SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
TMFORUM MANAGEMENT WORLD
IDENTITY AS A SERVICE
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Consumer Identity Management
5/14/2013 2
Fortune 1000
Employees
62 million IDs
$4B market
Facebook Users
1 billion IDs
Mobile Subscribers
5.2 billion IDs
Citizens
7.0 billion
Consumer Identity
100+ billion IDs
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
The Basics - What is an Identity?
…a unique person, product, or device
– All the data/attributes associated with it—dynamic (location) and static (gender)
– Across all channels (In store, Online, Mobile)
5/14/2013 3
In Store experience
Shopping for X category and comparing Y
products, adding Z products to the basket
Online experience
Searching retailer website for X category
of products with Y features and Z price
Mobile experience
Surfing for price comparisons, reviews,
and features on X products at Y location
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity = Personal Data
5/14/2013 4
Individual
Preferences
 Favorite brands
 Taste in music
 Interests
 …
Acquired
Attributes
 Address
 Medical record
 Purchase history
 …
Inherent
Characteristics
 Date of birth
 Gender
 Nationality
 …
What does
she like?
What did
she do?
What does
she come
from?
Digital Identity
Sum of all the
digitally available
data about an
individual
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity as Enabler, Currency, and Product
• Identity drives revenue by serving 3
roles:
– Enabler: companies are building
rich, personalized products and
services
– Currency: users can trade their
identity data for value
– Product: companies will sell
identity data as a product
5/14/2013 5
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity is Valuable but Carries Risk
Monetization Data Privacy
Stronger legal
enforcement
Increased potential
for brand damage
Higher consumer
awareness/interest
Attribute Exchange
& Federation
Personalization &
Cross-sell
5/14/2013 6
?
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity Economy Business Cases
5/14/2013 7
Permission-Based Marketing
Supplier of real-time profile data
to advertising engines
Identity Broker
A market maker for companies that
want to exchange identity assets
Identity Bank
A secure, privacy-driven solution for
managing personal data
Privacy-as-a-Service
Real time attributes driving service interaction
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Permission-Based Targeted Marketing
“If we can share your data,
you’ll get a discount”
“Great!”
Policy: Has resource owner {the consumer} consented to allow client {advertiser} to
access {profile, preferences, location, presence} for this purpose {scope(s)}?
Advertising Brands
• Profile
• Presence
• Location
• Preferences
5/14/2013 8
Targeted Advertisement
1
2
3
4
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
“You’re Verified!”
“I’m signing up.”
Partial &
Un-trusted
Data “Please verify her identity
and risk score”
“90% certainty
and low-risk”
Identity Broker: Authentication as a Service
5/14/2013 9
Monetized Exchange of Identity Data for Enhanced Security:
• Knowledge-based Authentication
• Identity Proofing
• Geofencing
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity Bank
“If we can share your data,
you’ll get compensated”
“I’m signing up.”
“Great!”
Monetized Exchange
of Identity Data:
* Profile
* Presence
* Preferences
Turn your customer data into a valuable asset, instead of a privacy liability
• Put the user in control of what’s OK to share
• Faster time-to-market for Opt-In/Opt-Out
• Enabled personalized 1:1 marketing versus aggregated anonymized
• Become a trusted broker of consumers’ attributes
Retail Finance Healthcare
5/14/2013 10
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Privacy-as-a-Service
Transparency, Choice, & Control
5/14/2013 11
My Privacy Preferences:
• Consent
• Preferences
• Personal Data
Informed Consent
• JIT
• Contextualized
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Privacy-as-a-Service
Humanize and Operationalize Privacy
5/14/2013 12
1
Regulations
Consumer
Consent
Internal
Policies
2
UnboundID is a leading platform provider for identity services enabling companies
to dynamically manage, protect, and share real-time customer identity data across
cloud, mobile and social applications. Our solutions help companies provide cross-
organizational visibility into individual customer value, preferences and desires
over time while delivering the assurance that companies and their customers need
to share and manage identity data in secure and open environments. Ultimately,
UnboundID helps companies maximize average revenue per customer by
responding to changing identities over their lifetime.
For more information, see www.unboundid.com.
CLARITY
TRUST
REVENUE

Contenu connexe

En vedette

Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarForgeRock
 
How do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenariosHow do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenariosInnopay
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CloudIDSummit
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementForgeRock
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
 
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarForgeRock
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management ForgeRock
 
10 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 201210 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 2012ThreatMetrix
 
ThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix
 

En vedette (14)

Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
How do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenariosHow do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenarios
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management
 
10 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 201210 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 2012
 
ThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the Internet
 

Similaire à Tmw20098 land

Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Antoine Vigneron
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationNG DATA
 
Personagraph presentation
Personagraph presentationPersonagraph presentation
Personagraph presentationDon Quinn
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011Constantine Karbaliotis
 
Turning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer ExperiencesTurning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer ExperiencesNG DATA
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panelCloudera, Inc.
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldEnsighten
 
Data Driven Communications
Data Driven CommunicationsData Driven Communications
Data Driven CommunicationsZuni
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
Life in mobile_2014_overview_final
Life in mobile_2014_overview_finalLife in mobile_2014_overview_final
Life in mobile_2014_overview_finalDaniel Foci
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Master Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionMaster Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionSignal
 
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationThe Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationIPG Media Lab
 
Building Blocks Big Data Expo
Building Blocks Big Data ExpoBuilding Blocks Big Data Expo
Building Blocks Big Data ExpoBigDataExpo
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013Mydex CIC
 
5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)Cision
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacyproductcampnyc
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent Tony Fish
 
Big Data
Big DataBig Data
Big Datacadmef
 

Similaire à Tmw20098 land (20)

Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with Personalization
 
Personagraph presentation
Personagraph presentationPersonagraph presentation
Personagraph presentation
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011
 
Turning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer ExperiencesTurning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer Experiences
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panel
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel World
 
Data Driven Communications
Data Driven CommunicationsData Driven Communications
Data Driven Communications
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Life in mobile_2014_overview_final
Life in mobile_2014_overview_finalLife in mobile_2014_overview_final
Life in mobile_2014_overview_final
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Master Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionMaster Cross-Channel Customer Recognition
Master Cross-Channel Customer Recognition
 
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationThe Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
 
XCMO 2013: Cross-Channel Audience Management
XCMO 2013: Cross-Channel Audience ManagementXCMO 2013: Cross-Channel Audience Management
XCMO 2013: Cross-Channel Audience Management
 
Building Blocks Big Data Expo
Building Blocks Big Data ExpoBuilding Blocks Big Data Expo
Building Blocks Big Data Expo
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013
 
5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacy
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent
 
Big Data
Big DataBig Data
Big Data
 

Plus de navaidkhan

Tmw20127 turgut.c
Tmw20127 turgut.cTmw20127 turgut.c
Tmw20127 turgut.cnavaidkhan
 
Tmw20120 gunter lind.h
Tmw20120 gunter lind.hTmw20120 gunter lind.h
Tmw20120 gunter lind.hnavaidkhan
 
Tmw20116 brooks.l
Tmw20116 brooks.lTmw20116 brooks.l
Tmw20116 brooks.lnavaidkhan
 
Tmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaarTmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaarnavaidkhan
 
Tmw20092 michelsen.d
Tmw20092 michelsen.dTmw20092 michelsen.d
Tmw20092 michelsen.dnavaidkhan
 
Tmw20115 baroux.c
Tmw20115 baroux.cTmw20115 baroux.c
Tmw20115 baroux.cnavaidkhan
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopnavaidkhan
 
Huawei - Lte handover troubleshooting
Huawei - Lte handover troubleshootingHuawei - Lte handover troubleshooting
Huawei - Lte handover troubleshootingnavaidkhan
 
Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03navaidkhan
 
Alu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_externalAlu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_externalnavaidkhan
 
Skyfire log files100411
Skyfire log files100411Skyfire log files100411
Skyfire log files100411navaidkhan
 
Smartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experienceSmartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experiencenavaidkhan
 
Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011navaidkhan
 
Emerging database landscape july 2011
Emerging database landscape july 2011Emerging database landscape july 2011
Emerging database landscape july 2011navaidkhan
 
Signalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take awaysSignalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take awaysnavaidkhan
 

Plus de navaidkhan (16)

TMF Nice
TMF Nice TMF Nice
TMF Nice
 
Tmw20127 turgut.c
Tmw20127 turgut.cTmw20127 turgut.c
Tmw20127 turgut.c
 
Tmw20120 gunter lind.h
Tmw20120 gunter lind.hTmw20120 gunter lind.h
Tmw20120 gunter lind.h
 
Tmw20116 brooks.l
Tmw20116 brooks.lTmw20116 brooks.l
Tmw20116 brooks.l
 
Tmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaarTmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaar
 
Tmw20092 michelsen.d
Tmw20092 michelsen.dTmw20092 michelsen.d
Tmw20092 michelsen.d
 
Tmw20115 baroux.c
Tmw20115 baroux.cTmw20115 baroux.c
Tmw20115 baroux.c
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shop
 
Huawei - Lte handover troubleshooting
Huawei - Lte handover troubleshootingHuawei - Lte handover troubleshooting
Huawei - Lte handover troubleshooting
 
Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03
 
Alu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_externalAlu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_external
 
Skyfire log files100411
Skyfire log files100411Skyfire log files100411
Skyfire log files100411
 
Smartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experienceSmartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experience
 
Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011
 
Emerging database landscape july 2011
Emerging database landscape july 2011Emerging database landscape july 2011
Emerging database landscape july 2011
 
Signalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take awaysSignalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take aways
 

Dernier

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Tmw20098 land

  • 2. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Consumer Identity Management 5/14/2013 2 Fortune 1000 Employees 62 million IDs $4B market Facebook Users 1 billion IDs Mobile Subscribers 5.2 billion IDs Citizens 7.0 billion Consumer Identity 100+ billion IDs
  • 3. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • The Basics - What is an Identity? …a unique person, product, or device – All the data/attributes associated with it—dynamic (location) and static (gender) – Across all channels (In store, Online, Mobile) 5/14/2013 3 In Store experience Shopping for X category and comparing Y products, adding Z products to the basket Online experience Searching retailer website for X category of products with Y features and Z price Mobile experience Surfing for price comparisons, reviews, and features on X products at Y location
  • 4. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity = Personal Data 5/14/2013 4 Individual Preferences  Favorite brands  Taste in music  Interests  … Acquired Attributes  Address  Medical record  Purchase history  … Inherent Characteristics  Date of birth  Gender  Nationality  … What does she like? What did she do? What does she come from? Digital Identity Sum of all the digitally available data about an individual
  • 5. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity as Enabler, Currency, and Product • Identity drives revenue by serving 3 roles: – Enabler: companies are building rich, personalized products and services – Currency: users can trade their identity data for value – Product: companies will sell identity data as a product 5/14/2013 5
  • 6. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity is Valuable but Carries Risk Monetization Data Privacy Stronger legal enforcement Increased potential for brand damage Higher consumer awareness/interest Attribute Exchange & Federation Personalization & Cross-sell 5/14/2013 6 ?
  • 7. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity Economy Business Cases 5/14/2013 7 Permission-Based Marketing Supplier of real-time profile data to advertising engines Identity Broker A market maker for companies that want to exchange identity assets Identity Bank A secure, privacy-driven solution for managing personal data Privacy-as-a-Service Real time attributes driving service interaction
  • 8. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Permission-Based Targeted Marketing “If we can share your data, you’ll get a discount” “Great!” Policy: Has resource owner {the consumer} consented to allow client {advertiser} to access {profile, preferences, location, presence} for this purpose {scope(s)}? Advertising Brands • Profile • Presence • Location • Preferences 5/14/2013 8 Targeted Advertisement 1 2 3 4
  • 9. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • “You’re Verified!” “I’m signing up.” Partial & Un-trusted Data “Please verify her identity and risk score” “90% certainty and low-risk” Identity Broker: Authentication as a Service 5/14/2013 9 Monetized Exchange of Identity Data for Enhanced Security: • Knowledge-based Authentication • Identity Proofing • Geofencing
  • 10. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity Bank “If we can share your data, you’ll get compensated” “I’m signing up.” “Great!” Monetized Exchange of Identity Data: * Profile * Presence * Preferences Turn your customer data into a valuable asset, instead of a privacy liability • Put the user in control of what’s OK to share • Faster time-to-market for Opt-In/Opt-Out • Enabled personalized 1:1 marketing versus aggregated anonymized • Become a trusted broker of consumers’ attributes Retail Finance Healthcare 5/14/2013 10
  • 11. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Privacy-as-a-Service Transparency, Choice, & Control 5/14/2013 11 My Privacy Preferences: • Consent • Preferences • Personal Data Informed Consent • JIT • Contextualized
  • 12. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Privacy-as-a-Service Humanize and Operationalize Privacy 5/14/2013 12 1 Regulations Consumer Consent Internal Policies 2
  • 13. UnboundID is a leading platform provider for identity services enabling companies to dynamically manage, protect, and share real-time customer identity data across cloud, mobile and social applications. Our solutions help companies provide cross- organizational visibility into individual customer value, preferences and desires over time while delivering the assurance that companies and their customers need to share and manage identity data in secure and open environments. Ultimately, UnboundID helps companies maximize average revenue per customer by responding to changing identities over their lifetime. For more information, see www.unboundid.com. CLARITY TRUST REVENUE