Story image
Cloud Security
Palo Alto Networks bolsters cloud native security offerings
Latest Prisma Cloud platform updates help organisations continuously monitor and secure web applications with maximum flexibility.
Story image
Cybersecurity
Zero trust security adoption rises 27% in just two years
A survey of WAN managers has revealed that multi-factor authentication and single sign-on are the top zero trust features implemented.
Story image
Infrastructure
New VMware offerings improve cloud infrastructure management
VMware has unveiled VMware vSphere+ and VMware vSAN+ to help organisations bring benefits of the cloud to existing on-prem infrastructure.
Story image
Digital Transformation
What CISOs think about cyber security, visibility and cloud
Seeking to uncover the minds of CISOs and CIOs across Asia Pacific, my company recently asked Frost & Sullivan to take a snapshot of cloud adoption behaviour in the region.
Story image
Cybersecurity
Email threats spike 101%, remains a top attack vector
"Each year we see innovation in the threat landscape, but each year email remains a major threat to organisations."
Story image
Aspire
NEC expands Open RAN ecosystem with Aspire Tech acquisition
With its agreement to acquire Aspire Technology, NEC Corporation has further increased its capacity to deliver End-to-End Open RAN ecosystems.
Story image
Oracle Cloud
Commvault, Oracle to deliver Metallic Data Management as a Service
"We are excited to partner with Commvault and enable our customers to restore and recover their most mission-critical cloud data."
Story image
Digital
Ivanti puts spotlight on power of employee digital experiences
The report revealed that 49% of employees are frustrated by the tech and tools their organisation provides and 64% believe this impacts morale.
SonicWall
Find out how you and your business can prevent being caught out by everything from ransomware to cryptojacking.
Link image
Story image
BitTitan
How to achieve your monthly recurring revenue goals
Monthly recurring revenue (MRR) is the ultimate goal, the most important issue on which anyone in the IT channel should focus.
Story image
Cybersecurity
Video: 10 Minute IT Jams - An update from CrowdStrike
Scott Jarkoff joins us today to discuss current trends in the cyber threat landscape, and the reporting work CrowdStrike is doing to prevent further cyber harm.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
Cloudian
Cloudian, Vertica to deliver on-premise data warehouse platform
"We’re enabling our customers to capitalise on a leading object storage platform and maximise the value of their digital assets.”
Story image
Airwallex
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
Story image
Infosys
Preparing for the digital decade with the right workforce strategies
For a decade that started under the pall of the pandemic, the 2020s is poised to end with a bang with the digital economy swelling to a high across the world.
Story image
Artificial Intelligence
Juniper study reveals top AI trends in APAC region
Juniper's research shows an increase in enterprise artificial intelligence adoption over the last 12 months is yielding tangible benefits to organisations.
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
Hybrid Cloud
Advent One acquires Layer 8 Networks, complements hybrid cloud offering
The acquisition comes at a time of surging demand in hybrid cloud, network virtualisation and network security.
Story image
Robotics
Evonik relies on Getac F110 tablet to control autonomous robot
The aim of the project is to evaluate the practicality of an automated robotic maintenance and inspection solution in the chemical industry.
Story image
Cybersecurity
Zscaler launches co-located data centres in Canberra and Auckland
The investment will offer public and private sector enterprises greater resilience in support of their zero trust cybersecurity posture.
Story image
MarTech
Martech experts reveal the “buzz” on personalisation
In the digital age, innovative technology must be leveraged to power an efficient and effective relationship marketing strategy.
Story image
Hybrid workforce
Why hybrid working is here to stay and how to ace it
Citrix's new report reveals hybrid workers are more productive and engaged at work than their office and completely remote counterparts.