SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Brought to you by
INTERNAL VS. EXTERNAL IAM:
Strategies to Develop an End-to-End
Customer Data Management
Framework
GIGYA.COM | 2
Long ago, companies recognized the importance of effectively managing employee identities, data and
permissions to help streamline company processes and protect valuable business assets.
Over the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has
created the need for businesses to develop an external identity access management (IAM) strategy to
keep up with the flood of identity data being created as consumers connect across channels.
54 percent of companies have difficulty managing and integrating data from today’s
many varied sources, while 50 percent are concerned about consistent data quality
(DestinationCRM).
The Rise of External IAM
GIGYA.COM |
IAM vs CIAM
Unprepared for and unfamiliar with the challenges of external identity management, many businesses
have attempted to scale internal IAM solutions for external identity management purposes.
But successfully capturing, protecting and leveraging customer identity data requires a whole new set
of tools and technologies built for the customer identity access management (CIAM) era.
We’ve broken down the key differences between traditional IAM and cIAM and the steps you can take
to optimize your external strategy into 3 buckets:
Scalability & Security
Data Collection & Aggregation
Privacy & Compliance
3
SCALABILITY & SECURITY
GIGYA.COM |
100 x 100,000
5
BOTTOM LINE:
External IAM software must be highly scalable with the ability to effectively store
and manage millions of consumer identities at once.
The #1 reason why businesses attempting to leverage internal IAM solutions for external purposes fail is
simple: sheer scale. While companies typically manage tens, hundreds, or at most thousands of employee
identities, the number of customer identities can range well into the billions.
GIGYA.COM | 6
When it comes to employee identity and data created within internal applications, ownership indisputably
belongs to the business. However, customer identities created across sites and applications ultimately
belong to consumers.
But while brands must gain permission to capture and collect consumer identity data, once a customer is
on a business’ property and her information is stored in its database, that business is responsible for
protecting her. This gives way to a whole other management issue: security.
Account Ownership
GIGYA.COM | 7
11% of US adults admit to having abandoned an online purchase
because the site asked for too much information (Forrester).
Protecting identity from an internal standpoint is somewhat straightforward, as your business has the power to
enforce certain protocol to help safeguard business and employee information. But customers are consistently
creating new identities and reusing usernames and passwords across millions of unknown properties.
While requiring users to fill in CAPTCHA, select 3 security questions and verify the last 4 digits of their social
security numbers is one way to help guarantee security on your site, it’s certainly not the most practical.
Usability vs. Security
Businesses must put the proper framework in place to provide customers with a positive, seamless user
experience, while still maintaining security standards from both a data collection and storage perspective.
GIGYA.COM | 8
On average, Gigya Social Login clients increase registration
conversion rates by 32.3%, with clients like Forbes gaining
as much as a 90% increase.
Implementing social login across your web properties is one strategy for
bridging the gap between usability and security. Social login gives
consumers the ability to verify their identities with the click of a button using
their existing social media accounts, increasing registration conversion rates
by as much as 90%.
Social Login as a Solution
Social login also shifts the burden of identity protection, data security and sign-
in support to major networks like Facebook and Google. These social identity
providers boast state-of-the-art security systems with features like multi-factor
authentication, remote logout and unauthorized activity detection.
GIGYA.COM | 9
To improve company security and employee convenience, many
businesses leverage single sign-on (SSO), which allows
employees to move seamlessly across internal applications by
tying all activity to a single, known username and password. As
web-based services and applications multiply, SSO is gaining
momentum across customer-facing properties as well.
Internal federation is typically delivered as an on-premise solution
for internal enterprise applications using SAML standard. In
contrast, external IAM solutions must bundle together internal and
external applications and properties, which often requires a
variation of SSO standards including OAuth, OpenID and SAML.
When it comes to CIAM, it’s important to adopt software that gives
you the flexibility to choose the SSO standard that meets your
business’ user experience and security needs.
Federating Identity
DATA COLLECTION & AGGREGATION
GIGYA.COM | 11
As a general rule, company
and employee data is treated
as a liability, with internal IAM
solutions primarily seeking to
secure this information. While
external identity must also be
protected, consumer data has
quickly become every
business’ biggest asset - and
there is a LOT of it.
Over 2.5 exabytes of data are
created every single day
(HBR), and more than 90% of
this “big data” is unstructured
(BusinessInsider).
Identity Data = Pure Gold
TODAY’S DATA GOLDMINE
GIGYA.COM | 12
Internal data is traditionally structured and
controlled, with your business defining the
necessary fixed fields and models. But with
such a huge volume of data and number of
sources, capturing and storing external,
unstructured data in an accurate and
organized manner can be a nightmare.
What happens when a new social network
arrives on the scene? Or customers begin
sharing new types of content? Unstructured
data sources and points like these require
major database updates that cost your
business serious development time and
resources.
Big Data, Bigger Challenge
WHERE DOES BIG DATA COME FROM?
(IBM)
GIGYA.COM | 13
Businesses cite the inability to automate
structured and unstructured data quickly
and effectively among their biggest
challenges, with 60% noting that big data
projects typically take at least 18 months to
complete (Kapow Software).
CIAM calls for a dynamic database with the
ability to effectively normalize data from
disparate sources in real-time. This database
must have the power to reconcile both
structured and unstructured data without the
need to preconfigure database fields.
Data Normalization
GIGYA.COM | 14
With data pouring in across digital, mobile and social channels, it can often get caught in disparate silos
across the organization. This, of course, results in a completely disjointed and disorganized view of your
customer base and individual consumer identities.
A recent Aberdeen study found that 4 in 10 companies say that data remains “siloed” and inaccessible for
analysis. Ultimately, less than ¼ of the information that companies control is even available for extracting
insights (WSJ).
Data Here, There, and Everywhere
GIGYA.COM | 15
While capturing customer identity via solutions like social
login is the first step to unifying individual customer actions
and behaviors across channels, this data is virtually
useless if it is not aggregated into a single repository of
truth.
Ensure that your master database has the ability to directly
integrate and bidirectionally synch with existing business
systems and third-party marketing platforms.
This means selecting a solution equipped to handle and
automatically index any type of data thrown your way,
including social, transactional, behavioral, and much more.
Break Down Data Silos
GIGYA.COM | 16
Establishing a “single repository of truth” is the foundation of an effective CIAM strategy. Of equal importance
is ensuring that this repository is structured in a way that empowers business leaders across the organization
to take action on the goldmine of data housed inside.
Data In, Data Out
93% of executives believe their organization is losing an average of 14% of annual
revenue without the ability to act on the customer data they collect (Oracle).
GIGYA.COM | 17
Improve business agility with a database that seamlessly connects to a corresponding web-based dashboard,
and gives business leaders an actionable view of end-user data based on roles and permissions.
This allows non-technical decision makers to run complex queries based on any number of indexed attributes,
build custom audience segments with no code required, and save and export key reports.
By providing those on the frontlines of your business with the ability to extract and harness the economic value
of customer identity, you save valuable IT time and resources while improving the timeliness and efficacy of
business-wide operations.
Turning Data into Action
PRIVACY & COMPLIANCE
GIGYA.COM |
Privacy, Please
While internal data privacy is managed centrally and based primarily on policies put into place by the
business itself, external data privacy is much messier.
When it comes to managing customer identities and data, your business must adhere to the privacy
policies created by countless lawmakers and third-party identity providers. This list of regulations is
exhaustive and constantly evolving, with current policies including:
Electronic Communications Policy Act
European Union Directive
Fair Credit Reporting Act
Federal Trade Commission Act
Payment Card Industry Data Security Standard
19
GIGYA.COM |
Keeping Up with Compliance
Gartner predicts that by the end of 2015, 50% of new
retail customer identities will be based on consumers’
social network profiles, compared to just 5% in 2013.
Social login is quickly becoming the preferred method of
authentication for customers, which means a big
challenge for IT execs trying to keep up with ever-
changing social network data privacy policies.
As you begin to incorporate registration systems and
social login across your external facing sites and apps,
make sure that you choose a provider that can take on
the burden of managing these privacy updates. Look for
solutions that provide automatic, real-time API updates to
reflect policy and account changes, such as auto-
deletion of non-basic account information when
application permissions are revoked.
20
GIGYA.COM | 21
As we mentioned earlier, CIAM also raises the issue of data ownership. Internal identities are created by the
business, and when an employee creates data during work hours, on a business-owned device or within a
company application, this data belongs to that business.
However, as a customer moves across the Internet on an owned device leveraging services and applications
for personal use, this data belongs to her, and any business looking to access said data should do so in a
transparent and permission-based manner.
Data Ownership
DID YOU KNOW?
71% of consumers state that they are very concerned about online companies
selling or sharing information about them without their permission (Consumer
Reports).
GIGYA.COM | 22
Be sure that your business’ data collection process is completely transparent. No matter the method you
choose, let customers know upfront that you are looking to access their identities and specific data points.
The Power of Permission
Provide your customers the option to
authorize or opt-out of these requests,
and give them the power to view and
update privacy settings at any time via
straightforward user management
controls.
Building your CIAM process on
transparent data collection practices
ensures that your business is upholding
the highest standards of data governance
and leveraging only the highest quality
data.
ABOUT GIGYA
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning
unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations
and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products
and experiences by integrating data into marketing and service applications.
Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern
marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable
registration, authentication, profile management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven
relationships and to provide scalable, secure Customer Identity Management.
For more details about Gigya, visit www.gigya.com.
© 2014 Gigya Incorporated. All rights reserved.
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the
United States and/or other countries. All other trademarks are the property of their respective owners.
Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients
and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client
granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its
clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.
To learn how Gigya can help provide you with the tools and technology needed to develop a successful
CIAM strategy, visit gigya.com or call us at 888.660.1469.

Contenu connexe

Tendances

White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationGigya
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, ConvertGigya
 
Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management marketAllied Market Research
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementGigya
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMGigya
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CloudIDSummit
 
Data Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceData Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceGigya
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity managementshivan82
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaGigya
 
The Marketer's Guide to Social ROI
The Marketer's Guide to Social ROIThe Marketer's Guide to Social ROI
The Marketer's Guide to Social ROIJeremy Schmidt
 
The Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersThe Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersCognizant
 
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...UK Government Digital Service
 
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Gigya
 
2019 Digital Trends Financial Services
2019 Digital Trends Financial Services2019 Digital Trends Financial Services
2019 Digital Trends Financial ServicesJames Brophy
 
2011 120211 Gartner Predictions 253709
2011 120211 Gartner Predictions 2537092011 120211 Gartner Predictions 253709
2011 120211 Gartner Predictions 253709Gregory Pence
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsHappiest Minds Technologies
 

Tendances (19)

White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & Personalization
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management market
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity Management
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAM
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
Data Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceData Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX Marketplace
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
 
The Marketer's Guide to Social ROI
The Marketer's Guide to Social ROIThe Marketer's Guide to Social ROI
The Marketer's Guide to Social ROI
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
The Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersThe Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant Acquirers
 
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
 
2014 phillyForce keynote
2014 phillyForce keynote2014 phillyForce keynote
2014 phillyForce keynote
 
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
2019 Digital Trends Financial Services
2019 Digital Trends Financial Services2019 Digital Trends Financial Services
2019 Digital Trends Financial Services
 
2011 120211 Gartner Predictions 253709
2011 120211 Gartner Predictions 2537092011 120211 Gartner Predictions 253709
2011 120211 Gartner Predictions 253709
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 

En vedette

White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationGigya
 
Inside/Outside - the winchester housing challenge
Inside/Outside - the winchester housing challengeInside/Outside - the winchester housing challenge
Inside/Outside - the winchester housing challengePaul Bulkeley
 
APIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business InnovationAPIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business InnovationWSO2
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Managementyisbat
 
Ndh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-onNdh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-onndhsshare1
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and MobileForgeRock
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud - Infosecurity2010
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 

En vedette (14)

White Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & PersonalizationWhite Paper: The 2015 State of Consumer Privacy & Personalization
White Paper: The 2015 State of Consumer Privacy & Personalization
 
Inside/Outside - the winchester housing challenge
Inside/Outside - the winchester housing challengeInside/Outside - the winchester housing challenge
Inside/Outside - the winchester housing challenge
 
Understanding Your Business
Understanding Your BusinessUnderstanding Your Business
Understanding Your Business
 
APIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business InnovationAPIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business Innovation
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Management
 
Ndh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-onNdh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-on
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud - Stephan Hendriks Eric IJpelaar - Identity  access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 

Similaire à Develop a Customer Data Management Framework with Internal and External IAM

White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTPoulomiMukherjee12
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertIan Gilbert
 
Big Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White PaperBig Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White PaperExperian
 
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Cognizant
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationCognizant
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Modernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsModernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsCognizant
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial servicesWhite & Case
 
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMData Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMGigya
 
Data Sheet: Why Gigya's Profile Management
Data Sheet: Why Gigya's Profile ManagementData Sheet: Why Gigya's Profile Management
Data Sheet: Why Gigya's Profile ManagementGigya
 
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdfwhat-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdfTemok IT Services
 
Big-Data-The-Case-for-Customer-Experience
Big-Data-The-Case-for-Customer-ExperienceBig-Data-The-Case-for-Customer-Experience
Big-Data-The-Case-for-Customer-ExperienceAndrew Smith
 
Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015Elaine Sun
 
13 reasons why your business needs ai
13 reasons why your business needs ai13 reasons why your business needs ai
13 reasons why your business needs aiPayjo
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 

Similaire à Develop a Customer Data Management Framework with Internal and External IAM (20)

White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
 
Big Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White PaperBig Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White Paper
 
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive Innovation
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Modernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsModernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent Decisions
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
 
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMData Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAM
 
Data Sheet: Why Gigya's Profile Management
Data Sheet: Why Gigya's Profile ManagementData Sheet: Why Gigya's Profile Management
Data Sheet: Why Gigya's Profile Management
 
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdfwhat-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
 
Big-Data-The-Case-for-Customer-Experience
Big-Data-The-Case-for-Customer-ExperienceBig-Data-The-Case-for-Customer-Experience
Big-Data-The-Case-for-Customer-Experience
 
Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015
 
13 reasons why your business needs ai
13 reasons why your business needs ai13 reasons why your business needs ai
13 reasons why your business needs ai
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 

Plus de Gigya

White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityGigya
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceGigya
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchGigya
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanGigya
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel ClubGigya
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate OverviewGigya
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGigya
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)Gigya
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)Gigya
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG CompanyGigya
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyGigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media CompanyGigya
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyGigya
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data PrivacyGigya
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy PracticesGigya
 

Plus de Gigya (20)

White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy Practices
 

Dernier

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Develop a Customer Data Management Framework with Internal and External IAM

  • 1. Brought to you by INTERNAL VS. EXTERNAL IAM: Strategies to Develop an End-to-End Customer Data Management Framework
  • 2. GIGYA.COM | 2 Long ago, companies recognized the importance of effectively managing employee identities, data and permissions to help streamline company processes and protect valuable business assets. Over the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has created the need for businesses to develop an external identity access management (IAM) strategy to keep up with the flood of identity data being created as consumers connect across channels. 54 percent of companies have difficulty managing and integrating data from today’s many varied sources, while 50 percent are concerned about consistent data quality (DestinationCRM). The Rise of External IAM
  • 3. GIGYA.COM | IAM vs CIAM Unprepared for and unfamiliar with the challenges of external identity management, many businesses have attempted to scale internal IAM solutions for external identity management purposes. But successfully capturing, protecting and leveraging customer identity data requires a whole new set of tools and technologies built for the customer identity access management (CIAM) era. We’ve broken down the key differences between traditional IAM and cIAM and the steps you can take to optimize your external strategy into 3 buckets: Scalability & Security Data Collection & Aggregation Privacy & Compliance 3
  • 5. GIGYA.COM | 100 x 100,000 5 BOTTOM LINE: External IAM software must be highly scalable with the ability to effectively store and manage millions of consumer identities at once. The #1 reason why businesses attempting to leverage internal IAM solutions for external purposes fail is simple: sheer scale. While companies typically manage tens, hundreds, or at most thousands of employee identities, the number of customer identities can range well into the billions.
  • 6. GIGYA.COM | 6 When it comes to employee identity and data created within internal applications, ownership indisputably belongs to the business. However, customer identities created across sites and applications ultimately belong to consumers. But while brands must gain permission to capture and collect consumer identity data, once a customer is on a business’ property and her information is stored in its database, that business is responsible for protecting her. This gives way to a whole other management issue: security. Account Ownership
  • 7. GIGYA.COM | 7 11% of US adults admit to having abandoned an online purchase because the site asked for too much information (Forrester). Protecting identity from an internal standpoint is somewhat straightforward, as your business has the power to enforce certain protocol to help safeguard business and employee information. But customers are consistently creating new identities and reusing usernames and passwords across millions of unknown properties. While requiring users to fill in CAPTCHA, select 3 security questions and verify the last 4 digits of their social security numbers is one way to help guarantee security on your site, it’s certainly not the most practical. Usability vs. Security Businesses must put the proper framework in place to provide customers with a positive, seamless user experience, while still maintaining security standards from both a data collection and storage perspective.
  • 8. GIGYA.COM | 8 On average, Gigya Social Login clients increase registration conversion rates by 32.3%, with clients like Forbes gaining as much as a 90% increase. Implementing social login across your web properties is one strategy for bridging the gap between usability and security. Social login gives consumers the ability to verify their identities with the click of a button using their existing social media accounts, increasing registration conversion rates by as much as 90%. Social Login as a Solution Social login also shifts the burden of identity protection, data security and sign- in support to major networks like Facebook and Google. These social identity providers boast state-of-the-art security systems with features like multi-factor authentication, remote logout and unauthorized activity detection.
  • 9. GIGYA.COM | 9 To improve company security and employee convenience, many businesses leverage single sign-on (SSO), which allows employees to move seamlessly across internal applications by tying all activity to a single, known username and password. As web-based services and applications multiply, SSO is gaining momentum across customer-facing properties as well. Internal federation is typically delivered as an on-premise solution for internal enterprise applications using SAML standard. In contrast, external IAM solutions must bundle together internal and external applications and properties, which often requires a variation of SSO standards including OAuth, OpenID and SAML. When it comes to CIAM, it’s important to adopt software that gives you the flexibility to choose the SSO standard that meets your business’ user experience and security needs. Federating Identity
  • 10. DATA COLLECTION & AGGREGATION
  • 11. GIGYA.COM | 11 As a general rule, company and employee data is treated as a liability, with internal IAM solutions primarily seeking to secure this information. While external identity must also be protected, consumer data has quickly become every business’ biggest asset - and there is a LOT of it. Over 2.5 exabytes of data are created every single day (HBR), and more than 90% of this “big data” is unstructured (BusinessInsider). Identity Data = Pure Gold TODAY’S DATA GOLDMINE
  • 12. GIGYA.COM | 12 Internal data is traditionally structured and controlled, with your business defining the necessary fixed fields and models. But with such a huge volume of data and number of sources, capturing and storing external, unstructured data in an accurate and organized manner can be a nightmare. What happens when a new social network arrives on the scene? Or customers begin sharing new types of content? Unstructured data sources and points like these require major database updates that cost your business serious development time and resources. Big Data, Bigger Challenge WHERE DOES BIG DATA COME FROM? (IBM)
  • 13. GIGYA.COM | 13 Businesses cite the inability to automate structured and unstructured data quickly and effectively among their biggest challenges, with 60% noting that big data projects typically take at least 18 months to complete (Kapow Software). CIAM calls for a dynamic database with the ability to effectively normalize data from disparate sources in real-time. This database must have the power to reconcile both structured and unstructured data without the need to preconfigure database fields. Data Normalization
  • 14. GIGYA.COM | 14 With data pouring in across digital, mobile and social channels, it can often get caught in disparate silos across the organization. This, of course, results in a completely disjointed and disorganized view of your customer base and individual consumer identities. A recent Aberdeen study found that 4 in 10 companies say that data remains “siloed” and inaccessible for analysis. Ultimately, less than ¼ of the information that companies control is even available for extracting insights (WSJ). Data Here, There, and Everywhere
  • 15. GIGYA.COM | 15 While capturing customer identity via solutions like social login is the first step to unifying individual customer actions and behaviors across channels, this data is virtually useless if it is not aggregated into a single repository of truth. Ensure that your master database has the ability to directly integrate and bidirectionally synch with existing business systems and third-party marketing platforms. This means selecting a solution equipped to handle and automatically index any type of data thrown your way, including social, transactional, behavioral, and much more. Break Down Data Silos
  • 16. GIGYA.COM | 16 Establishing a “single repository of truth” is the foundation of an effective CIAM strategy. Of equal importance is ensuring that this repository is structured in a way that empowers business leaders across the organization to take action on the goldmine of data housed inside. Data In, Data Out 93% of executives believe their organization is losing an average of 14% of annual revenue without the ability to act on the customer data they collect (Oracle).
  • 17. GIGYA.COM | 17 Improve business agility with a database that seamlessly connects to a corresponding web-based dashboard, and gives business leaders an actionable view of end-user data based on roles and permissions. This allows non-technical decision makers to run complex queries based on any number of indexed attributes, build custom audience segments with no code required, and save and export key reports. By providing those on the frontlines of your business with the ability to extract and harness the economic value of customer identity, you save valuable IT time and resources while improving the timeliness and efficacy of business-wide operations. Turning Data into Action
  • 19. GIGYA.COM | Privacy, Please While internal data privacy is managed centrally and based primarily on policies put into place by the business itself, external data privacy is much messier. When it comes to managing customer identities and data, your business must adhere to the privacy policies created by countless lawmakers and third-party identity providers. This list of regulations is exhaustive and constantly evolving, with current policies including: Electronic Communications Policy Act European Union Directive Fair Credit Reporting Act Federal Trade Commission Act Payment Card Industry Data Security Standard 19
  • 20. GIGYA.COM | Keeping Up with Compliance Gartner predicts that by the end of 2015, 50% of new retail customer identities will be based on consumers’ social network profiles, compared to just 5% in 2013. Social login is quickly becoming the preferred method of authentication for customers, which means a big challenge for IT execs trying to keep up with ever- changing social network data privacy policies. As you begin to incorporate registration systems and social login across your external facing sites and apps, make sure that you choose a provider that can take on the burden of managing these privacy updates. Look for solutions that provide automatic, real-time API updates to reflect policy and account changes, such as auto- deletion of non-basic account information when application permissions are revoked. 20
  • 21. GIGYA.COM | 21 As we mentioned earlier, CIAM also raises the issue of data ownership. Internal identities are created by the business, and when an employee creates data during work hours, on a business-owned device or within a company application, this data belongs to that business. However, as a customer moves across the Internet on an owned device leveraging services and applications for personal use, this data belongs to her, and any business looking to access said data should do so in a transparent and permission-based manner. Data Ownership DID YOU KNOW? 71% of consumers state that they are very concerned about online companies selling or sharing information about them without their permission (Consumer Reports).
  • 22. GIGYA.COM | 22 Be sure that your business’ data collection process is completely transparent. No matter the method you choose, let customers know upfront that you are looking to access their identities and specific data points. The Power of Permission Provide your customers the option to authorize or opt-out of these requests, and give them the power to view and update privacy settings at any time via straightforward user management controls. Building your CIAM process on transparent data collection practices ensures that your business is upholding the highest standards of data governance and leveraging only the highest quality data.
  • 23. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. © 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/. To learn how Gigya can help provide you with the tools and technology needed to develop a successful CIAM strategy, visit gigya.com or call us at 888.660.1469.