Technology
Zoho Unveils Zia LLM, Expands AI Suite With Agents, Studio Tools
By Modupe Gbadeyanka
A global technology company, Zoho, has introduced its proprietary large language model known as Zia LLM, trained specifically for business use cases, keeping privacy and governance at its core, which has resulted in lowering the inference cost, passing on that value to the customers, while also ensuring that they are able to utilise AI productively and efficiently.
In a statement, the company also announced the launched of a no-code agent builder, Zia Agent Studio, over 25 deployable Zia agents, and a Model Context Protocol (MCP) server to open up its vast library of actions to third-party agents.
The Country Head for Zoho Nigeria, Mr Kehinde Ogundare, noted that these products demonstrate the organisation’s longstanding aim to build foundational technology focused on protection of customer data, breadth and depth of capabilities because of the business context, and value.
Zia LLM leveraged NVIDIA’s AI accelerated computing platform. It comprises three models with 1.3 billion, 2.6 billion and 7 billion parameters, each separately trained and optimised for contextual applicability that benchmark competitively against comparable open source models in the market.
The three models allow Zoho to always optimise the right model for the right user context, striking the balance between power and resource management. In the short term, Zoho will scale Zia LLM’s model sizes, starting with the first set of parameter increases by the end of 2025.
While Zoho supports many LLM integrations for users, including ChatGPT, Llama, and DeepSeek, Zia LLM continues its commitment to data privacy by allowing customers to keep their data on its servers, leveraging the latest AI capabilities without sending their data to AI cloud providers.
As for the Zia Agent Studio, Zoho has simplified it to be fully prompt-based (with the option to use low-code) and includes ready-made access to over 700 actions across its products.
Agents built by users can be deployed autonomously, triggered by button click, with rule-based automation, or even summoned within customer conversations.
To enable immediate adoption of agentic technology, Zoho has developed a roster of AI agents contextually baked right into its products. These agents can be used across various business activities, handling relevant actions based on the role of the user. These include Customer Service Agent for Zoho Desk that can process incoming customer requests, understand the context, and either answer directly or triage them to a human rep, providing an efficient first line of assistance.
At the time of deployment, an agent can be provisioned as a digital employee, maintaining the user access permission structure defined within the organisation. Admins can perform behavioural audits as well as performance and impact analyses on digital employees, ensuring that every agent is working as effectively as possible and within clear guardrails.
These agents are available in Agent Marketplace from where customers can easily deploy them. Ecosystem partners, ISVs, and individual developers will be able to create agents and host them on the Zia Agents Marketplace in coming months.
The company plans to add more skills to Ask Zia, allowing it to act as an assistant to Finance teams, Customer Support teams to start with. Support for the Agent2Agent (A2A) protocol will be implemented, allowing Zia Agents to interact and collaborate with each other, as well as collaborate with agents on other platforms.
Technology
Identy.io Announces Strategic Expansion into Nigeria, Kenya
By Adedapo Adesanya
A global biometric authentication technology company specialising in secure, mobile-first identity verification, Identy.io, has announced its expansion plans into Africa with a pilot focus on Nigeria and Kenya.
The firm disclosed in a statement that it has appointed a regional leadership team to engage with key stakeholders across the government, financial services, telecommunications, and other regulated sectors in both countries.
These include Mr Olajide Olasiyan-Ola as Regional Head for West Africa, Mr Edwin Mutisya as the Senior Sales Manager, and Mr Matus Kapusta as the Product Director for Identy.io’s Automated Biometric Identification System (ABIS) product portfolios.
Amid the need for effective identity solutions becoming increasingly urgent, countries like Kenya and Nigeria are making significant investments in public digital infrastructure by integrating identity systems with public services, financial access, and mobile connectivity as part of their broader economic development agendas. This is helping to implement national digital identity systems to improve service delivery, promote financial inclusion, and develop digital public infrastructure.
The World Bank’s ID4D data indicates that approximately 80 per cent of adults in Sub-Saharan Africa possess basic identification. However, there are significant disparities between countries, with many having coverage below 70 per cent. These gaps hinder access to essential services and economic opportunities.
With Identy.io coming into the fold, its regional leadership team will collaborate with clients across the public and private sectors to support responsible, scalable identity implementations aligned with national digital transformation priorities.
After Nigeria and Kenya, the firm plans to expand into additional African markets as part of a phased regional growth strategy.
According to Mr Antony Vendhan, Co-founder of Identy.io, “We are transforming the traditional industry model, which often relies on expensive and inflexible digital infrastructure. Instead, Identy.io adopts a software-first approach, minimising reliance on specialised biometric hardware. Our technology supports biometric capture using standard smartphones, processes identity documents, issues digital identities to individuals lacking formal identification, and facilitates large-scale biometric verification and deduplication.”0
“This innovative yet simplified approach allows our clients to reach underserved communities by providing individuals with multimodal access to secure their digital identities and explore new economic opportunities,” he stated.
As part of Identy.io’s industry validation strategy, the company’s ABIS system has completed MOSIP’s partner compliance process and is listed on the MOSIP Marketplace. This platform offers compliant technologies that governments and ecosystem partners can evaluate for MOSIP-aligned deployments. MOSIP helps governments conceive, develop, implement, and own foundational digital ID systems tailored to their unique needs.
Technology
ZeroDrift Receives $2m in Pre-Seed Capital for AI-driven Tools
By Dipo Olowookere
A $2 million pre-seed round to automate compliance in real time, unlocking business velocity while giving compliance teams infrastructure to scale oversight has been received by ZeroDrift.
The fresh capital was pumped into the firm by a16z speedrun. It is to support the company’s go-to-market launch, product expansion across communication channels, and continued development of its AI-driven compliance engine.
The organisation plans to deepen its coverage across financial services before expanding its rule-based compliance engine into other regulated sectors, including insurance, healthcare, ESG disclosures, and AI governance.
The long-term vision is to become the universal trust layer for any system that communicates, ensuring that as AI and automation scale, trust, safety, and compliance scale with them.
ZeroDrift is an AI-native communication firewall that validates and fixes content before it is sent, giving compliance teams control at scale and business teams the speed to execute.
The platform encodes SEC, FINRA, and firm-specific policies into machine-readable rulepacks, then enforces them at the point of creation.
ZeroDrift integrates directly into tools teams already use, including email, browsers, CRMs, websites, social platforms, and AI systems.
Content is checked instantly, issues are flagged with suggested fixes, and compliant messages move forward without delay. Compliance teams retain full visibility through centralised dashboards, audit trails, and exam-ready evidence generated automatically.
ZeroDrift is launching initially in financial services, serving registered investment advisors, asset managers, broker-dealers, and wealth platforms.
The market includes more than 15,000 RIAs, 3,500 asset managers, and hundreds of thousands of registered representatives in the United States alone.
Early use cases include faster campaign launches, higher sales velocity, safe deployment of client-facing AI, and instant exam readiness without last-minute scrambles.
“People do not want to be non-compliant. They have no way to know if what they are writing is acceptable until it is too late.
“Compliance should be a guardrail that lets teams move faster, not a gate that slows everything down. Our goal is to make compliance happen automatically at the speed of work,” the chief executive of ZeroDrift, Kumesh Aroomoogan, said.
A representative of a16z speedrun, Troy Kirwin, said, “Compliance has quietly become a limiting factor for how fast regulated companies can operate. ZeroDrift flips that dynamic by preventing violations before they happen and making compliance a built-in part of everyday workflows.”
Technology
Region-Aware Login Systems Adapting Security Rules to Local Regulations
The online world often feels borderless, but geography has never mattered more for security. As data laws like GDPR and CCPA evolve, the “one-size-fits-all” login is becoming obsolete. Sophisticated platforms now use region-aware systems—intelligent gateways that detect a user’s location and recalibrate security protocols to meet local legal requirements. By treating location as a primary credential, these systems move away from the “Wild West” era, allowing companies to respect digital sovereignty while maintaining a high-performance experience.
Moving Beyond the Universal Digital Identity
In the early days of the internet, security was largely a choice made by the platform provider. If a company wanted to require a long password, they did; if they didn’t, a simple four-digit PIN might suffice. However, we have entered an era of “Regulatory Fragmentation.” Governments now take an active role in defining what “adequate security” looks like, and these definitions change as soon as you cross a digital border. A platform that ignores these regional nuances risks more than just a poor user experience; it risks massive fines and the potential loss of its operating license.
The concept of a “universal” login is being replaced by “contextual authentication.” This means the system asks: “Who are you, and where are you?” before it even presents the password field. By understanding the context of the login attempt, the system can dynamically adjust. For example, a user logging in from a jurisdiction with strict data-export laws might be blocked from accessing sensitive information unless they pass an additional biometric check, whereas a user in a less regulated area might enjoy a faster entry process.
Strategic Compliance in High-Regulated Environments
High-compliance industries like finance and gaming require 100% certainty regarding a user’s location. In these sectors, regional adaptation is a foundational requirement for doing business legally.
For example, online casinos, like https://nv.casino/en, demonstrate why these adaptations are essential for a safe experience. Because state and national gaming laws vary significantly, a region-aware login ensures that the software instantly recognizes a player’s jurisdiction and applies relevant safeguards. In some regions, this means enforcing strict two-factor authentication (2FA); in others, it involves real-time identity verification against local databases. This localized approach protects user data and ensures providers remain compliant with diverse gaming commissions without creating a restrictive experience for the player.
The Multi-Layered Tech Stack Behind Global Gateways
Modern systems verify location by analyzing multiple “signals” within milliseconds. To ensure speed and accuracy, several core technologies work in tandem behind the scenes:
- IP intelligence: Databases map IP addresses to physical locations while filtering out known proxy servers and fraudulent VPNs.
- Latency analysis: By measuring the time data takes to travel, systems can detect if a user is “spoofing” their location from across the globe.
- Edge computing: Processing logic at local server nodes ensures that regional rules are applied instantly without slowing down the page.
- Device fingerprinting: Identifying hardware and software settings helps verify if a device matches the typical profile for its reported region.
Solving the Friction Problem with Adaptive Security
The “Holy Grail” of login security is “Adaptive Friction.” The idea is to make entry easier for “known” or low-risk attempts while automatically “dialing up” security for high-risk regions or strict regulatory territories.
This prevents forcing users in low-regulation areas through unnecessary verification steps. By tailoring security to the location, platforms offer the smoothest possible entry point while maintaining a competitive edge. This localized efficiency has become a major selling point for global apps, reducing user frustration caused by irrelevant security hurdles.
Key Steps for Building a Future-Proof Login Framework
Implementing a region-aware system requires balancing legal mandates with technical integration. The following steps provide a roadmap for moving toward a more adaptive security model:
- Map global regulations: Identify user locations and the specific privacy mandates for each territory.
- Define security templates: Create distinct “profiles”—such as “Strict European” vs. “Standard North American”—that the system can swap between instantly.
- Establish fallback protocols: Ensure the system defaults to the most secure option if a location cannot be verified with absolute certainty.
- Perform regular audits: Because digital laws shift frequently, regular reviews of the underlying rulebook are essential to remain compliant.
The Cultural and Legal Shift Toward Digital Sovereignty
The concept of “Digital Sovereignty”—subjecting data to the laws of its physical location—will define the next decade of internet growth. Region-aware login systems are the first line of defense in this organized digital society.
Ultimately, these systems build trust by respecting the laws of a user’s home country. Security is no longer just about keeping hackers out; it is about ensuring that digital entry is as respectful and legal as navigating the physical world. By embracing geographic intelligence, platforms build smarter gates that welcome every user appropriately, no matter where they stand.
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism10 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking8 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn











