SlideShare a Scribd company logo
1 of 65
Download to read offline
Identity Beyond Employees:
How Customer Experience
Impacts Your IAM Practices
Eve Maler, Principal Analyst
May 28, 2014
Customer experience
is not monolithic
© 2014 Forrester Research, Inc. Reproduction Prohibited 3
Users are escaping captivity
Benefit
in
sharing
credentials
Degree of
freedom to
walk away from
relationship
Baseline
Greater
benefit
Large
benefit
None (captive) Some at cost A lot
© 2014 Forrester Research, Inc. Reproduction Prohibited 4
Users are escaping captivity
Benefit
in
sharing
credentials
Degree of
freedom to
walk away from
relationship
Baseline
Greater
benefit
Large
benefit
None (captive) Some at cost A lot
Regular
employee
Contractor
Privileged
employee
Employee
of partner
© 2014 Forrester Research, Inc. Reproduction Prohibited 5
Users are escaping captivity
Benefit
in
sharing
credentials
Degree of
freedom to
walk away from
relationship
Baseline
Greater
benefit
Large
benefit
None (captive) Some at cost A lot
Regular
employee
Contractor
Nonpaying
affiliate
Paying
affiliate
Privileged
employee
Employee
of partner
© 2014 Forrester Research, Inc. Reproduction Prohibited 6
Users are escaping captivity
Benefit
in
sharing
credentials
Degree of
freedom to
walk away from
relationship
Baseline
Greater
benefit
Large
benefit
None (captive) Some at cost A lot
Regular
employee
Contractor
Nonpaying
affiliate
Paying
affiliate
Bank
customer
Privileged
employee
Payout
beneficiary
Employee
of partner
© 2014 Forrester Research, Inc. Reproduction Prohibited 7
Users are escaping captivity
Benefit
in
sharing
credentials
Degree of
freedom to
walk away from
relationship
Baseline
Greater
benefit
Large
benefit
None (captive) Some at cost A lot
Regular
employee
Contractor
Nonpaying
affiliate
Paying
affiliate
Bank
customer
Privileged
employee
Social
network
user
Retail
customer
Payout
beneficiary
Employee
of partner
© 2014 Forrester Research, Inc. Reproduction Prohibited 8
Users are escaping captivity
Benefit
in
sharing
credentials
Degree of
freedom to
walk away from
relationship
Baseline
Greater
benefit
Large
benefit
None (captive) Some at cost A lot
Regular
employee
Contractor
Nonpaying
affiliate
Paying
affiliate
Bank
customer
Privileged
employee
Social
network
user
Retail
customer
Service-
paying
customer
Payout
beneficiary
Employee
of partner
© 2014 Forrester Research, Inc. Reproduction Prohibited 9
But the Internet has become a bad
neighborhood
© 2014 Forrester Research, Inc. Reproduction Prohibited 10
We see the disproportionate targeting of
credentials in the data
Source: December 30, 2013, “Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1
Of 2” Forrester report
© 2014 Forrester Research, Inc. Reproduction Prohibited 11
What do customers experience when
security goes bad?
› A few: major
consequences such as
identity theft
© 2014 Forrester Research, Inc. Reproduction Prohibited 12
What do customers experience when
security goes bad?
› A few: major
consequences such as
identity theft
› Many: loss of trust in the
brand
© 2014 Forrester Research, Inc. Reproduction Prohibited 13
What do customers experience when
security goes bad?
› A few: major
consequences such as
identity theft
› Many: loss of trust in the
brand
› Everyone: an involuntary
password reset flow
© 2014 Forrester Research, Inc. Reproduction Prohibited 14
What do customers experience on a
good day?
› Onerous account
registration forms
› Those @%@#$ password
policies…
› …that are both hard to
choose and hard to
remember…
› …and usually aren’t even
secure
› Those @%@#$ security
questions
© 2014 Forrester Research, Inc. Reproduction Prohibited 15
When user self-service
fails…you pay
› In CSR costs
› In user experience
friction
© 2013 Forrester Research, Inc. Reproduction Prohibited
Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2012
People cross devices to accomplish a
single goal
© 2014 Forrester Research, Inc. Reproduction Prohibited 17
“Mobile first” means IT security has less
room to maneuver than ever
› Business owners want in-
app registration and login.
© 2014 Forrester Research, Inc. Reproduction Prohibited 18
“Mobile first” means IT security has less
room to maneuver than ever
› Business owners want in-
app registration and login.
› Individuals demand user
experiences with a clear
purpose.
© 2014 Forrester Research, Inc. Reproduction Prohibited 19
“Mobile first” means IT security has less
room to maneuver than ever
› Business owners want in-
app registration and login.
› Individuals demand user
experiences with a clear
purpose.
› Security task flows on
mobile devices feel
different.
Responsive design for CIAM
enables security and experience
© 2012 Forrester Research, Inc. Reproduction Prohibited
Typical external users and IAM needs in
a franchise-type business
21
External
Managed Unmanaged
Sole Group
• Retail customer
• Requires self-registration
• Can be inactivated
• All partners
• Must follow per-country
regulations
• May need high
assurance
• Multi-employee partner
• Complex record
structure
• Needs delegated
administration and
entitlement management
• Sole proprietor partner
• Simple record structure
© 2012 Forrester Research, Inc. Reproduction Prohibited
• Optional• Optional• Optional
Possible segmentation of identity
sources
22
Unified IAM framework
RP interface
IdP interface
• Other
partners
IdP interface
• Retail
customers
RP interface
IdP interface
IdP interface
RP interface
• Managed by
cloud broker
• Social IdPs
• Employees
• Some
partners
• Natively
managed
© 2014 Forrester Research, Inc. Reproduction Prohibited 23
Ways CIAM is unique
› CX can have a direct impact on the top line
› Multiple customer-facing properties
› Complete lack of mobile device security controls
› Scale and volume, along several dimensions
© 2014 Forrester Research, Inc. Reproduction Prohibited 24
Source: May 22, 2014 “Introducing Forrester's Customer IAM Security Maturity Assessment Model” Forrester report
What engagement channels are you
providing?
…and what is the importance of each?
© 2014 Forrester Research, Inc. Reproduction Prohibited 25
Source: May 22, 2014 “Introducing Forrester's Customer IAM Security Maturity Assessment Model” Forrester report
What life cycle
elements now
become
relevant?
…and what
authentication
role does each
channel serve
at each
moment?
© 2014 Forrester Research, Inc. Reproduction Prohibited 26
Security best practices that are
usability-friendly: leveraging context
User
identification
based on
something
they . . .
Know.
Have.
Are.
Do.
© 2014 Forrester Research, Inc. Reproduction Prohibited 27
Usability Deployability Security
Memorywise-
Effortless
Accessible Resilient-to-Physical-Observation
Scalable-for-
Users
Negligible-Cost-per-
User
Resilient-to-Targeted-Impersonation
Nothing-to-Carry Server-Compatible Resilient-to-Throttled-Guessing
Physically-
Effortless
Nothing-to-Provision-
to-User
Resilient-to-Unthrottled-Guessing
Easy-to-Learn Mature Resilient-to-Internal-Observation
Efficient-to-Use Multiple-Purposes Resilient-to-Leaks-from-Other-Verifiers
Infrequent-Errors Available-Offline Resilient-to-Phishing
Easy-Recovery-
from-Loss
Resilient-to-Theft
No-Trusted-Third-Party
Requiring-Explicit-Consent
Unlinkable
Risk-based techniques improve “UDS”
© 2014 Forrester Research, Inc. Reproduction Prohibited 28
Usability Deployability Security
Memorywise-
Effortless
Accessible Resilient-to-Physical-Observation
Scalable-for-
Users
Negligible-Cost-per-
User
Resilient-to-Targeted-Impersonation
Nothing-to-Carry Server-Compatible Resilient-to-Throttled-Guessing
Physically-
Effortless
Nothing-to-Provision-
to-User
Resilient-to-Unthrottled-Guessing
Easy-to-Learn Mature Resilient-to-Internal-Observation
Efficient-to-Use Multiple-Purposes Resilient-to-Leaks-from-Other-Verifiers
Infrequent-Errors Available-Offline Resilient-to-Phishing
Easy-Recovery-
from-Loss
Resilient-to-Theft
No-Trusted-Third-Party
Requiring-Explicit-Consent
Unlinkable
Risk-based techniques improve “UDS”
© 2014 Forrester Research, Inc. Reproduction Prohibited 29
Security best practices that are
usability-friendly: leveraging mobile
As a secondary channel
›True OOB authentication
›Contextual fairy dust with
device identification and
reputation
© 2014 Forrester Research, Inc. Reproduction Prohibited 30
Security best practices that are
usability-friendly: leveraging mobile
As a secondary channel
›True OOB authentication
›Contextual fairy dust with
device identification and
reputation
As a primary channel
›In-app integration for
seamless authentication
›Contextual fairy dust to
strengthen the singular
channel
© 2014 Forrester Research, Inc. Reproduction Prohibited 31
31
Usability best practices
that cost nothing to remember:
clarity and context sensitivity
© 2014 Forrester Research, Inc. Reproduction Prohibited 32
© 2014 Forrester Research, Inc. Reproduction Prohibited 33
© 2014 Forrester Research, Inc. Reproduction Prohibited 34
© 2014 Forrester Research, Inc. Reproduction Prohibited 35
35
Usability best practices
that cost nothing to remember:
feedback
Sew together experiences
that maximize success
© 2013 Forrester Research, Inc. Reproduction Prohibited
People use multiple touchpoints at once
Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2012
© 2014 Forrester Research, Inc. Reproduction Prohibited 38
So, prepare for channel-jumping
› Unify back-end records so that the user
experiences no latency in “what you know”
about him
© 2014 Forrester Research, Inc. Reproduction Prohibited 39
So, prepare for channel-jumping
› Unify back-end records so that the user
experiences no latency in “what you know”
about him
› Leverage contextual cues to enable a channel to
be “in-band” for primary tasks and “out-of-band”
for authentication tasks
© 2014 Forrester Research, Inc. Reproduction Prohibited 40
So, prepare for channel-jumping
› Unify back-end records so that the user
experiences no latency in “what you know”
about him
› Leverage contextual cues to enable a channel to
be “in-band” for primary tasks and “out-of-band”
for authentication tasks
› Match session length to the entirety of the risk:
the nature of the transaction, channel, user…
© 2014 Forrester Research, Inc. Reproduction Prohibited 41
IT and the business are expected to work
hand in hand
© 2014 Forrester Research, Inc. Reproduction Prohibited 42
So, negotiate!
› Hammer out agreement on formal levels of risk
› Map tasks and channels to them
› Seek the highest security maturity scores for the
most important tasks and channels
© 2014 Forrester Research, Inc. Reproduction Prohibited 43
Source: May 22, 2014 “Forrester's Customer IAM Security Maturity Assessment Model” Forrester tool
So, negotiate!
› Hammer out agreement on formal levels of risk
› Map tasks and channels to them
› Seek the highest security maturity scores for the
most important tasks and channels
Deregister device
We allow users to deregister a device explicitly. Yes
We authenticate users before allowing this task to
proceed.
Yes
We keep track of devices that have been associated
with a user.
Yes
We notify the customer in an email or SMS text
message if a device has been deregistered.
No
A customer can have only a limited number (e.g., 10)
of registered devices across all channels.
No
Thank you
Eve Maler
+1 425.345.6756
emaler@forrester.com
@xmlgrrl
THE IDENTITY INDUSTRY IS EXPLODING
TODAY
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
NEW PARADIGM IN SECURITY
 Single-point access to applications
within the firewall
– Proprietary
– On-premise
– Web only
– Single domain
Legacy Security Model
 Cloud, Social, Mobile & Data drive a new
approach
– Open standards
– Hybrid, datacenter and cloud
– Web, API and mobile
– Federated by default
Next-Gen Identity Model
76% of Network Intrusions Exploited Weak or Stolen Passwords (1)
Traditional Identity Management not Working
(1) Verizon Data Breach Investigations Report 2013
THE CONNECTED CUSTOMER
Single
Channel
Multichannel
Multiple
Identities
Omnichannel
Customers
experience a
single type of
touch-point
Customers see
multiple touch-
points acting
independently.
Customers see
multiple touch-
points as part of
the same brand.
Customers
experience a
brand, not a
channel within a
brand.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
49
EMERGING IDENTITY LAYER
Simplify
access
Manage
identities
Single
customer
view
Connect
apps
Scale and
grow
OPEN ACCESS
IDENTITY WEAKNESSES EXPLOITED
~110M
accounts
jeopardized
~5M
usernames &
phone numbers
stolen
~7M
passwords
stolen
~250K
passwords
stolen
~38M
usernames &
passwords
stolen
~318K
accounts
hacked
~50M
usernames &
passwords
stolen
~50M
user accounts
compromised
 2013 was the most
historic year for cyber
attacks
 Several prominent
brands experienced
high profile data
breaches
 Hundreds of millions
of usernames,
passwords and
accounts were
jeopardized
 Stolen social media
credentials fetch more
than credit card
numbers on
cybercrime black
markets
 Secures Access to
Any App, on Any
Device from Any
Location
 Enterprise Grade
 Flexible Hybrid
Deployment
 Committed to Open
Standards
 Web, Mobile, and API
 Committed to Open
Standards
 Web, Mobile, and API
 Simple to Advanced
Use-Case Support in
a Single Platform
CENTRALIZE CONTROL
Ping Identity – Ushering in the New Era of Identity
SINGLE CUSTOMER VIEW
TODAY’S IDENTITY PROTOCOL
LANDSCAPE
SAML
LDAP
X.509
MODERN IDENTITY PROTOCOL STACK
OAuth 2.0
MODERN IDENTITY PROTOCOL STACK
OpenID Connect SCIM
OAuth 2.0
Security for APIs
APIs FOR IDENTITY
OpenID Connect SCIM
Security for APIs
User Authentication API User Management API
APIs FOR IDENTITY
Security for APIs
User Authentication API User Management API
APIs FOR IDENTITY
(Not identity-enabled APIs)
FUNDAMENTAL TENETS TO SCALE
• No more passwords
• Automate as much as possible
– Eliminate IT Administrative overhead
– Application registration is dynamic
• Ease of use
– Effortless self service
– Developer-friendly
– IT-friendly
– User-friendly
IMPACT EXPERIENCEAND REVENUE
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
62
For a more detailed analysis on the Total Economic Impact of Ping solutions,
please join us for a webinar on September 26 at 11am ET.
https://www.pingidentity.com/about-us/event-detail.cfm?customel_datapageid_1455=71219
$12M $21M $45M
Incremental revenue
from faster time-to-
market following
M&A activity
Incremental revenue
from reduced
application dropout
rates
Incremental revenue
from white-labeled
apps
Copyright © 2014 Ping Identity Corp. All rights reserved.
63
 Half of the Fortune 100
 4 of the 6 Largest US Banks
 8 of the 10 Largest Biopharmas
 3 of the 5 Largest Healthcare
Plans
CUSTOMER SUMMARY GLOBAL LEADERS & INNOVATORS
1,000+
global
customers
98%
customer
satisfaction
93%
customer
retention
SI, TECH & SAAS PARTNERS
 Offices: Denver, Boston,
Vancouver, London, San
Francisco, Halifax, Tel Aviv,
Tokyo
 Employees: 350
 Founded: 2002
COMPANY BACKGROUND
STANDARDS BODY PARTICIPATION
THE IDENTITY SECURITY COMPANY
WHAT IS ACTIONABLE?
• Apps and devices need a modern identity
protocol stack
– Starts with OAuth 2.0, OpenID Connect and
SCIM
• No more passwords
– Federated access by default
• Ease of use means automate everything
– Or enable self-service as a backup
Thank You
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
65
Eve Maler
+1 425.345.6756
emaler@forrester.com
@xmlgrrl
Jeff Nolan
+1 650.430.3947
jnolan@pingidentity.com
@jeffnolan

More Related Content

What's hot

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesBenjamin Canner
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsForgeRock
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinForgeRock
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...ForgeRock
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
 

What's hot (20)

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 

Similar to Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices

Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication WrongForrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication WrongDuo Security
 
4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...
4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...
4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...SparkPost
 
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...ForgeRock
 
The Power Trio: APIs, Cloud Platforms, Lifecycle Management
The Power Trio: APIs, Cloud Platforms, Lifecycle Management The Power Trio: APIs, Cloud Platforms, Lifecycle Management
The Power Trio: APIs, Cloud Platforms, Lifecycle Management WSO2
 
CMOs: Transforming Marketing into a Growth Engine
CMOs: Transforming Marketing into a Growth EngineCMOs: Transforming Marketing into a Growth Engine
CMOs: Transforming Marketing into a Growth EngineMarketo
 
SEND | Digital in the Age of the Customer
SEND | Digital in the Age of the CustomerSEND | Digital in the Age of the Customer
SEND | Digital in the Age of the CustomerContactlab
 
Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014Ajit Khadd
 
IW14 Session: Mike Gualtieri, Forrester Research
IW14 Session: Mike Gualtieri, Forrester ResearchIW14 Session: Mike Gualtieri, Forrester Research
IW14 Session: Mike Gualtieri, Forrester ResearchSoftware AG
 
Improving customer insight through digital intelligence
Improving customer insight through digital intelligenceImproving customer insight through digital intelligence
Improving customer insight through digital intelligenceRBA
 
Keep Your Eyes on the Prize Why Context Matters More than Ever
Keep Your Eyes on the Prize   Why Context Matters More than EverKeep Your Eyes on the Prize   Why Context Matters More than Ever
Keep Your Eyes on the Prize Why Context Matters More than EverEktron
 
Oracle Service Cloud Benefits for you
Oracle Service Cloud Benefits for youOracle Service Cloud Benefits for you
Oracle Service Cloud Benefits for youVincent van Huizen
 
Adaptive Apps: Reimagining the Future - Forrester
Adaptive Apps: Reimagining the Future  - ForresterAdaptive Apps: Reimagining the Future  - Forrester
Adaptive Apps: Reimagining the Future - ForresterApigee | Google Cloud
 
Mobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceMobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceTorry Harris Business Solutions
 
Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...
Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...
Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...FollowAnalytics
 
7 Habits of Best B2B Digital Marketers
7 Habits of Best B2B Digital Marketers7 Habits of Best B2B Digital Marketers
7 Habits of Best B2B Digital MarketersSiteworx LLC
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Flexera
 
SiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring Vendors
SiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring VendorsSiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring Vendors
SiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring VendorsInfer
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
Webinar Deck: How Multi-Channel Data Drives Multi-Channel Personalization
Webinar Deck: How Multi-Channel Data Drives Multi-Channel PersonalizationWebinar Deck: How Multi-Channel Data Drives Multi-Channel Personalization
Webinar Deck: How Multi-Channel Data Drives Multi-Channel PersonalizationEnsighten
 
Sponsor Luncheon Presentation by FORSEE
Sponsor Luncheon Presentation by FORSEESponsor Luncheon Presentation by FORSEE
Sponsor Luncheon Presentation by FORSEEMediaPost
 

Similar to Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices (20)

Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication WrongForrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
 
4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...
4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...
4-Step Guide to Mobile Engagement - presented by Forrester Research & Message...
 
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
 
The Power Trio: APIs, Cloud Platforms, Lifecycle Management
The Power Trio: APIs, Cloud Platforms, Lifecycle Management The Power Trio: APIs, Cloud Platforms, Lifecycle Management
The Power Trio: APIs, Cloud Platforms, Lifecycle Management
 
CMOs: Transforming Marketing into a Growth Engine
CMOs: Transforming Marketing into a Growth EngineCMOs: Transforming Marketing into a Growth Engine
CMOs: Transforming Marketing into a Growth Engine
 
SEND | Digital in the Age of the Customer
SEND | Digital in the Age of the CustomerSEND | Digital in the Age of the Customer
SEND | Digital in the Age of the Customer
 
Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014
 
IW14 Session: Mike Gualtieri, Forrester Research
IW14 Session: Mike Gualtieri, Forrester ResearchIW14 Session: Mike Gualtieri, Forrester Research
IW14 Session: Mike Gualtieri, Forrester Research
 
Improving customer insight through digital intelligence
Improving customer insight through digital intelligenceImproving customer insight through digital intelligence
Improving customer insight through digital intelligence
 
Keep Your Eyes on the Prize Why Context Matters More than Ever
Keep Your Eyes on the Prize   Why Context Matters More than EverKeep Your Eyes on the Prize   Why Context Matters More than Ever
Keep Your Eyes on the Prize Why Context Matters More than Ever
 
Oracle Service Cloud Benefits for you
Oracle Service Cloud Benefits for youOracle Service Cloud Benefits for you
Oracle Service Cloud Benefits for you
 
Adaptive Apps: Reimagining the Future - Forrester
Adaptive Apps: Reimagining the Future  - ForresterAdaptive Apps: Reimagining the Future  - Forrester
Adaptive Apps: Reimagining the Future - Forrester
 
Mobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User ExperienceMobility, Gamification & SOA as the Basis for Better User Experience
Mobility, Gamification & SOA as the Basis for Better User Experience
 
Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...
Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...
Mapping the Omnichannel Customer Journey: How to Engage People in a Mobile Fi...
 
7 Habits of Best B2B Digital Marketers
7 Habits of Best B2B Digital Marketers7 Habits of Best B2B Digital Marketers
7 Habits of Best B2B Digital Marketers
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
 
SiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring Vendors
SiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring VendorsSiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring Vendors
SiriusDecisions Webinar: How to Evaluate Predictive Lead Scoring Vendors
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Webinar Deck: How Multi-Channel Data Drives Multi-Channel Personalization
Webinar Deck: How Multi-Channel Data Drives Multi-Channel PersonalizationWebinar Deck: How Multi-Channel Data Drives Multi-Channel Personalization
Webinar Deck: How Multi-Channel Data Drives Multi-Channel Personalization
 
Sponsor Luncheon Presentation by FORSEE
Sponsor Luncheon Presentation by FORSEESponsor Luncheon Presentation by FORSEE
Sponsor Luncheon Presentation by FORSEE
 

More from Ping Identity

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner ProgramPing Identity
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthPing Identity
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There? Ping Identity
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesPing Identity
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesPing Identity
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | InfographicPing Identity
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESPing Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?Ping Identity
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapPing Identity
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSPing Identity
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...Ping Identity
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyPing Identity
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 

More from Ping Identity (17)

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 

Recently uploaded

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Recently uploaded (20)

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 

Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices

  • 1. Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices Eve Maler, Principal Analyst May 28, 2014
  • 3. © 2014 Forrester Research, Inc. Reproduction Prohibited 3 Users are escaping captivity Benefit in sharing credentials Degree of freedom to walk away from relationship Baseline Greater benefit Large benefit None (captive) Some at cost A lot
  • 4. © 2014 Forrester Research, Inc. Reproduction Prohibited 4 Users are escaping captivity Benefit in sharing credentials Degree of freedom to walk away from relationship Baseline Greater benefit Large benefit None (captive) Some at cost A lot Regular employee Contractor Privileged employee Employee of partner
  • 5. © 2014 Forrester Research, Inc. Reproduction Prohibited 5 Users are escaping captivity Benefit in sharing credentials Degree of freedom to walk away from relationship Baseline Greater benefit Large benefit None (captive) Some at cost A lot Regular employee Contractor Nonpaying affiliate Paying affiliate Privileged employee Employee of partner
  • 6. © 2014 Forrester Research, Inc. Reproduction Prohibited 6 Users are escaping captivity Benefit in sharing credentials Degree of freedom to walk away from relationship Baseline Greater benefit Large benefit None (captive) Some at cost A lot Regular employee Contractor Nonpaying affiliate Paying affiliate Bank customer Privileged employee Payout beneficiary Employee of partner
  • 7. © 2014 Forrester Research, Inc. Reproduction Prohibited 7 Users are escaping captivity Benefit in sharing credentials Degree of freedom to walk away from relationship Baseline Greater benefit Large benefit None (captive) Some at cost A lot Regular employee Contractor Nonpaying affiliate Paying affiliate Bank customer Privileged employee Social network user Retail customer Payout beneficiary Employee of partner
  • 8. © 2014 Forrester Research, Inc. Reproduction Prohibited 8 Users are escaping captivity Benefit in sharing credentials Degree of freedom to walk away from relationship Baseline Greater benefit Large benefit None (captive) Some at cost A lot Regular employee Contractor Nonpaying affiliate Paying affiliate Bank customer Privileged employee Social network user Retail customer Service- paying customer Payout beneficiary Employee of partner
  • 9. © 2014 Forrester Research, Inc. Reproduction Prohibited 9 But the Internet has become a bad neighborhood
  • 10. © 2014 Forrester Research, Inc. Reproduction Prohibited 10 We see the disproportionate targeting of credentials in the data Source: December 30, 2013, “Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2” Forrester report
  • 11. © 2014 Forrester Research, Inc. Reproduction Prohibited 11 What do customers experience when security goes bad? › A few: major consequences such as identity theft
  • 12. © 2014 Forrester Research, Inc. Reproduction Prohibited 12 What do customers experience when security goes bad? › A few: major consequences such as identity theft › Many: loss of trust in the brand
  • 13. © 2014 Forrester Research, Inc. Reproduction Prohibited 13 What do customers experience when security goes bad? › A few: major consequences such as identity theft › Many: loss of trust in the brand › Everyone: an involuntary password reset flow
  • 14. © 2014 Forrester Research, Inc. Reproduction Prohibited 14 What do customers experience on a good day? › Onerous account registration forms › Those @%@#$ password policies… › …that are both hard to choose and hard to remember… › …and usually aren’t even secure › Those @%@#$ security questions
  • 15. © 2014 Forrester Research, Inc. Reproduction Prohibited 15 When user self-service fails…you pay › In CSR costs › In user experience friction
  • 16. © 2013 Forrester Research, Inc. Reproduction Prohibited Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2012 People cross devices to accomplish a single goal
  • 17. © 2014 Forrester Research, Inc. Reproduction Prohibited 17 “Mobile first” means IT security has less room to maneuver than ever › Business owners want in- app registration and login.
  • 18. © 2014 Forrester Research, Inc. Reproduction Prohibited 18 “Mobile first” means IT security has less room to maneuver than ever › Business owners want in- app registration and login. › Individuals demand user experiences with a clear purpose.
  • 19. © 2014 Forrester Research, Inc. Reproduction Prohibited 19 “Mobile first” means IT security has less room to maneuver than ever › Business owners want in- app registration and login. › Individuals demand user experiences with a clear purpose. › Security task flows on mobile devices feel different.
  • 20. Responsive design for CIAM enables security and experience
  • 21. © 2012 Forrester Research, Inc. Reproduction Prohibited Typical external users and IAM needs in a franchise-type business 21 External Managed Unmanaged Sole Group • Retail customer • Requires self-registration • Can be inactivated • All partners • Must follow per-country regulations • May need high assurance • Multi-employee partner • Complex record structure • Needs delegated administration and entitlement management • Sole proprietor partner • Simple record structure
  • 22. © 2012 Forrester Research, Inc. Reproduction Prohibited • Optional• Optional• Optional Possible segmentation of identity sources 22 Unified IAM framework RP interface IdP interface • Other partners IdP interface • Retail customers RP interface IdP interface IdP interface RP interface • Managed by cloud broker • Social IdPs • Employees • Some partners • Natively managed
  • 23. © 2014 Forrester Research, Inc. Reproduction Prohibited 23 Ways CIAM is unique › CX can have a direct impact on the top line › Multiple customer-facing properties › Complete lack of mobile device security controls › Scale and volume, along several dimensions
  • 24. © 2014 Forrester Research, Inc. Reproduction Prohibited 24 Source: May 22, 2014 “Introducing Forrester's Customer IAM Security Maturity Assessment Model” Forrester report What engagement channels are you providing? …and what is the importance of each?
  • 25. © 2014 Forrester Research, Inc. Reproduction Prohibited 25 Source: May 22, 2014 “Introducing Forrester's Customer IAM Security Maturity Assessment Model” Forrester report What life cycle elements now become relevant? …and what authentication role does each channel serve at each moment?
  • 26. © 2014 Forrester Research, Inc. Reproduction Prohibited 26 Security best practices that are usability-friendly: leveraging context User identification based on something they . . . Know. Have. Are. Do.
  • 27. © 2014 Forrester Research, Inc. Reproduction Prohibited 27 Usability Deployability Security Memorywise- Effortless Accessible Resilient-to-Physical-Observation Scalable-for- Users Negligible-Cost-per- User Resilient-to-Targeted-Impersonation Nothing-to-Carry Server-Compatible Resilient-to-Throttled-Guessing Physically- Effortless Nothing-to-Provision- to-User Resilient-to-Unthrottled-Guessing Easy-to-Learn Mature Resilient-to-Internal-Observation Efficient-to-Use Multiple-Purposes Resilient-to-Leaks-from-Other-Verifiers Infrequent-Errors Available-Offline Resilient-to-Phishing Easy-Recovery- from-Loss Resilient-to-Theft No-Trusted-Third-Party Requiring-Explicit-Consent Unlinkable Risk-based techniques improve “UDS”
  • 28. © 2014 Forrester Research, Inc. Reproduction Prohibited 28 Usability Deployability Security Memorywise- Effortless Accessible Resilient-to-Physical-Observation Scalable-for- Users Negligible-Cost-per- User Resilient-to-Targeted-Impersonation Nothing-to-Carry Server-Compatible Resilient-to-Throttled-Guessing Physically- Effortless Nothing-to-Provision- to-User Resilient-to-Unthrottled-Guessing Easy-to-Learn Mature Resilient-to-Internal-Observation Efficient-to-Use Multiple-Purposes Resilient-to-Leaks-from-Other-Verifiers Infrequent-Errors Available-Offline Resilient-to-Phishing Easy-Recovery- from-Loss Resilient-to-Theft No-Trusted-Third-Party Requiring-Explicit-Consent Unlinkable Risk-based techniques improve “UDS”
  • 29. © 2014 Forrester Research, Inc. Reproduction Prohibited 29 Security best practices that are usability-friendly: leveraging mobile As a secondary channel ›True OOB authentication ›Contextual fairy dust with device identification and reputation
  • 30. © 2014 Forrester Research, Inc. Reproduction Prohibited 30 Security best practices that are usability-friendly: leveraging mobile As a secondary channel ›True OOB authentication ›Contextual fairy dust with device identification and reputation As a primary channel ›In-app integration for seamless authentication ›Contextual fairy dust to strengthen the singular channel
  • 31. © 2014 Forrester Research, Inc. Reproduction Prohibited 31 31 Usability best practices that cost nothing to remember: clarity and context sensitivity
  • 32. © 2014 Forrester Research, Inc. Reproduction Prohibited 32
  • 33. © 2014 Forrester Research, Inc. Reproduction Prohibited 33
  • 34. © 2014 Forrester Research, Inc. Reproduction Prohibited 34
  • 35. © 2014 Forrester Research, Inc. Reproduction Prohibited 35 35 Usability best practices that cost nothing to remember: feedback
  • 36. Sew together experiences that maximize success
  • 37. © 2013 Forrester Research, Inc. Reproduction Prohibited People use multiple touchpoints at once Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2012
  • 38. © 2014 Forrester Research, Inc. Reproduction Prohibited 38 So, prepare for channel-jumping › Unify back-end records so that the user experiences no latency in “what you know” about him
  • 39. © 2014 Forrester Research, Inc. Reproduction Prohibited 39 So, prepare for channel-jumping › Unify back-end records so that the user experiences no latency in “what you know” about him › Leverage contextual cues to enable a channel to be “in-band” for primary tasks and “out-of-band” for authentication tasks
  • 40. © 2014 Forrester Research, Inc. Reproduction Prohibited 40 So, prepare for channel-jumping › Unify back-end records so that the user experiences no latency in “what you know” about him › Leverage contextual cues to enable a channel to be “in-band” for primary tasks and “out-of-band” for authentication tasks › Match session length to the entirety of the risk: the nature of the transaction, channel, user…
  • 41. © 2014 Forrester Research, Inc. Reproduction Prohibited 41 IT and the business are expected to work hand in hand
  • 42. © 2014 Forrester Research, Inc. Reproduction Prohibited 42 So, negotiate! › Hammer out agreement on formal levels of risk › Map tasks and channels to them › Seek the highest security maturity scores for the most important tasks and channels
  • 43. © 2014 Forrester Research, Inc. Reproduction Prohibited 43 Source: May 22, 2014 “Forrester's Customer IAM Security Maturity Assessment Model” Forrester tool So, negotiate! › Hammer out agreement on formal levels of risk › Map tasks and channels to them › Seek the highest security maturity scores for the most important tasks and channels Deregister device We allow users to deregister a device explicitly. Yes We authenticate users before allowing this task to proceed. Yes We keep track of devices that have been associated with a user. Yes We notify the customer in an email or SMS text message if a device has been deregistered. No A customer can have only a limited number (e.g., 10) of registered devices across all channels. No
  • 44. Thank you Eve Maler +1 425.345.6756 emaler@forrester.com @xmlgrrl
  • 45. THE IDENTITY INDUSTRY IS EXPLODING
  • 46. TODAY
  • 48. NEW PARADIGM IN SECURITY  Single-point access to applications within the firewall – Proprietary – On-premise – Web only – Single domain Legacy Security Model  Cloud, Social, Mobile & Data drive a new approach – Open standards – Hybrid, datacenter and cloud – Web, API and mobile – Federated by default Next-Gen Identity Model 76% of Network Intrusions Exploited Weak or Stolen Passwords (1) Traditional Identity Management not Working (1) Verizon Data Breach Investigations Report 2013
  • 49. THE CONNECTED CUSTOMER Single Channel Multichannel Multiple Identities Omnichannel Customers experience a single type of touch-point Customers see multiple touch- points acting independently. Customers see multiple touch- points as part of the same brand. Customers experience a brand, not a channel within a brand. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 49
  • 52. IDENTITY WEAKNESSES EXPLOITED ~110M accounts jeopardized ~5M usernames & phone numbers stolen ~7M passwords stolen ~250K passwords stolen ~38M usernames & passwords stolen ~318K accounts hacked ~50M usernames & passwords stolen ~50M user accounts compromised  2013 was the most historic year for cyber attacks  Several prominent brands experienced high profile data breaches  Hundreds of millions of usernames, passwords and accounts were jeopardized  Stolen social media credentials fetch more than credit card numbers on cybercrime black markets
  • 53.  Secures Access to Any App, on Any Device from Any Location  Enterprise Grade  Flexible Hybrid Deployment  Committed to Open Standards  Web, Mobile, and API  Committed to Open Standards  Web, Mobile, and API  Simple to Advanced Use-Case Support in a Single Platform CENTRALIZE CONTROL Ping Identity – Ushering in the New Era of Identity
  • 56. MODERN IDENTITY PROTOCOL STACK OAuth 2.0
  • 57. MODERN IDENTITY PROTOCOL STACK OpenID Connect SCIM OAuth 2.0
  • 58. Security for APIs APIs FOR IDENTITY OpenID Connect SCIM
  • 59. Security for APIs User Authentication API User Management API APIs FOR IDENTITY
  • 60. Security for APIs User Authentication API User Management API APIs FOR IDENTITY (Not identity-enabled APIs)
  • 61. FUNDAMENTAL TENETS TO SCALE • No more passwords • Automate as much as possible – Eliminate IT Administrative overhead – Application registration is dynamic • Ease of use – Effortless self service – Developer-friendly – IT-friendly – User-friendly
  • 62. IMPACT EXPERIENCEAND REVENUE Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 62 For a more detailed analysis on the Total Economic Impact of Ping solutions, please join us for a webinar on September 26 at 11am ET. https://www.pingidentity.com/about-us/event-detail.cfm?customel_datapageid_1455=71219 $12M $21M $45M Incremental revenue from faster time-to- market following M&A activity Incremental revenue from reduced application dropout rates Incremental revenue from white-labeled apps
  • 63. Copyright © 2014 Ping Identity Corp. All rights reserved. 63  Half of the Fortune 100  4 of the 6 Largest US Banks  8 of the 10 Largest Biopharmas  3 of the 5 Largest Healthcare Plans CUSTOMER SUMMARY GLOBAL LEADERS & INNOVATORS 1,000+ global customers 98% customer satisfaction 93% customer retention SI, TECH & SAAS PARTNERS  Offices: Denver, Boston, Vancouver, London, San Francisco, Halifax, Tel Aviv, Tokyo  Employees: 350  Founded: 2002 COMPANY BACKGROUND STANDARDS BODY PARTICIPATION THE IDENTITY SECURITY COMPANY
  • 64. WHAT IS ACTIONABLE? • Apps and devices need a modern identity protocol stack – Starts with OAuth 2.0, OpenID Connect and SCIM • No more passwords – Federated access by default • Ease of use means automate everything – Or enable self-service as a backup
  • 65. Thank You Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 65 Eve Maler +1 425.345.6756 emaler@forrester.com @xmlgrrl Jeff Nolan +1 650.430.3947 jnolan@pingidentity.com @jeffnolan

Editor's Notes

  1. Abstract: Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your customers can’t register or log in for service, and can’t conduct transactions in an easily usable manner, it really doesn’t much matter how your website, mobile app, or phone channel is architected; they may move on to your competition. In this webinar, learn how customer experience influences IAM and security and what actions you can take to meet both sets of goals.
  2. Image source: Flickr (http://www.flickr.com/) | CC BY 2.0 | https://www.flickr.com/photos/ladydragonflyherworld/8437959241
  3. Image source: Reuters (http://www.reuters.com/article/2014/05/22/us-ebay-password-idUSBREA4K0B420140522)
  4. Image source: http://correcthorsebatterystaple.net/
  5. Image sources: openclipart.org, PowerPoint clip art
  6. Image source: Telegraph Media (http://www.telegraph.co.uk/)
  7. Image source: Telegraph Media (http://www.telegraph.co.uk/)
  8. Image source: Telegraph Media (http://www.telegraph.co.uk/)
  9. Ryan Air. Was making people go through captcha to go to the booking process. Source: RyanAir
  10. Ryan Air. Was making people go through captcha to go to the booking process. Source: RyanAir
  11. Ryan Air. Was making people go through captcha to go to the booking process. Source: RyanAir
  12. Image source: Flickr (http://www.flickr.com/) | CC BY 2.0 | https://www.flickr.com/photos/boston_public_library/8902392223
  13. Image source: http://panth77.deviantart.com/art/Odd-Couple-poster-test-97491102
  14. Integral to public/private clouds Device computing is connecting everything Protecting from unauthorized access is no longer enough Enabling services across desktop, mobile, and APIs is essential Identity is an integral part of public and private cloud services. In recent years we have seen the emergence of a new reality in people and device computing, everything is connected. From power grids to smartphones, everything is connected to the internet and as a result everything is exposed to security breach. But effective identity and access management is not just about protecting things from unauthorized access, and that is what we are here to talk about today. Identity and access management is about enabling services for legitimate purpose, and bringing together a portfolio of services to support business outcomes like customer retention, cross selling of services, and customer satisfaction. As the collision of cloud-mobile-social-api economy grows to it’s inevitable conclusion, we are facing a massive explosion of internet endpoints, and a desperate future problem of securing and coordinating them. How does this begin to play out from a security perspective and how can an identity layer enable a simpler, more secure, and more fluid experience that matches the way your customers engage with you today? One of the main challenges we face in connecting with customers (as well as partners and applications) today is lack of portable, automated, discoverable and scalable identity management. Today we’ll talk at a high level about how a next-generation identity and access management layer encompassing the identity of: people and things passive analytics active feedback and automated connections to partners, customers, and apps underlies
  15. We’re still in a bespoke era Endpoints are known, services highly structured Social logins and “profile free” access is the new norm Today we are at the “craftsman” stage of identity. Carefully constructed connections allow a small number of endpoints and users to be secured. Identity today is still in the craftsman stage where carefully constructed connections against known endpoints are secured around known uses. This is evolving quickly and in no small part to the proliferation of social networks and as a result the experience that your customers expect is shifting. Creating and managing a profile has given way to using a social login that provides the basics for establishing service. Your customers expect you to deliver increasingly personalized services to them based on who they are, their customer history, and inferred preferences. Think about your own behavior interacting with ecommerce sites, your bank, subscription services, and much more. We expect more from merchants, banks, our insurance company… we expect more without wanting to give more.
  16. And it’s only going to get more demanding Recent Experian study stated the #1 reason for negative brand perceptions is bad customer experience, #3 is data breach Today we think of many customer access points – most fairly straightforward, albeit potentially out of the brands sphere of control -- a web portal, a mobile app, a partner site or application, a social channel or coupon site. These already pose a challenge in terms of “knowing” the customer from an identity perspective. But consider the environment consumers will live in over the next 5-10 years – an explosion of connected devices and endpoints – and the impact those will have on how customers interact with your brand.
  17. Identity is the new security perimeter Services are dynamically provisioned according to user attributes Authentication is continuous and highly intelligent The future is exponential growth of users: not just customers, but partners, and the extended workforce – all connecting to an ever-expanding universe of endpoints (applications, services, devices) What’s pretty daunting to think about is that just at the point where customer expectations are rising, the challenges presented by mobility, device proliferation, and diversity of application services means that this is not an incremental layering of new security technology. Legacy approaches to security make the firewall the security perimeter, we propose that the identity itself, whether employees, your business partners or your customers, is the new security perimeter. Legacy solutions are ill-suited for new challenges Architectural limitations that arise from managing sessions and tokens in a world where: Access isn’t just about web apps any more Applications aren’t just inside the firewall anymore Customers’ identities don’t live in a central location Customer access points can’t be controlled The next generation of identity solutions solve for the security and control needed in today’s cloud-connected and mobile world Addresses all identity types (employees, customers, and partners) across all channels (web, mobile, and API) Encompasses every company resource (internal, private, or public cloud), from any device (desktop, tablet or mobile), in any location (inside or outside the network) Differs from legacy IAM solutions in that it is built from the ground up to break from siloed architectures Federated by default, built on open standards, and offers the widest array of deployment options (100% cloud, 100% data center, or hybrid environments) Replacing legacy stacks for enterprises shifting emphasis towards cloud and mobile platforms, while delivering mission critical security cloud-only start-ups cannot provide.
  18. The reason we are here today is because consumers are changing The way they buy is more complex Their relationship with your brand hinges on how well you meet their increased expectations And how easy you make it for them Your customers’ digital world is exploding. The number of connected devices they touch in a given day continues to drastically increase. Not long ago, a generation of interconnected devices emerged – each with their own IP address. Now these devices not only have discrete IP addresses, they will all need their own identity, and enterprises will need to understand how those identities relate to their customer’s identities. What began as simple single sign on, has grown rapidly over the past decade, at a rate that continues to accelerate with mass consumer adoption of mobile, and the API economy. While we used to just be concerned with how a customer moved through the web experience, we now have to extend that to a fluid experience across channels, and what that means in terms of an authentication experience. Customers should be able to maintain states as they shift and do different things across those different channels.
  19. And then came Oauth, targeted not at organizations implementing it to support their apps but instead at developers building identity protocols into their application offerings. Modern Identity Landscape Targeted at Application developers Learned from previous attempts
  20. We have built on the success of OAuth with OpenID Connect, with critical capabilities for identity provider discovery and application registration. SCIM is crucial as a mechanism for API-based provisioning to any app that supports SCIM. Two pillars of scalable modern identity: SCIM and OIDC OIDC is crucial for modern identity IdP discovery – important as number of IdPS increase in the modern identity era. Applicaton registration. Provides a mechanism ern idetntiy. Scale: to enable applications (be they on mobile devices or web applications) to act on behalf of the user to do things. Finally delivers SSO via ID token for native devices (pivot to OAuth). SCIM Authorization and SSO isn’t possible without a provisioning event. aaS vendors have service level agreements that preclude the use of the enterprise identity store. The current insanity vis-à-vis proprietary provisioning won’t scale. SCIM is modern (REST-based) and is our last best hope at scalable provisioning because it delivers a standards-based approach.
  21. And all of this extends to APIs OpenID Connect Authentication API (also enables SSO) Developer calls GetUserInfo API Endpoint Replace Login.jsp and the Password DB Federated Domain, Single Domains, whatever SCIM User Management API Create, Read, Update, Delete Developer exposes API to Add, Change & Delete user accounts
  22. Where this leads us is to an API-centric approach for user authentication across apps, mobile, and custom applications, and standards-based provisioning of services. OpenID Connect Authentication API (also enables SSO) Developer calls GetUserInfo API Endpoint Replace Login.jsp and the Password DB Federated Domain, Single Domains, whatever SCIM User Management API Create, Read, Update, Delete Developer exposes API to Add, Change & Delete user accounts
  23. Two pillars of scalable modern identity: SCIM and OIDC Not Identity Enabled API’s SCIM Authorization and SSO isn’t possible without a provisioning event. aaS vendors have service level agreements that preclude the use of the enterprise identity store. The current insanity vis-à-vis proprietary provisioning won’t scale. SCIM is modern (REST-based) and is our last best hope at scalable provisioning because it delivers a standards-based approach. OIDC is crucial for mod IdP discovery – important as number of IdpS increase in the modern identity era. Client registration. Provides a mechanism ern idetntiy. Scale: to enable applications (be they on mobile devices or web applications) to act on behalf of the user to do things. Finally delivers SSO via ID token for native devices (pivot to OAuth). This is all to say that the idea of an open platform that allows for new and emerging identity standards and protocols becomes paramount.
  24. Passwords are the problem, we see a future with no passwords IT administration has to be automated, with as much self-service as possible
  25. Our partner today, Forrester Research, has done extensive work in this area Identity isn’t just about securing your assets and managing risk, it’s about money In a composite example of a large insurance company with more than 8,000 employees, 19k agents, and 75k licensed agents serving 50 million policy holders we calculate incremental revenue of $45m from just reducing one contributor to customer churn. Enterprise federated identity isn’t just about easing the customer burden, or even reducing risk and improving security – it is both of those, but perhaps more significantly, it has a direct impact on revenue generation. In a recent Total Economic Impact study conducted by Forrester Research, results showed significant revenue potential for consumer-facing implementations. The composite organization used for this economic impact included both a Fortune 500 insurance company providing supplemental insurance in the US and select international markets. Its users include more than 8,000 employees, more than 19,000 sales agents, and more than 75,000 licensed sales agents. It also provides access for subsets of its 50 million policyholders worldwide as well as a a multinational banking and financial services organization with more than 55 million customers worldwide and 260,000 employees.
  26. Founded: 2002 Offices: Denver, Boston, Vancouver, London, Tokyo, Salt Lake, San Francisco Employees: 350+
  27. The time of building purpose-built identity silos is over. The next generation identity platform delivers a layer unifying disparate identity architectures of legacy systems, and allows the enterprise to emerge into the future. I’ll leave you with a few insights into what you can/should begin thinking about today. [points listed above]