SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
© 2016 ForgeRock. All rights reserved.
L’identité numérique : un atout
incontournable pour construire
une relation client
Leonard Moustacchis – 10 Mars 2016 – roomn
1
© 2016 ForgeRock. All rights reserved.
ForgeRock is the leading provider
of an Identity Platform helping
customers during their journey into
digital transformation
© 2016 ForgeRock. All rights reserved.
Digital Identity
3
© 2016 ForgeRock. All rights reserved.
Digital Identity
4
If I could embed a locator chip in my child right now,
I know I would do that. Some people call that Big Brother;
I call it being a father.
- Scott McNealy
“
”
© 2016 ForgeRock. All rights reserved.
User Identity
© 2016 ForgeRock. All rights reserved.
Iden%ty—The	New	Perimeter!	Users	are	
accessing	their	applica/ons	and	data	from	
anywhere,	any	/me,	with	a	myriad	of	devices	
which	creates	the	need	for	that	extra	
"iden/ty	layer”	
	
–	Oppenheimer,	RSA	Conference	Takeaways	2015
© 2016 ForgeRock. All rights reserved.
Life Insurance
Identity Attributes
Home Insurance
Identity Attributes
Auto Insurance
Identity Attributes
Boat Insurance
Identity Attributes
Daniel’s identity
data lives across
many BUs within
an organization
Flood Insurance
Identity Attributes
Earthquake Insurance
Identity Attributes
One Customer
Single Identity Profile FOR Customer Engagement
© 2016 ForgeRock. All rights reserved.
Domain 1
Domain 2
Domain 3
Prospect
IdentityAttributes
Identity Fuels
CRM Intelligence
Identity Fuels Marketing & Sales
Enrich The Sales Funnel with Identity Data
© 2016 ForgeRock. All rights reserved.
UserPhone
Tablet
Laptop
Home
Auto
Health
Smart City
Multi-Channel Engagement
Enable New Channels for Engagement
© 2016 ForgeRock. All rights reserved.
Car Seat
Mirror
Temperature
Daniel’s Identity Preferences
The Cloud
Daniel’s Car
Personalized Car
Steering Wheel
Music
Personalization
Create Sticky Offerings that Foster Customer Loyalty
© 2016 ForgeRock. All rights reserved.
Daniel
Mobile
Alarm
Car
Door
Oven
TV
Lights
KayoTaro
Evolving Relationships
Managing Constantly Changing Connections
© 2016 ForgeRock. All rights reserved.
Reg Code: 63456
Register Me The Cloud
User
User Experience
Identity Drives Customer’s First Experience
© 2016 ForgeRock. All rights reserved.
Come as you are !
•  Social login
•  Mobile login
•  Adaptive login
•  Adaptive Authorization
•  Continuous security
•  Smooth Self service
© 2016 ForgeRock. All rights reserved.
View my Health Data
Edit my Health Data
Download my Health Data
dr.phil@hc.com
Share
The Cloud
Daniel’s Privacy Controls
Daniel’s Wearable
Privacy & Consent
Offer Privacy as a Differentiating Feature!
© 2016 ForgeRock. All rights reserved.
Trust
15
© 2016 ForgeRock. All rights reserved. Whitehall IDM 2015 - 16
Building Consumer Trust: protecting personal data in the
consumer products industry, Deloitte University Press, 2014
80%of consumers are more likely to
purchases from consumer product
companies that they believe protect
their personal information
72%avoid purchasing brands from
consumer product companies that
they believe do not protect their
personal information
© 2016 ForgeRock. All rights reserved.
Share
17
© 2016 ForgeRock. All rights reserved.
The Digital
Transformation
The world is changing. We are moving from the
era of the Internet age into the participation age,
where everyone is on the Internet and everyone
is a publisher, an editor.
- Scott McNealy
“
”
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Businesses and governments need the
UMA standard to deliver Consent 2.0
successfully
© 2016 ForgeRock. All rights reserved.
What does UMA do for me?
UMA extends authorization of share or don’t share and includes fine-grained
controls
UMA – Fine-Grained Controls UMA – Watch Controls
© 2016 ForgeRock. All rights reserved.
Demo: https://www.youtube.com/watch?v=4nZ5DvCFp8U
© 2016 ForgeRock. All rights reserved.
ForgeRock helps you deliver
customer consent and delegation
capabilities for successful
digital transformation in a
privacy-sensitive world
© 2016 ForgeRock. All rights reserved.
Where to Follow us:
https://twitter.com/ForgeRock
http://www.linkedin.com/company/forgerock
https://www.youtube.com/user/ForgeRock
https://vimeo.com/forgerock
http://forgerock.com/resources/

Contenu connexe

Tendances

Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)ForgeRock
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity ForgeRock
 
Sydney Identity Summit: The Future's So Bright, I Gotta Wear Shades
Sydney Identity Summit: The Future's So Bright, I Gotta Wear ShadesSydney Identity Summit: The Future's So Bright, I Gotta Wear Shades
Sydney Identity Summit: The Future's So Bright, I Gotta Wear ShadesForgeRock
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotMassTLC
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitForgeRock
 
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...ForgeRock
 
Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience ForgeRock
 
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarForgeRock
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...ForgeRock
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitForgeRock
 
NYC Identity Summit Business Day: Continuous Security
NYC Identity Summit Business Day: Continuous SecurityNYC Identity Summit Business Day: Continuous Security
NYC Identity Summit Business Day: Continuous SecurityForgeRock
 
The Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauThe Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauKrowdthink
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsForgeRock
 
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...ForgeRock
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...ForgeRock
 
Sydney Identity Summit: Delivering A Winning Member Experience
Sydney Identity Summit: Delivering A Winning Member ExperienceSydney Identity Summit: Delivering A Winning Member Experience
Sydney Identity Summit: Delivering A Winning Member ExperienceForgeRock
 
NYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API SecurityNYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API SecurityForgeRock
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016ForgeRock
 

Tendances (20)

Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
Sydney Identity Summit: The Future's So Bright, I Gotta Wear Shades
Sydney Identity Summit: The Future's So Bright, I Gotta Wear ShadesSydney Identity Summit: The Future's So Bright, I Gotta Wear Shades
Sydney Identity Summit: The Future's So Bright, I Gotta Wear Shades
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity Summit
 
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
 
Pas d'IoT sans Identité!
Pas d'IoT sans Identité!Pas d'IoT sans Identité!
Pas d'IoT sans Identité!
 
Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience
 
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
 
NYC Identity Summit Business Day: Continuous Security
NYC Identity Summit Business Day: Continuous SecurityNYC Identity Summit Business Day: Continuous Security
NYC Identity Summit Business Day: Continuous Security
 
The Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauThe Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit Pau
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
 
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
 
Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...Identity Relationship Management - The Right Approach for a Complex Digital W...
Identity Relationship Management - The Right Approach for a Complex Digital W...
 
Sydney Identity Summit: Delivering A Winning Member Experience
Sydney Identity Summit: Delivering A Winning Member ExperienceSydney Identity Summit: Delivering A Winning Member Experience
Sydney Identity Summit: Delivering A Winning Member Experience
 
NYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API SecurityNYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API Security
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
 

En vedette

Influence without authority session handout
Influence without authority session handoutInfluence without authority session handout
Influence without authority session handoutLeadership AdvantEdge
 
Getting Results Without Authority - How Employees Influence Change and Create...
Getting Results Without Authority - How Employees Influence Change and Create...Getting Results Without Authority - How Employees Influence Change and Create...
Getting Results Without Authority - How Employees Influence Change and Create...Career Communications Group
 
Influence without authority
Influence without authorityInfluence without authority
Influence without authorityCareerShorts.com
 
How to Lead without Authority
How to Lead without AuthorityHow to Lead without Authority
How to Lead without AuthorityMukesh Gupta
 
Cultivating Leaders Throughout the Organization: Influencing without Authority
Cultivating Leaders Throughout the Organization: Influencing without AuthorityCultivating Leaders Throughout the Organization: Influencing without Authority
Cultivating Leaders Throughout the Organization: Influencing without AuthorityCareer Communications Group
 
Influence When You Have No Power or Authority
Influence When You Have No Power or AuthorityInfluence When You Have No Power or Authority
Influence When You Have No Power or AuthorityPeter Bromberg
 
The Joy of Herding Cats - Influence on Projects without Direct Authority
The Joy of Herding Cats - Influence on Projects without Direct AuthorityThe Joy of Herding Cats - Influence on Projects without Direct Authority
The Joy of Herding Cats - Influence on Projects without Direct AuthorityPatricia J. Williams, PMP
 
"Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb...
"Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb..."Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb...
"Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb...ProductTank TLV
 
Influence without Authority: Establishing and Transforming Power
Influence without Authority: Establishing and Transforming PowerInfluence without Authority: Establishing and Transforming Power
Influence without Authority: Establishing and Transforming PowerAndrea L. Ames
 
Influencing skills - Getting results without direct authority
Influencing skills - Getting results without direct authorityInfluencing skills - Getting results without direct authority
Influencing skills - Getting results without direct authorityThomas Petite
 
Persuasion: How to Influence Others
Persuasion: How to Influence OthersPersuasion: How to Influence Others
Persuasion: How to Influence OthersDaniel Crosby
 
Influence without Authority: Applying the Art of Motivation
Influence without Authority: Applying the Art of MotivationInfluence without Authority: Applying the Art of Motivation
Influence without Authority: Applying the Art of MotivationAndrea L. Ames
 
Influence without Authority
Influence without AuthorityInfluence without Authority
Influence without AuthorityNicole DeFalco
 
Managing Matrix Organization
Managing Matrix OrganizationManaging Matrix Organization
Managing Matrix Organizationinformusa
 
Influencing skills
Influencing skillsInfluencing skills
Influencing skillsAlan Barker
 
Leaders vs managers
Leaders vs managersLeaders vs managers
Leaders vs managersahmed Khan
 

En vedette (20)

Influence without authority session handout
Influence without authority session handoutInfluence without authority session handout
Influence without authority session handout
 
Getting Results Without Authority - How Employees Influence Change and Create...
Getting Results Without Authority - How Employees Influence Change and Create...Getting Results Without Authority - How Employees Influence Change and Create...
Getting Results Without Authority - How Employees Influence Change and Create...
 
Influence without authority
Influence without authorityInfluence without authority
Influence without authority
 
How to Lead without Authority
How to Lead without AuthorityHow to Lead without Authority
How to Lead without Authority
 
Cultivating Leaders Throughout the Organization: Influencing without Authority
Cultivating Leaders Throughout the Organization: Influencing without AuthorityCultivating Leaders Throughout the Organization: Influencing without Authority
Cultivating Leaders Throughout the Organization: Influencing without Authority
 
Influence When You Have No Power or Authority
Influence When You Have No Power or AuthorityInfluence When You Have No Power or Authority
Influence When You Have No Power or Authority
 
The Joy of Herding Cats - Influence on Projects without Direct Authority
The Joy of Herding Cats - Influence on Projects without Direct AuthorityThe Joy of Herding Cats - Influence on Projects without Direct Authority
The Joy of Herding Cats - Influence on Projects without Direct Authority
 
"Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb...
"Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb..."Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb...
"Leading without authority" - Meeka Metzger-Berman @ ProductTank Tel Aviv Feb...
 
Influence without Authority: Establishing and Transforming Power
Influence without Authority: Establishing and Transforming PowerInfluence without Authority: Establishing and Transforming Power
Influence without Authority: Establishing and Transforming Power
 
Leadership 101
Leadership 101Leadership 101
Leadership 101
 
Influencing skills - Getting results without direct authority
Influencing skills - Getting results without direct authorityInfluencing skills - Getting results without direct authority
Influencing skills - Getting results without direct authority
 
Influence Without Authority
Influence Without AuthorityInfluence Without Authority
Influence Without Authority
 
Persuasion: How to Influence Others
Persuasion: How to Influence OthersPersuasion: How to Influence Others
Persuasion: How to Influence Others
 
Influence without Authority: Applying the Art of Motivation
Influence without Authority: Applying the Art of MotivationInfluence without Authority: Applying the Art of Motivation
Influence without Authority: Applying the Art of Motivation
 
Influence without authority - ITMPI
Influence without authority - ITMPIInfluence without authority - ITMPI
Influence without authority - ITMPI
 
Influence without Authority
Influence without AuthorityInfluence without Authority
Influence without Authority
 
Managing Matrix Organization
Managing Matrix OrganizationManaging Matrix Organization
Managing Matrix Organization
 
Influencing skills
Influencing skillsInfluencing skills
Influencing skills
 
Leaders vs managers
Leaders vs managersLeaders vs managers
Leaders vs managers
 
Leaders vs. managers
Leaders vs. managersLeaders vs. managers
Leaders vs. managers
 

Similaire à L’identité numérique : un atout incontournable pour construire une relation client

LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]
LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]
LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]getadministrate
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Wavestone forgerock banking demo
Wavestone forgerock banking demoWavestone forgerock banking demo
Wavestone forgerock banking demoBertrand Carlier
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?jennyhollingworth
 
IoT and the Wisdom of Mobile
IoT and the Wisdom of MobileIoT and the Wisdom of Mobile
IoT and the Wisdom of MobileGuerrillaQA
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation CenterForgeRock
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarForgeRock
 
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...ForgeRock
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 FinalGet up to Speed
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCA Technologies
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Lean Innovation in Insurance with Cognizant Digital Foundry
Lean Innovation in Insurance with Cognizant Digital FoundryLean Innovation in Insurance with Cognizant Digital Foundry
Lean Innovation in Insurance with Cognizant Digital FoundryVMware Tanzu
 

Similaire à L’identité numérique : un atout incontournable pour construire une relation client (20)

LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]
LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]
LITE 2016 – How Administrate Changed our Training Business [Kevin Streater]
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Wavestone forgerock banking demo
Wavestone forgerock banking demoWavestone forgerock banking demo
Wavestone forgerock banking demo
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
SafeJunctionr8 2016
SafeJunctionr8 2016SafeJunctionr8 2016
SafeJunctionr8 2016
 
Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?Digitization - What Does This Mean to Internal Audit?
Digitization - What Does This Mean to Internal Audit?
 
IoT and the Wisdom of Mobile
IoT and the Wisdom of MobileIoT and the Wisdom of Mobile
IoT and the Wisdom of Mobile
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 Final
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
Safe junction6 6-2016
Safe junction6 6-2016Safe junction6 6-2016
Safe junction6 6-2016
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Lean Innovation in Insurance with Cognizant Digital Foundry
Lean Innovation in Insurance with Cognizant Digital FoundryLean Innovation in Insurance with Cognizant Digital Foundry
Lean Innovation in Insurance with Cognizant Digital Foundry
 

Plus de Leonard Moustacchis

De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 Leonard Moustacchis
 
Facebook data breach and OAuth2
   Facebook data breach and OAuth2   Facebook data breach and OAuth2
Facebook data breach and OAuth2Leonard Moustacchis
 
Intelligent authentication Identity tech talks
Intelligent authentication Identity  tech talksIntelligent authentication Identity  tech talks
Intelligent authentication Identity tech talksLeonard Moustacchis
 
Blockchain et ses cas d'usages - Identity Tech Talk#10
Blockchain et ses cas d'usages - Identity Tech Talk#10 Blockchain et ses cas d'usages - Identity Tech Talk#10
Blockchain et ses cas d'usages - Identity Tech Talk#10 Leonard Moustacchis
 
iProov et Biométrie Identity Tech Talk #10
iProov et Biométrie Identity Tech Talk #10iProov et Biométrie Identity Tech Talk #10
iProov et Biométrie Identity Tech Talk #10Leonard Moustacchis
 
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...Leonard Moustacchis
 
201707 dsp2 standards, sécurité, quels impacts - wavestone
201707   dsp2 standards, sécurité, quels impacts - wavestone201707   dsp2 standards, sécurité, quels impacts - wavestone
201707 dsp2 standards, sécurité, quels impacts - wavestoneLeonard Moustacchis
 
Quels sont les enjeux de la réglementation GDPR
Quels sont les enjeux de la réglementation GDPRQuels sont les enjeux de la réglementation GDPR
Quels sont les enjeux de la réglementation GDPRLeonard Moustacchis
 
Présentation de UMA (User Managed Access)
Présentation de UMA (User Managed Access)Présentation de UMA (User Managed Access)
Présentation de UMA (User Managed Access)Leonard Moustacchis
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationLeonard Moustacchis
 
Mon Raspberry PI a une identité !
Mon Raspberry PI a une identité !  Mon Raspberry PI a une identité !
Mon Raspberry PI a une identité ! Leonard Moustacchis
 
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...Leonard Moustacchis
 
Valorisez votre écosystème d'identités
Valorisez votre écosystème d'identitésValorisez votre écosystème d'identités
Valorisez votre écosystème d'identitésLeonard Moustacchis
 

Plus de Leonard Moustacchis (19)

Identity verification and AI
Identity verification and AIIdentity verification and AI
Identity verification and AI
 
De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
Facebook data breach and OAuth2
   Facebook data breach and OAuth2   Facebook data breach and OAuth2
Facebook data breach and OAuth2
 
Identity techtalk orange
Identity techtalk orangeIdentity techtalk orange
Identity techtalk orange
 
Intelligent authentication Identity tech talks
Intelligent authentication Identity  tech talksIntelligent authentication Identity  tech talks
Intelligent authentication Identity tech talks
 
Blockchain et ses cas d'usages - Identity Tech Talk#10
Blockchain et ses cas d'usages - Identity Tech Talk#10 Blockchain et ses cas d'usages - Identity Tech Talk#10
Blockchain et ses cas d'usages - Identity Tech Talk#10
 
iProov et Biométrie Identity Tech Talk #10
iProov et Biométrie Identity Tech Talk #10iProov et Biométrie Identity Tech Talk #10
iProov et Biométrie Identity Tech Talk #10
 
Microservice et identité
Microservice et identitéMicroservice et identité
Microservice et identité
 
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
 
201707 dsp2 standards, sécurité, quels impacts - wavestone
201707   dsp2 standards, sécurité, quels impacts - wavestone201707   dsp2 standards, sécurité, quels impacts - wavestone
201707 dsp2 standards, sécurité, quels impacts - wavestone
 
Identité et Automobile
Identité et AutomobileIdentité et Automobile
Identité et Automobile
 
Meetup devops
Meetup devopsMeetup devops
Meetup devops
 
Quels sont les enjeux de la réglementation GDPR
Quels sont les enjeux de la réglementation GDPRQuels sont les enjeux de la réglementation GDPR
Quels sont les enjeux de la réglementation GDPR
 
Présentation de UMA (User Managed Access)
Présentation de UMA (User Managed Access)Présentation de UMA (User Managed Access)
Présentation de UMA (User Managed Access)
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 
Mon Raspberry PI a une identité !
Mon Raspberry PI a une identité !  Mon Raspberry PI a une identité !
Mon Raspberry PI a une identité !
 
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
 
Valorisez votre écosystème d'identités
Valorisez votre écosystème d'identitésValorisez votre écosystème d'identités
Valorisez votre écosystème d'identités
 

Dernier

Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...soumyapottola
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Deliveryrishi338139
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityApp Ethena
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptxerickamwana1
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08LloydHelferty
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Sebastiano Panichella
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per MVidyaAdsule1
 

Dernier (14)

Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Delivery
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per M
 

L’identité numérique : un atout incontournable pour construire une relation client

  • 1. © 2016 ForgeRock. All rights reserved. L’identité numérique : un atout incontournable pour construire une relation client Leonard Moustacchis – 10 Mars 2016 – roomn 1
  • 2. © 2016 ForgeRock. All rights reserved. ForgeRock is the leading provider of an Identity Platform helping customers during their journey into digital transformation
  • 3. © 2016 ForgeRock. All rights reserved. Digital Identity 3
  • 4. © 2016 ForgeRock. All rights reserved. Digital Identity 4 If I could embed a locator chip in my child right now, I know I would do that. Some people call that Big Brother; I call it being a father. - Scott McNealy “ ”
  • 5. © 2016 ForgeRock. All rights reserved. User Identity
  • 6. © 2016 ForgeRock. All rights reserved. Iden%ty—The New Perimeter! Users are accessing their applica/ons and data from anywhere, any /me, with a myriad of devices which creates the need for that extra "iden/ty layer” – Oppenheimer, RSA Conference Takeaways 2015
  • 7. © 2016 ForgeRock. All rights reserved. Life Insurance Identity Attributes Home Insurance Identity Attributes Auto Insurance Identity Attributes Boat Insurance Identity Attributes Daniel’s identity data lives across many BUs within an organization Flood Insurance Identity Attributes Earthquake Insurance Identity Attributes One Customer Single Identity Profile FOR Customer Engagement
  • 8. © 2016 ForgeRock. All rights reserved. Domain 1 Domain 2 Domain 3 Prospect IdentityAttributes Identity Fuels CRM Intelligence Identity Fuels Marketing & Sales Enrich The Sales Funnel with Identity Data
  • 9. © 2016 ForgeRock. All rights reserved. UserPhone Tablet Laptop Home Auto Health Smart City Multi-Channel Engagement Enable New Channels for Engagement
  • 10. © 2016 ForgeRock. All rights reserved. Car Seat Mirror Temperature Daniel’s Identity Preferences The Cloud Daniel’s Car Personalized Car Steering Wheel Music Personalization Create Sticky Offerings that Foster Customer Loyalty
  • 11. © 2016 ForgeRock. All rights reserved. Daniel Mobile Alarm Car Door Oven TV Lights KayoTaro Evolving Relationships Managing Constantly Changing Connections
  • 12. © 2016 ForgeRock. All rights reserved. Reg Code: 63456 Register Me The Cloud User User Experience Identity Drives Customer’s First Experience
  • 13. © 2016 ForgeRock. All rights reserved. Come as you are ! •  Social login •  Mobile login •  Adaptive login •  Adaptive Authorization •  Continuous security •  Smooth Self service
  • 14. © 2016 ForgeRock. All rights reserved. View my Health Data Edit my Health Data Download my Health Data dr.phil@hc.com Share The Cloud Daniel’s Privacy Controls Daniel’s Wearable Privacy & Consent Offer Privacy as a Differentiating Feature!
  • 15. © 2016 ForgeRock. All rights reserved. Trust 15
  • 16. © 2016 ForgeRock. All rights reserved. Whitehall IDM 2015 - 16 Building Consumer Trust: protecting personal data in the consumer products industry, Deloitte University Press, 2014 80%of consumers are more likely to purchases from consumer product companies that they believe protect their personal information 72%avoid purchasing brands from consumer product companies that they believe do not protect their personal information
  • 17. © 2016 ForgeRock. All rights reserved. Share 17
  • 18. © 2016 ForgeRock. All rights reserved. The Digital Transformation The world is changing. We are moving from the era of the Internet age into the participation age, where everyone is on the Internet and everyone is a publisher, an editor. - Scott McNealy “ ”
  • 19. © 2016 ForgeRock. All rights reserved.
  • 20. © 2016 ForgeRock. All rights reserved. Businesses and governments need the UMA standard to deliver Consent 2.0 successfully
  • 21. © 2016 ForgeRock. All rights reserved. What does UMA do for me? UMA extends authorization of share or don’t share and includes fine-grained controls UMA – Fine-Grained Controls UMA – Watch Controls
  • 22. © 2016 ForgeRock. All rights reserved. Demo: https://www.youtube.com/watch?v=4nZ5DvCFp8U
  • 23. © 2016 ForgeRock. All rights reserved. ForgeRock helps you deliver customer consent and delegation capabilities for successful digital transformation in a privacy-sensitive world
  • 24. © 2016 ForgeRock. All rights reserved. Where to Follow us: https://twitter.com/ForgeRock http://www.linkedin.com/company/forgerock https://www.youtube.com/user/ForgeRock https://vimeo.com/forgerock http://forgerock.com/resources/