SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
TMFORUM MANAGEMENT WORLD
IDENTITY AS A SERVICE
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Consumer Identity Management
5/14/2013 2
Fortune 1000
Employees
62 million IDs
$4B market
Facebook Users
1 billion IDs
Mobile Subscribers
5.2 billion IDs
Citizens
7.0 billion
Consumer Identity
100+ billion IDs
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
The Basics - What is an Identity?
…a unique person, product, or device
– All the data/attributes associated with it—dynamic (location) and static (gender)
– Across all channels (In store, Online, Mobile)
5/14/2013 3
In Store experience
Shopping for X category and comparing Y
products, adding Z products to the basket
Online experience
Searching retailer website for X category
of products with Y features and Z price
Mobile experience
Surfing for price comparisons, reviews,
and features on X products at Y location
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity = Personal Data
5/14/2013 4
Individual
Preferences
 Favorite brands
 Taste in music
 Interests
 …
Acquired
Attributes
 Address
 Medical record
 Purchase history
 …
Inherent
Characteristics
 Date of birth
 Gender
 Nationality
 …
What does
she like?
What did
she do?
What does
she come
from?
Digital Identity
Sum of all the
digitally available
data about an
individual
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity as Enabler, Currency, and Product
• Identity drives revenue by serving 3
roles:
– Enabler: companies are building
rich, personalized products and
services
– Currency: users can trade their
identity data for value
– Product: companies will sell
identity data as a product
5/14/2013 5
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity is Valuable but Carries Risk
Monetization Data Privacy
Stronger legal
enforcement
Increased potential
for brand damage
Higher consumer
awareness/interest
Attribute Exchange
& Federation
Personalization &
Cross-sell
5/14/2013 6
?
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity Economy Business Cases
5/14/2013 7
Permission-Based Marketing
Supplier of real-time profile data
to advertising engines
Identity Broker
A market maker for companies that
want to exchange identity assets
Identity Bank
A secure, privacy-driven solution for
managing personal data
Privacy-as-a-Service
Real time attributes driving service interaction
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Permission-Based Targeted Marketing
“If we can share your data,
you’ll get a discount”
“Great!”
Policy: Has resource owner {the consumer} consented to allow client {advertiser} to
access {profile, preferences, location, presence} for this purpose {scope(s)}?
Advertising Brands
• Profile
• Presence
• Location
• Preferences
5/14/2013 8
Targeted Advertisement
1
2
3
4
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
“You’re Verified!”
“I’m signing up.”
Partial &
Un-trusted
Data “Please verify her identity
and risk score”
“90% certainty
and low-risk”
Identity Broker: Authentication as a Service
5/14/2013 9
Monetized Exchange of Identity Data for Enhanced Security:
• Knowledge-based Authentication
• Identity Proofing
• Geofencing
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Identity Bank
“If we can share your data,
you’ll get compensated”
“I’m signing up.”
“Great!”
Monetized Exchange
of Identity Data:
* Profile
* Presence
* Preferences
Turn your customer data into a valuable asset, instead of a privacy liability
• Put the user in control of what’s OK to share
• Faster time-to-market for Opt-In/Opt-Out
• Enabled personalized 1:1 marketing versus aggregated anonymized
• Become a trusted broker of consumers’ attributes
Retail Finance Healthcare
5/14/2013 10
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Privacy-as-a-Service
Transparency, Choice, & Control
5/14/2013 11
My Privacy Preferences:
• Consent
• Preferences
• Personal Data
Informed Consent
• JIT
• Contextualized
• Copyright 2013. UnboundID Confidential. All Rights Reserved. •
Privacy-as-a-Service
Humanize and Operationalize Privacy
5/14/2013 12
1
Regulations
Consumer
Consent
Internal
Policies
2
UnboundID is a leading platform provider for identity services enabling companies
to dynamically manage, protect, and share real-time customer identity data across
cloud, mobile and social applications. Our solutions help companies provide cross-
organizational visibility into individual customer value, preferences and desires
over time while delivering the assurance that companies and their customers need
to share and manage identity data in secure and open environments. Ultimately,
UnboundID helps companies maximize average revenue per customer by
responding to changing identities over their lifetime.
For more information, see www.unboundid.com.
CLARITY
TRUST
REVENUE

Contenu connexe

En vedette

Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarForgeRock
 
How do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenariosHow do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenariosInnopay
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CloudIDSummit
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementForgeRock
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
 
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarForgeRock
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management ForgeRock
 
10 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 201210 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 2012ThreatMetrix
 
ThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix
 

En vedette (14)

Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
How do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenariosHow do Dutch consumers pay in 2020 - trends and scenarios
How do Dutch consumers pay in 2020 - trends and scenarios
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
ForgeRock: Identity Relationship Management is the Foundation for Your Digita...
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management
 
10 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 201210 of the Spookiest Cyber Attacks in 2012
10 of the Spookiest Cyber Attacks in 2012
 
ThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the InternetThreatMetrix – Building Trust on the Internet
ThreatMetrix – Building Trust on the Internet
 

Similaire à Tmw20098 land

Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Antoine Vigneron
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationNG DATA
 
Personagraph presentation
Personagraph presentationPersonagraph presentation
Personagraph presentationDon Quinn
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011Constantine Karbaliotis
 
Turning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer ExperiencesTurning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer ExperiencesNG DATA
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panelCloudera, Inc.
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldEnsighten
 
Data Driven Communications
Data Driven CommunicationsData Driven Communications
Data Driven CommunicationsZuni
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
Life in mobile_2014_overview_final
Life in mobile_2014_overview_finalLife in mobile_2014_overview_final
Life in mobile_2014_overview_finalDaniel Foci
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Master Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionMaster Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionSignal
 
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationThe Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationIPG Media Lab
 
Building Blocks Big Data Expo
Building Blocks Big Data ExpoBuilding Blocks Big Data Expo
Building Blocks Big Data ExpoBigDataExpo
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013Mydex CIC
 
5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)Cision
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacyproductcampnyc
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent Tony Fish
 
Big Data
Big DataBig Data
Big Datacadmef
 

Similaire à Tmw20098 land (20)

Protéger ses données: mission impossible?
Protéger ses données: mission impossible?Protéger ses données: mission impossible?
Protéger ses données: mission impossible?
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with Personalization
 
Personagraph presentation
Personagraph presentationPersonagraph presentation
Personagraph presentation
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011
 
Turning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer ExperiencesTurning Big Data into More Effective Customer Experiences
Turning Big Data into More Effective Customer Experiences
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panel
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel World
 
Data Driven Communications
Data Driven CommunicationsData Driven Communications
Data Driven Communications
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Life in mobile_2014_overview_final
Life in mobile_2014_overview_finalLife in mobile_2014_overview_final
Life in mobile_2014_overview_final
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Master Cross-Channel Customer Recognition
Master Cross-Channel Customer RecognitionMaster Cross-Channel Customer Recognition
Master Cross-Channel Customer Recognition
 
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal InformationThe Data Dilemma: How Can Consumers Trust Brands with Personal Information
The Data Dilemma: How Can Consumers Trust Brands with Personal Information
 
XCMO 2013: Cross-Channel Audience Management
XCMO 2013: Cross-Channel Audience ManagementXCMO 2013: Cross-Channel Audience Management
XCMO 2013: Cross-Channel Audience Management
 
Building Blocks Big Data Expo
Building Blocks Big Data ExpoBuilding Blocks Big Data Expo
Building Blocks Big Data Expo
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013
 
5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)5 ways innovative brands leverage social data insights (1)
5 ways innovative brands leverage social data insights (1)
 
Protect Your Brand by Protecting Privacy
Protect Your Brand by Protecting PrivacyProtect Your Brand by Protecting Privacy
Protect Your Brand by Protecting Privacy
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent
 
Big Data
Big DataBig Data
Big Data
 

Plus de navaidkhan

Tmw20127 turgut.c
Tmw20127 turgut.cTmw20127 turgut.c
Tmw20127 turgut.cnavaidkhan
 
Tmw20120 gunter lind.h
Tmw20120 gunter lind.hTmw20120 gunter lind.h
Tmw20120 gunter lind.hnavaidkhan
 
Tmw20116 brooks.l
Tmw20116 brooks.lTmw20116 brooks.l
Tmw20116 brooks.lnavaidkhan
 
Tmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaarTmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaarnavaidkhan
 
Tmw20092 michelsen.d
Tmw20092 michelsen.dTmw20092 michelsen.d
Tmw20092 michelsen.dnavaidkhan
 
Tmw20115 baroux.c
Tmw20115 baroux.cTmw20115 baroux.c
Tmw20115 baroux.cnavaidkhan
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopnavaidkhan
 
Huawei - Lte handover troubleshooting
Huawei - Lte handover troubleshootingHuawei - Lte handover troubleshooting
Huawei - Lte handover troubleshootingnavaidkhan
 
Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03navaidkhan
 
Alu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_externalAlu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_externalnavaidkhan
 
Skyfire log files100411
Skyfire log files100411Skyfire log files100411
Skyfire log files100411navaidkhan
 
Smartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experienceSmartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experiencenavaidkhan
 
Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011navaidkhan
 
Emerging database landscape july 2011
Emerging database landscape july 2011Emerging database landscape july 2011
Emerging database landscape july 2011navaidkhan
 
Signalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take awaysSignalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take awaysnavaidkhan
 

Plus de navaidkhan (16)

TMF Nice
TMF Nice TMF Nice
TMF Nice
 
Tmw20127 turgut.c
Tmw20127 turgut.cTmw20127 turgut.c
Tmw20127 turgut.c
 
Tmw20120 gunter lind.h
Tmw20120 gunter lind.hTmw20120 gunter lind.h
Tmw20120 gunter lind.h
 
Tmw20116 brooks.l
Tmw20116 brooks.lTmw20116 brooks.l
Tmw20116 brooks.l
 
Tmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaarTmw20101 hayden.j and spaar
Tmw20101 hayden.j and spaar
 
Tmw20092 michelsen.d
Tmw20092 michelsen.dTmw20092 michelsen.d
Tmw20092 michelsen.d
 
Tmw20115 baroux.c
Tmw20115 baroux.cTmw20115 baroux.c
Tmw20115 baroux.c
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shop
 
Huawei - Lte handover troubleshooting
Huawei - Lte handover troubleshootingHuawei - Lte handover troubleshooting
Huawei - Lte handover troubleshooting
 
Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03Alu 9900 wng_nbi_v03
Alu 9900 wng_nbi_v03
 
Alu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_externalAlu 9900 wng_congestion_notification_interface_v1 3_external
Alu 9900 wng_congestion_notification_interface_v1 3_external
 
Skyfire log files100411
Skyfire log files100411Skyfire log files100411
Skyfire log files100411
 
Smartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experienceSmartphones – A game changer in expectations of customer experience
Smartphones – A game changer in expectations of customer experience
 
Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011Self optimizing networks-benefits of son in lte-july 2011
Self optimizing networks-benefits of son in lte-july 2011
 
Emerging database landscape july 2011
Emerging database landscape july 2011Emerging database landscape july 2011
Emerging database landscape july 2011
 
Signalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take awaysSignalsflash070113 LTE World Summit Key take aways
Signalsflash070113 LTE World Summit Key take aways
 

Dernier

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Tmw20098 land

  • 2. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Consumer Identity Management 5/14/2013 2 Fortune 1000 Employees 62 million IDs $4B market Facebook Users 1 billion IDs Mobile Subscribers 5.2 billion IDs Citizens 7.0 billion Consumer Identity 100+ billion IDs
  • 3. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • The Basics - What is an Identity? …a unique person, product, or device – All the data/attributes associated with it—dynamic (location) and static (gender) – Across all channels (In store, Online, Mobile) 5/14/2013 3 In Store experience Shopping for X category and comparing Y products, adding Z products to the basket Online experience Searching retailer website for X category of products with Y features and Z price Mobile experience Surfing for price comparisons, reviews, and features on X products at Y location
  • 4. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity = Personal Data 5/14/2013 4 Individual Preferences  Favorite brands  Taste in music  Interests  … Acquired Attributes  Address  Medical record  Purchase history  … Inherent Characteristics  Date of birth  Gender  Nationality  … What does she like? What did she do? What does she come from? Digital Identity Sum of all the digitally available data about an individual
  • 5. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity as Enabler, Currency, and Product • Identity drives revenue by serving 3 roles: – Enabler: companies are building rich, personalized products and services – Currency: users can trade their identity data for value – Product: companies will sell identity data as a product 5/14/2013 5
  • 6. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity is Valuable but Carries Risk Monetization Data Privacy Stronger legal enforcement Increased potential for brand damage Higher consumer awareness/interest Attribute Exchange & Federation Personalization & Cross-sell 5/14/2013 6 ?
  • 7. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity Economy Business Cases 5/14/2013 7 Permission-Based Marketing Supplier of real-time profile data to advertising engines Identity Broker A market maker for companies that want to exchange identity assets Identity Bank A secure, privacy-driven solution for managing personal data Privacy-as-a-Service Real time attributes driving service interaction
  • 8. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Permission-Based Targeted Marketing “If we can share your data, you’ll get a discount” “Great!” Policy: Has resource owner {the consumer} consented to allow client {advertiser} to access {profile, preferences, location, presence} for this purpose {scope(s)}? Advertising Brands • Profile • Presence • Location • Preferences 5/14/2013 8 Targeted Advertisement 1 2 3 4
  • 9. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • “You’re Verified!” “I’m signing up.” Partial & Un-trusted Data “Please verify her identity and risk score” “90% certainty and low-risk” Identity Broker: Authentication as a Service 5/14/2013 9 Monetized Exchange of Identity Data for Enhanced Security: • Knowledge-based Authentication • Identity Proofing • Geofencing
  • 10. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Identity Bank “If we can share your data, you’ll get compensated” “I’m signing up.” “Great!” Monetized Exchange of Identity Data: * Profile * Presence * Preferences Turn your customer data into a valuable asset, instead of a privacy liability • Put the user in control of what’s OK to share • Faster time-to-market for Opt-In/Opt-Out • Enabled personalized 1:1 marketing versus aggregated anonymized • Become a trusted broker of consumers’ attributes Retail Finance Healthcare 5/14/2013 10
  • 11. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Privacy-as-a-Service Transparency, Choice, & Control 5/14/2013 11 My Privacy Preferences: • Consent • Preferences • Personal Data Informed Consent • JIT • Contextualized
  • 12. • Copyright 2013. UnboundID Confidential. All Rights Reserved. • Privacy-as-a-Service Humanize and Operationalize Privacy 5/14/2013 12 1 Regulations Consumer Consent Internal Policies 2
  • 13. UnboundID is a leading platform provider for identity services enabling companies to dynamically manage, protect, and share real-time customer identity data across cloud, mobile and social applications. Our solutions help companies provide cross- organizational visibility into individual customer value, preferences and desires over time while delivering the assurance that companies and their customers need to share and manage identity data in secure and open environments. Ultimately, UnboundID helps companies maximize average revenue per customer by responding to changing identities over their lifetime. For more information, see www.unboundid.com. CLARITY TRUST REVENUE