SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Consumer Identity and
Access Management
(CIAM)
Creating positive user experiences
while boosting security effectiveness
Steve Brasen
Research Director
Enterprise Management
Associates
Watch the On-Demand Webinar
• Consumer Identity and Access Management (CIAM): Creating Positive User Experiences While Boosting
Security Effectiveness On-Demand Webinar: https://info.enterprisemanagement.com/consumer-identity-and-
access-management-research-webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
Featured Speaker
Steve's career at EMA follows 20+
years of “in-the-trenches” experience
in IT systems support, engineering, and
management for high-technology,
telecommunications, and financial
institutions. Steve is a recognized
leading voice on topics related to
identity and access management
technologies and best practices.
© 2021 Enterprise Management Associates, Inc. 3
Steve Brasen
Research Director
Identity Management
| @ema_research
Consumer Identity and
Access Management
(CIAM)
Creating positive user experiences
while boosting security effectiveness
Steve Brasen
Research Director
Enterprise Management
Associates
Sponsors
© 2021 Enterprise Management Associates, Inc. 5
| @ema_research
Agenda
Understanding
CIAM
1 2 3
CIAM
Requirements
CIAM
Challenges
4
Quantifiable
Benefits to
CIAM
5
Increasing
Registration
Rates
6
Improving
Sales
Conversion
Rates
© 2021 Enterprise Management Associates, Inc. 6
| @ema_research
Understanding CIAM
© 2021 Enterprise Management Associates, Inc. 7
Consumer digital
experiences are
essential for driving
business profitability
and achieving
organizational success.
| @ema_research
Understanding CIAM
© 2021 Enterprise Management Associates, Inc. 8
Organizations must
balance creating positive
consumer experiences
with meeting business
requirements for security
and compliance.
| @ema_research
Understanding CIAM
© 2021 Enterprise Management Associates, Inc. 9
Consumer Identity and
Access Management
governs the complete
authentication and
access process for
consumers of business IT
services
| @ema_research
Understanding CIAM
© 2021 Enterprise Management Associates, Inc. 10
CIAM is fundamentally
different than enterprise IAM
Features unique to CIAM include:
• Self-Registration
• Privacy Consent Management
• Consumer-Focused Authentication
• Credential Resets
• Eminent Elasticity
• Progressive Profiling
| @ema_research
Research and Methodology
© 2021 Enterprise Management Associates, Inc. 11
EMA has conducted
primary research with the
intent of identifying
current and emerging
requirements, challenges,
solutions, and outcomes
of CIAM implementation
| @ema_research
CIAM Requirements
© 2021 Enterprise Management Associates, Inc. 12
| @ema_research
Percent of respondents
indicating the online
services currently
supported by their
organization’s adopted
CIAM platform
CIAM Requirements
© 2021 Enterprise Management Associates, Inc. 13
| @ema_research
Percent of respondents indicating the regulatory
compliance initiatives supported in their organization
CIAM Security Challenges
© 2021 Enterprise Management Associates, Inc. 14
| @ema_research
Percent of respondents indicating CIAM-related security breach
events that occurred in their organization in the preceding year
CIAM Security Challenges
© 2021 Enterprise Management Associates, Inc. 15
| @ema_research
Percent of respondents
from organizations that
had experienced a
breach event indicating
consequences that
occurred due to the
incident
CIAM Administration Challenges
© 2021 Enterprise Management Associates, Inc. 16
| @ema_research
Percent of respondents
indicating how
challenging specific
CIAM issues are for their
organization to
administer
CIAM Benefits
© 2021 Enterprise Management Associates, Inc. 17
| @ema_research
Percent of respondents indicating changes in key consumer
responses since their organization adopted their current CIAM solution
Improving Registration Rates
© 2021 Enterprise Management Associates, Inc. 18
| @ema_research
Average percentage of
consumers visiting
business websites who
register or log in to
specific online services
offered by respondent's
organization
Improving Sales Conversion Rates
© 2021 Enterprise Management Associates, Inc. 19
| @ema_research
Average sales conversion
rate reported by
respondents from
organizations adopting
CIAM solutions supporting
specific features
Conclusions
© 2021 Enterprise Management Associates, Inc. 20
• The adoption of CIAM solutions results in
significant improvements to business
performance and profitability.
• However, improvement should be
introduced to address increasing
security breaches.
• CIAM implementations should be
strategic and should be key part of
an overall security strategy.
• EMA survey results clearly indicate that
investing in a CIAM platform that offers
low-friction consumer access features and
end-to-end security assurance achieves
quantifiable returns on investment.
| @ema_research
Get the report
Learn more and get the report
https://bit.ly/3kbxpZ9
© 2021 Enterprise Management Associates, Inc. 21
| @ema_research

Contenu connexe

Tendances

Tendances (20)

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
CyberArk
CyberArkCyberArk
CyberArk
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 

Similaire à Consumer Identity and Access Management (CIAM)

Similaire à Consumer Identity and Access Management (CIAM) (20)

Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
 
Modern Requirements and Solutions for Privileged Access Management (PAM)
Modern Requirements and Solutions for Privileged Access Management (PAM)Modern Requirements and Solutions for Privileged Access Management (PAM)
Modern Requirements and Solutions for Privileged Access Management (PAM)
 
Achieving Effective Identity and Access Governance
Achieving Effective Identity and Access GovernanceAchieving Effective Identity and Access Governance
Achieving Effective Identity and Access Governance
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...
 
The Journey to Become a Data-Driven Enterprise
The Journey to Become a Data-Driven EnterpriseThe Journey to Become a Data-Driven Enterprise
The Journey to Become a Data-Driven Enterprise
 
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar ReportFour Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Responsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access ManagementResponsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access Management
 
Driving Observability Through Machine Learning and Predictive Analytics
Driving Observability Through Machine Learning and Predictive AnalyticsDriving Observability Through Machine Learning and Predictive Analytics
Driving Observability Through Machine Learning and Predictive Analytics
 
The State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessThe State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to Awareness
 
Driving Observability Through Machine Learning and Predictive Analytics
Driving Observability Through Machine Learning and Predictive AnalyticsDriving Observability Through Machine Learning and Predictive Analytics
Driving Observability Through Machine Learning and Predictive Analytics
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Veritas Managed Backup Services Sales Presentation
Veritas Managed Backup Services Sales PresentationVeritas Managed Backup Services Sales Presentation
Veritas Managed Backup Services Sales Presentation
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 

Plus de Enterprise Management Associates

Plus de Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Consumer Identity and Access Management (CIAM)

  • 1. Consumer Identity and Access Management (CIAM) Creating positive user experiences while boosting security effectiveness Steve Brasen Research Director Enterprise Management Associates
  • 2. Watch the On-Demand Webinar • Consumer Identity and Access Management (CIAM): Creating Positive User Experiences While Boosting Security Effectiveness On-Demand Webinar: https://info.enterprisemanagement.com/consumer-identity-and- access-management-research-webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. Featured Speaker Steve's career at EMA follows 20+ years of “in-the-trenches” experience in IT systems support, engineering, and management for high-technology, telecommunications, and financial institutions. Steve is a recognized leading voice on topics related to identity and access management technologies and best practices. © 2021 Enterprise Management Associates, Inc. 3 Steve Brasen Research Director Identity Management | @ema_research
  • 4. Consumer Identity and Access Management (CIAM) Creating positive user experiences while boosting security effectiveness Steve Brasen Research Director Enterprise Management Associates
  • 5. Sponsors © 2021 Enterprise Management Associates, Inc. 5 | @ema_research
  • 6. Agenda Understanding CIAM 1 2 3 CIAM Requirements CIAM Challenges 4 Quantifiable Benefits to CIAM 5 Increasing Registration Rates 6 Improving Sales Conversion Rates © 2021 Enterprise Management Associates, Inc. 6 | @ema_research
  • 7. Understanding CIAM © 2021 Enterprise Management Associates, Inc. 7 Consumer digital experiences are essential for driving business profitability and achieving organizational success. | @ema_research
  • 8. Understanding CIAM © 2021 Enterprise Management Associates, Inc. 8 Organizations must balance creating positive consumer experiences with meeting business requirements for security and compliance. | @ema_research
  • 9. Understanding CIAM © 2021 Enterprise Management Associates, Inc. 9 Consumer Identity and Access Management governs the complete authentication and access process for consumers of business IT services | @ema_research
  • 10. Understanding CIAM © 2021 Enterprise Management Associates, Inc. 10 CIAM is fundamentally different than enterprise IAM Features unique to CIAM include: • Self-Registration • Privacy Consent Management • Consumer-Focused Authentication • Credential Resets • Eminent Elasticity • Progressive Profiling | @ema_research
  • 11. Research and Methodology © 2021 Enterprise Management Associates, Inc. 11 EMA has conducted primary research with the intent of identifying current and emerging requirements, challenges, solutions, and outcomes of CIAM implementation | @ema_research
  • 12. CIAM Requirements © 2021 Enterprise Management Associates, Inc. 12 | @ema_research Percent of respondents indicating the online services currently supported by their organization’s adopted CIAM platform
  • 13. CIAM Requirements © 2021 Enterprise Management Associates, Inc. 13 | @ema_research Percent of respondents indicating the regulatory compliance initiatives supported in their organization
  • 14. CIAM Security Challenges © 2021 Enterprise Management Associates, Inc. 14 | @ema_research Percent of respondents indicating CIAM-related security breach events that occurred in their organization in the preceding year
  • 15. CIAM Security Challenges © 2021 Enterprise Management Associates, Inc. 15 | @ema_research Percent of respondents from organizations that had experienced a breach event indicating consequences that occurred due to the incident
  • 16. CIAM Administration Challenges © 2021 Enterprise Management Associates, Inc. 16 | @ema_research Percent of respondents indicating how challenging specific CIAM issues are for their organization to administer
  • 17. CIAM Benefits © 2021 Enterprise Management Associates, Inc. 17 | @ema_research Percent of respondents indicating changes in key consumer responses since their organization adopted their current CIAM solution
  • 18. Improving Registration Rates © 2021 Enterprise Management Associates, Inc. 18 | @ema_research Average percentage of consumers visiting business websites who register or log in to specific online services offered by respondent's organization
  • 19. Improving Sales Conversion Rates © 2021 Enterprise Management Associates, Inc. 19 | @ema_research Average sales conversion rate reported by respondents from organizations adopting CIAM solutions supporting specific features
  • 20. Conclusions © 2021 Enterprise Management Associates, Inc. 20 • The adoption of CIAM solutions results in significant improvements to business performance and profitability. • However, improvement should be introduced to address increasing security breaches. • CIAM implementations should be strategic and should be key part of an overall security strategy. • EMA survey results clearly indicate that investing in a CIAM platform that offers low-friction consumer access features and end-to-end security assurance achieves quantifiable returns on investment. | @ema_research
  • 21. Get the report Learn more and get the report https://bit.ly/3kbxpZ9 © 2021 Enterprise Management Associates, Inc. 21 | @ema_research