SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Global	
  Trends	
  in	
  BYOID	
  
Merri4	
  Maxim	
  
CA	
  Technologies	
  
July	
  21,	
  2014	
  
2	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
abstract	
  
§  While	
  Bring	
  Your	
  Own	
  IdenLty	
  (BYOID)	
  can	
  deliver	
  tangible	
  
benefits	
  to	
  end	
  users	
  and	
  relying	
  parLes,	
  these	
  benefits	
  are	
  
accompanied	
  with	
  potenLal	
  risks	
  and	
  liability	
  concerns.	
  	
  
§  CA	
  Technologies	
  and	
  The	
  Ponemon	
  InsLtute	
  recently	
  
conducted	
  a	
  worldwide	
  survey	
  of	
  over	
  3,000	
  IT	
  users	
  and	
  
business	
  users	
  to	
  understand	
  the	
  value,	
  benefits	
  and	
  
concerns	
  that	
  organizaLons	
  have	
  around	
  using	
  BYOID.	
  	
  
§  This	
  session	
  will	
  review	
  the	
  key	
  findings	
  from	
  the	
  Ponemon	
  
Survey,	
  deliver	
  insight	
  into	
  the	
  current	
  state	
  of	
  BYOID	
  and	
  
provide	
  guidance	
  on	
  how	
  enterprises	
  can	
  overcome	
  these	
  
barriers	
  to	
  gain	
  the	
  maximum	
  value	
  from	
  BYOID	
  without	
  
unnecessarily	
  increasing	
  risk	
  or	
  fraud.	
  
3	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
§  17+	
  years	
  of	
  product	
  management/product	
  markeLng	
  experience	
  
–  SecurityDynamics	
  
–  RSA	
  Security	
  
–  Netegrity	
  
–  OpenPages	
  
–  CA	
  Technologies	
  
§  Tracking/stalking	
  me:	
  
–  Merri4.maxim@ca.com	
  
–  www.twi4er.com/merri4maxim	
  
	
  
About	
  me	
  
4	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
The	
  Promise	
  of	
  BYOID	
  
Reduce	
  complexity,	
  improve	
  user	
  experience	
  
5	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
The	
  Challenge	
  of	
  BYOID	
  
“I	
  am	
  Losing	
  Control”	
  
6	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Survey	
  Summary	
  
§  In	
  early	
  2014,	
  CA	
  worked	
  with	
  The	
  Ponemon	
  InsLtute	
  to	
  develop	
  a	
  market	
  
survey	
  to	
  gauge	
  interest	
  and	
  adopLon	
  of	
  BYOID	
  across	
  8	
  geographic	
  
regions	
  
–  USA/Canada	
  
–  Australia	
  
–  Brazil	
  
–  France	
  
–  Germany	
  
–  India	
  
–  UK	
  
–  Italy	
  
7	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Different	
  personas	
  explored	
  in	
  this	
  survey	
  
IT	
  User	
  
•  I	
  need	
  to	
  manage	
  
customer	
  data	
  
•  I	
  need	
  to	
  keep	
  
sensiLve	
  data	
  secure	
  
•  I	
  need	
  to	
  meet	
  
compliance	
  and	
  
policy	
  mandates	
  
Business	
  User	
  
•  I	
  want	
  to	
  simplify	
  
the	
  customer	
  
experience	
  
•  I	
  want	
  to	
  know	
  more	
  
about	
  my	
  customers	
  
to	
  help	
  improve	
  
retenLon	
  and	
  drive	
  
incremental	
  revenue	
  
8	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Sample	
  Sizes	
  	
  
IT	
  User	
   Business	
  User	
   Total	
   %	
  of	
  total	
  
sample	
  
USA/Canada	
   570	
   428	
   998	
   32%	
  
Australia	
   99	
   110	
   209	
   7%	
  
Brazil	
   158	
   185	
   343	
   11%	
  
France	
   127	
   148	
   275	
   9%	
  
Germany	
   182	
   180	
   362	
   13%	
  
India	
   141	
   152	
   293	
   8%	
  
Italy	
   143	
   131	
   274	
   8%	
  
UK	
   169	
   192	
   361	
   12%	
  
TOTAL	
   1,589	
   1,526	
   3,115	
  
Other	
  demographic	
  Info	
  
•  100%	
  of	
  respondents	
  were	
  from	
  companies	
  with	
  >1,000	
  employees	
  
•  75%	
  of	
  respondents	
  were	
  from	
  companies	
  with	
  $500M+	
  in	
  annual	
  revenue	
  
•  Target	
  Ltles	
  for	
  IT	
  users	
  were	
  CIO/CISO;	
  target	
  Ltles	
  for	
  business	
  users	
  were	
  VP/line	
  of	
  
business	
  manager	
  
•  Even	
  distribuLon	
  across	
  all	
  common	
  verLcal	
  markets	
  
9	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
General	
  Findings	
  
§  Need	
  to	
  simplify	
  user	
  experience	
  is	
  driving	
  interest	
  in	
  BYOID	
  	
  
§  Mobile	
  and	
  web	
  customers	
  are	
  driving	
  need	
  for	
  BYOID	
  	
  
§  Security	
  enhancements	
  sLll	
  needed	
  to	
  drive	
  more	
  BYOID	
  adopLon	
  
§  Business	
  users	
  &	
  IT	
  users	
  have	
  different	
  opinions	
  on	
  value	
  of	
  BYOID	
  
Key	
  Survey	
  Findings	
  
11	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Interest	
  in	
  BYOID	
  is	
  highest	
  for	
  online	
  &	
  mobile	
  users	
  
§  SupporLng	
  survey	
  data	
  
–  Q5.	
  “How	
  would	
  you	
  rate	
  your	
  organiza1on’s	
  level	
  of	
  interest	
  in	
  accep1ng	
  
digital	
  iden11es	
  for	
  any	
  of	
  the	
  following	
  user	
  popula1ons?	
  
§  Employees,	
  Contractors,	
  Re1rees,	
  Job	
  prospects,	
  Mobile	
  users,	
  Website	
  users	
  
–  82%	
  of	
  all	
  business	
  users	
  across	
  all	
  regions	
  responded	
  “Very	
  High”	
  or	
  “High”	
  for	
  
mobile	
  users	
  
–  79%	
  of	
  all	
  business	
  users	
  across	
  all	
  regions	
  responded	
  “Very	
  High”	
  or	
  “High”	
  for	
  
website	
  users	
  
–  None	
  of	
  the	
  other	
  idenLty	
  types	
  were	
  even	
  close	
  
§  Key	
  takeaway:	
  	
  	
  
–  Customers	
  want	
  and	
  expect	
  a	
  simple	
  user	
  experience	
  =>	
  BYOID	
  can	
  assist	
  
12	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
IT	
  Users	
  and	
  Business	
  Users	
  are	
  looking	
  at	
  BYOID	
  for	
  different	
  
reasons	
  
§  Q3:	
  	
  “What	
  are	
  the	
  main	
  reasons	
  for	
  BYOID	
  adop1on	
  in	
  your	
  
organiza1on	
  today?	
  Please	
  select	
  all	
  that	
  apply.”	
  
–  95%	
  of	
  business	
  users	
  selected	
  “To	
  capture	
  a4ributes	
  about	
  users	
  from	
  
external	
  sources”	
  v.	
  only	
  26%	
  of	
  IT	
  users	
  who	
  selected	
  same	
  AND	
  
–  48%	
  of	
  IT	
  users	
  also	
  selected	
  “To	
  outsource	
  password	
  reset	
  acLviLes	
  to	
  
idenLty	
  providers	
  ”	
  v.	
  only	
  9%	
  of	
  business	
  users	
  who	
  selected	
  same	
  
§  Key	
  takeaway:	
  	
  	
  
–  Business	
  sees	
  value	
  in	
  BYOID	
  for	
  gathering	
  customer	
  data	
  whereas	
  IT	
  sees	
  
BYOID	
  as	
  more	
  of	
  a	
  cost	
  savings	
  iniLaLve	
  
13	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Business	
  users	
  and	
  IT	
  users	
  see	
  different	
  BYOID	
  benefits	
  
Top	
  3	
  BYOID	
  Benefits	
  for	
  IT	
  Users	
   Top	
  3	
  BYOID	
  Benefits	
  for	
  Business	
  Users	
  
IdenLty	
  ValidaLon-­‐74%	
   Reduced	
  fricLon	
  in	
  user	
  experience-­‐78%	
  
Contractor	
  on-­‐boarding-­‐57%	
   Simplified	
  engagement	
  for	
  end	
  users-­‐	
  75%	
  
Fraud	
  /	
  risk	
  evaluaLon	
  &	
  reducLon-­‐55%	
   IdenLty	
  ValidaLon-­‐63%	
  
Q18.	
  “Which	
  BYOID	
  benefits	
  are	
  of	
  most	
  interest	
  to	
  your	
  organiza1on?	
  Select	
  all	
  that	
  apply	
  
•  Targeted	
  marke1ng	
  
•  Fraud/risk	
  evalua1on	
  
•  Iden1ty	
  valida1on	
  
•  Contractor	
  on-­‐boarding,	
  	
  
•  Reduced	
  fric1on	
  in	
  user	
  experience,	
  	
  
•  Simplified	
  engagement	
  for	
  end	
  users	
  
•  Increased	
  revenue	
  
•  Security	
  enhancements	
  
•  Access	
  to	
  fresh	
  iden1ty	
  informa1on	
  
14	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Ranking	
  IdPs	
  that	
  you	
  would	
  accept	
  at	
  your	
  employer	
  
Top	
  Ranked	
  IdP	
  
for	
  IT	
  User	
  
Lowest	
  Ranked	
  
IdP	
  for	
  IT	
  User	
  
Top	
  Ranked	
  IdP	
  
for	
  Business	
  
User	
  
Lowest	
  Ranked	
  
IdP	
  for	
  
Business	
  User	
  
USA/Canada	
   PayPal	
   Yahoo	
   PayPal	
   Yahoo	
  
Australia	
   PayPal	
   Yahoo	
   Amazon	
   Facebook	
  
Brazil	
   PayPal	
   Yahoo	
   Yahoo	
   LinkedIn	
  
France	
   PayPal	
   Yahoo/Facebook	
   Amazon	
   Google	
  
Germany	
   PayPal	
   Yahoo	
   Microsoq	
   Google	
  
India	
   PayPal	
   Yahoo	
   PayPal	
   Facebook	
  
Italy	
   PayPal	
   Facebook	
   Amazon	
   Facebook	
  
UK	
   PayPal	
   Yahoo	
   Microsoq	
   Google	
  
Q8:	
  	
  “Please	
  rank	
  the	
  following	
  iden1ty	
  providers	
  in	
  order	
  of	
  interest	
  to	
  your	
  organiza1on.	
  	
  1	
  =	
  of	
  
most	
  interested	
  and	
  7	
  =	
  of	
  least	
  interest.	
  	
  If	
  possible,	
  please	
  avoid	
  1es.”	
  
15	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Ranking	
  IdPs	
  that	
  you	
  would	
  prefer	
  to	
  use	
  as	
  an	
  individual	
  
Top	
  Ranked	
  IdP	
  
for	
  IT	
  User	
  
Lowest	
  Ranked	
  
IdP	
  for	
  IT	
  User	
  
Top	
  Ranked	
  IdP	
  
for	
  Business	
  
User	
  
Lowest	
  Ranked	
  
IdP	
  for	
  
Business	
  User	
  
USA/Canada	
   Google	
   Yahoo	
   Google	
   Yahoo	
  
Australia	
   Google	
   Yahoo	
   Amazon	
   PayPal	
  
Brazil	
   Google	
   Yahoo	
   Google	
   LinkedIn	
  
France	
   Google	
   Yahoo	
   Amazon	
   LinkedIn	
  
Germany	
   Google	
   Yahoo	
   Facebook	
   LinkedIn	
  
India	
   Google	
   Yahoo	
   Facebook	
   LinkedIn	
  
Italy	
   Google	
   Yahoo	
   Google	
   Yahoo	
  
UK	
   Google	
   Microsoq	
   Yahoo	
   LinkedIn	
  
Q9.	
  “Please	
  rank	
  the	
  following	
  iden1ty	
  providers	
  in	
  order	
  of	
  interest	
  to	
  you	
  as	
  an	
  individual	
  
accessing	
  other	
  organiza1ons	
  or	
  service	
  providers.	
  	
  1	
  =	
  of	
  most	
  interested	
  and	
  7	
  =	
  of	
  least	
  interest.	
  	
  
If	
  possible,	
  please	
  avoid	
  1es.”	
  
16	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Preferred	
  IdPs	
  as	
  organizaLon	
  v.	
  as	
  individual	
  
(aggregated	
  across	
  all	
  geographies)	
  
Highest	
  Priority	
   Lowest	
  Priority	
  
QuesKon	
  8-­‐as	
  employer	
  
IT	
  User	
   PayPal	
   Yahoo	
  
Business	
  User	
   Amazon	
   Facebook	
  
QuesKon	
  9-­‐as	
  individual	
  
IT	
  User	
   Google	
   Yahoo	
  
Business	
  User	
   Facebook	
   LinkedIn	
  
Intriguing	
  contrast	
  between	
  what	
  business	
  user	
  wants	
  to	
  use	
  as	
  IdP	
  
for	
  their	
  employer	
  v.	
  what	
  they	
  want	
  to	
  use	
  personally	
  
17	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Features	
  that	
  could	
  accelerate	
  BYOID	
  adopLon	
  
Top	
  3	
  Preferred	
  Features	
  for	
  IT	
  Users	
   Top	
  3	
  Preferred	
  Features	
  for	
  Business	
  Users	
  
IdenLty	
  validaLon	
  processes-­‐73%	
   IdenLty	
  validaLon	
  processes-­‐71%	
  
MulL-­‐factor	
  authenLcaLon-­‐66%	
   Simplified	
  user	
  registraLon-­‐71%	
  
IdenLty	
  provider	
  implemenLng	
  fraud	
  risk	
  
engines-­‐57%	
  
IdenLty	
  provider	
  implemenLng	
  fraud	
  risk	
  
engines-­‐37%	
  
Q14.	
  ““Which	
  of	
  the	
  following	
  features	
  would	
  most	
  likely	
  increase	
  BYOID	
  adop1on	
  within	
  your	
  
organiza1on?	
  Please	
  select	
  all	
  that	
  apply.”	
  
•  Mul1-­‐factor	
  auth	
  
•  Iden1ty	
  valida1on	
  processes	
  
•  	
  Iden1ty	
  provider	
  implemen1ng	
  fraud	
  risk	
  engines	
  	
  
•  Simplified	
  user	
  registra1on	
  
•  SMS	
  processes	
  for	
  user	
  valida1on	
  
•  Password	
  recovery	
  func1onality	
  
•  Risk	
  based	
  evalua1on	
  of	
  password	
  recovery	
  processes	
  
18	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Supplemental	
  data	
  that	
  would	
  increase	
  value	
  of	
  IdPs	
  
Top	
  3	
  Preferred	
  Data	
  for	
  IT	
  Users	
   Top	
  3	
  Preferred	
  Data	
  for	
  Business	
  Users	
  
Validated	
  phone	
  number-­‐46%	
   Current	
  shipping	
  address-­‐86%	
  
None	
  of	
  the	
  above-­‐34%	
   Validated	
  phone	
  number-­‐86%	
  
Payment	
  informaLon-­‐	
  29%	
   Payment	
  informaLon-­‐	
  73%	
  
Q17.	
  What	
  addi1onal	
  informa1on	
  or	
  services	
  would	
  increase	
  the	
  value	
  of	
  the	
  BYOID	
  
iden1ty	
  provider?	
  Please	
  select	
  all	
  that	
  apply.	
  
•  Current	
  shipping	
  address	
  
•  Validated	
  phone	
  number	
  
•  Payment	
  informa1on	
  
•  Access	
  to	
  payment	
  systems	
  
•  None	
  of	
  the	
  above	
  
19	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Factors	
  that	
  would	
  enhance	
  BYOID	
  efforts	
  
Top	
  3	
  Preferred	
  Factors	
  for	
  IT	
  Users	
   Top	
  3	
  Preferred	
  Factors	
  for	
  Business	
  Users	
  
Mobile	
  device	
  factors-­‐52%	
   Mobile	
  device	
  factors-­‐66%	
  
4	
  digit	
  PIN-­‐44%	
   Passive	
  factors	
  such	
  as	
  geolocaLon-­‐59%	
  
Risk-­‐based	
  evaluaLon-­‐39%	
   4	
  digit	
  PIN-­‐25%	
  
Q15	
  “What	
  factors	
  would	
  you	
  add	
  to	
  a	
  digital	
  idenLty	
  to	
  increase	
  control	
  or	
  scruLny	
  by	
  
your	
  organizaLon?	
  Select	
  all	
  that	
  apply.”	
  
•  4-­‐digit	
  PIN	
  
•  Passive	
  factors	
  such	
  as	
  geo-­‐loca1on	
  
•  One-­‐1me	
  tokens	
  
•  Smart	
  cards	
  
•  Mobile	
  device	
  factors	
  
•  Risk-­‐based	
  evalua1on	
  
20	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Conclusion:	
  
A	
  New	
  Value-­‐Based	
  View	
  of	
  IdenLty	
  is	
  Emerging:	
  
Risk-­‐based	
  has	
  dominated	
  for	
  the	
  last	
  decade	
  but	
  that	
  is	
  changing	
  
Evolving	
  towards	
  a	
  more	
  value/customer-­‐centric	
  view	
  of	
  idenKty	
  
Key	
  is	
  finding	
  appropriate	
  balance	
  between	
  both	
  
Value-­‐based	
  Risk-­‐based	
  
IT/IT	
  Security	
   Line	
  of	
  Business	
  
21	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
BYOID	
  is	
  a	
  Joint	
  Responsibility	
  
IT	
  User	
  +	
  Business	
  User	
  Must	
  Collaborate	
  
	
  
22	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Next	
  Steps	
  and	
  Q&A	
  
§  Survey	
  available	
  next	
  Monday	
  
–  Email	
  me	
  for	
  copy	
  OR	
  
–  Follow	
  me	
  on	
  Twi4er	
  (@merri4maxim)-­‐I’ll	
  tweet	
  bit.ly	
  link	
  for	
  results	
  
§  ParLcipate	
  in	
  Tweetchat	
  on	
  this	
  topic	
  
–  July	
  29	
  at	
  1pm	
  Eastern	
  
–  Follow	
  hashtag	
  #TechViews	
  to	
  parLcipate	
  
§  External	
  webinar	
  on	
  August	
  7	
  with	
  Larry	
  Ponemon	
  to	
  discuss	
  
survey	
  results	
  
Senior	
  Principal,	
  Product	
  MarkeLng	
  
Merri4.maxim@ca.com	
  
@merri4maxim	
  
slideshare.net/CAinc	
  
linkedin.com/company/ca-­‐technologies	
  
	
  
ca.com	
  
MerriY	
  Maxim	
  
24	
   ©	
  2014	
  CA.	
  ALL	
  RIGHTS	
  RESERVED.	
  
Copyright	
  ©	
  2014	
  CA.	
  	
  All	
  rights	
  reserved.	
  	
  	
  All	
  trademarks,	
  trade	
  names,	
  service	
  marks	
  and	
  logos	
  referenced	
  herein	
  belong	
  to	
  their	
  respecLve	
  companies.	
  
No	
  unauthorized	
  use,	
  copying	
  or	
  distribuLon	
  permi4ed.	
  	
  
THIS	
  PRESENTATION	
  IS	
  FOR	
  YOUR	
  INFORMATIONAL	
  PURPOSES	
  ONLY.	
  CA	
  assumes	
  no	
  responsibility	
  for	
  the	
  accuracy	
  or	
  completeness	
  of	
  the	
  informaLon.	
  
TO	
  THE	
  EXTENT	
  PERMITTED	
  BY	
  APPLICABLE	
  LAW,	
  CA	
  PROVIDES	
  THIS	
  DOCUMENT	
  “AS	
  IS”	
  WITHOUT	
  WARRANTY	
  OF	
  ANY	
  KIND,	
  INCLUDING,	
  WITHOUT	
  
LIMITATION,	
  ANY	
  IMPLIED	
  WARRANTIES	
  OF	
  MERCHANTABILITY,	
  FITNESS	
  FOR	
  A	
  PARTICULAR	
  PURPOSE,	
  OR	
  NONINFRINGEMENT.	
  	
  In	
  no	
  event	
  will	
  CA	
  be	
  
liable	
  for	
  any	
  loss	
  or	
  damage,	
  direct	
  or	
  indirect,	
  in	
  connecLon	
  with	
  this	
  presentaLon,	
  including,	
  without	
  limitaLon,	
  lost	
  profits,	
  lost	
  investment,	
  business	
  
interrupLon,	
  goodwill,	
  or	
  lost	
  data,	
  even	
  if	
  CA	
  is	
  expressly	
  advised	
  of	
  the	
  possibility	
  of	
  such	
  damages.	
  

Mais conteúdo relacionado

Mais procurados

The next evolution for IT service providers: Shifting focus to embrace BYOA
The next evolution for IT service providers: Shifting focus to embrace BYOAThe next evolution for IT service providers: Shifting focus to embrace BYOA
The next evolution for IT service providers: Shifting focus to embrace BYOALogMeIn
 
IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013 IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013 Casey Lucas
 
Insurance industry trends 2015 and beyond: #4 Telematics
Insurance industry trends 2015 and beyond: #4 Telematics Insurance industry trends 2015 and beyond: #4 Telematics
Insurance industry trends 2015 and beyond: #4 Telematics Euro IT Group
 
Outsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment workOutsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment workIndusNetMarketing
 
Webinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in IsraelWebinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in IsraelThe Digital Insurer
 
Webinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in MalaysiaWebinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in MalaysiaThe Digital Insurer
 
"What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ...
"What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ..."What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ...
"What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ...Edge AI and Vision Alliance
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxCapgemini
 
Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Baraa Arksousi
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies
 
Mobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsMobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsCorporate Insight
 
Future trends of outsourcing
Future trends of outsourcingFuture trends of outsourcing
Future trends of outsourcingManav Gupta
 
Front End: What can we do to improve the customer experience?
Front End: What can we do to improve the customer experience?Front End: What can we do to improve the customer experience?
Front End: What can we do to improve the customer experience?IRESS
 
How Technology is Driving a Pension Revolution
How Technology is Driving a Pension RevolutionHow Technology is Driving a Pension Revolution
How Technology is Driving a Pension RevolutionIRESS
 
Understanding Customer Buying Journey with Big Data
Understanding Customer Buying Journey with Big DataUnderstanding Customer Buying Journey with Big Data
Understanding Customer Buying Journey with Big DataAnalyticsWeek
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAMWSO2
 
Mobile Technology In Insurance Industry
Mobile Technology In Insurance IndustryMobile Technology In Insurance Industry
Mobile Technology In Insurance Industrydheeraj_bhasin
 
Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...
Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...
Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...VARINDIA
 

Mais procurados (20)

The next evolution for IT service providers: Shifting focus to embrace BYOA
The next evolution for IT service providers: Shifting focus to embrace BYOAThe next evolution for IT service providers: Shifting focus to embrace BYOA
The next evolution for IT service providers: Shifting focus to embrace BYOA
 
IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013 IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013
 
Insurance industry trends 2015 and beyond: #4 Telematics
Insurance industry trends 2015 and beyond: #4 Telematics Insurance industry trends 2015 and beyond: #4 Telematics
Insurance industry trends 2015 and beyond: #4 Telematics
 
Outsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment workOutsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment work
 
Webinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in IsraelWebinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in Israel
 
Webinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in MalaysiaWebinar for August 2020 - Digital Insurance in Malaysia
Webinar for August 2020 - Digital Insurance in Malaysia
 
"What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ...
"What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ..."What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ...
"What’s Hot? The M&A and Funding Landscape for Computer Vision Companies," a ...
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
 
Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2Kash aziz sap forum may 11 2016 presentationv3.2
Kash aziz sap forum may 11 2016 presentationv3.2
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...
 
Mobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsMobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and Innovations
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
Future trends of outsourcing
Future trends of outsourcingFuture trends of outsourcing
Future trends of outsourcing
 
Front End: What can we do to improve the customer experience?
Front End: What can we do to improve the customer experience?Front End: What can we do to improve the customer experience?
Front End: What can we do to improve the customer experience?
 
How Technology is Driving a Pension Revolution
How Technology is Driving a Pension RevolutionHow Technology is Driving a Pension Revolution
How Technology is Driving a Pension Revolution
 
Understanding Customer Buying Journey with Big Data
Understanding Customer Buying Journey with Big DataUnderstanding Customer Buying Journey with Big Data
Understanding Customer Buying Journey with Big Data
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 
Mobile Technology In Insurance Industry
Mobile Technology In Insurance IndustryMobile Technology In Insurance Industry
Mobile Technology In Insurance Industry
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...
Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...
Mr. Pauline Tng, Dir.Distribution-Motorola Solution, giving away award to Cyb...
 

Destaque

CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CloudIDSummit
 
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding EdgeCIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding EdgeCloudIDSummit
 
CIS14: From Card to Mobile—Evolving Identity Credentials
CIS14: From Card to Mobile—Evolving Identity CredentialsCIS14: From Card to Mobile—Evolving Identity Credentials
CIS14: From Card to Mobile—Evolving Identity CredentialsCloudIDSummit
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCloudIDSummit
 
CIS14: Double Trouble—Managing Growth
CIS14: Double Trouble—Managing GrowthCIS14: Double Trouble—Managing Growth
CIS14: Double Trouble—Managing GrowthCloudIDSummit
 
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCloudIDSummit
 
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and IdentitiesCIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and IdentitiesCloudIDSummit
 
CIS13: Externalized Authorization from the Developer’s Perspective
CIS13: Externalized Authorization from the Developer’s PerspectiveCIS13: Externalized Authorization from the Developer’s Perspective
CIS13: Externalized Authorization from the Developer’s PerspectiveCloudIDSummit
 
CIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated IdentityCIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated IdentityCloudIDSummit
 
CIS14: Knowing vs. Asking: Innovation in User Recognition
CIS14: Knowing vs. Asking: Innovation in User RecognitionCIS14: Knowing vs. Asking: Innovation in User Recognition
CIS14: Knowing vs. Asking: Innovation in User RecognitionCloudIDSummit
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCloudIDSummit
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CloudIDSummit
 
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...CloudIDSummit
 
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?CloudIDSummit
 
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jainCIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jainCloudIDSummit
 
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...CloudIDSummit
 

Destaque (17)

CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)
 
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding EdgeCIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
CIS13: Big Data Platform Vendor’s Perspective: Insights from the Bleeding Edge
 
CIS14: From Card to Mobile—Evolving Identity Credentials
CIS14: From Card to Mobile—Evolving Identity CredentialsCIS14: From Card to Mobile—Evolving Identity Credentials
CIS14: From Card to Mobile—Evolving Identity Credentials
 
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile AppsCIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
CIS13: Gateway to the Enterprise: Supporting SSO in Mobile Apps
 
CIS14: Double Trouble—Managing Growth
CIS14: Double Trouble—Managing GrowthCIS14: Double Trouble—Managing Growth
CIS14: Double Trouble—Managing Growth
 
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
 
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and IdentitiesCIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
CIS14: Identity Therapy: Surviving the Explosion of Users, Access and Identities
 
CIS13: Externalized Authorization from the Developer’s Perspective
CIS13: Externalized Authorization from the Developer’s PerspectiveCIS13: Externalized Authorization from the Developer’s Perspective
CIS13: Externalized Authorization from the Developer’s Perspective
 
CIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated IdentityCIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated Identity
 
CIS14: Knowing vs. Asking: Innovation in User Recognition
CIS14: Knowing vs. Asking: Innovation in User RecognitionCIS14: Knowing vs. Asking: Innovation in User Recognition
CIS14: Knowing vs. Asking: Innovation in User Recognition
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0
 
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
CIS13: How to Build a Federated Identity Service on Identity and Context Virt...
 
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
 
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jainCIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
CIS14: Mobile SSO using NAPPS: OpenID Connect Profile for Native Apps-jain
 
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2...
 

Semelhante a Global Trends in BYOID: Key Findings from CA Technologies Survey

Best Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for UtilitiesBest Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for UtilitiesCapgemini
 
Suryl investor presentation
Suryl investor presentationSuryl investor presentation
Suryl investor presentationBrian Johnson
 
NGDATA Corp Presentation Public 04022015
NGDATA Corp Presentation Public 04022015NGDATA Corp Presentation Public 04022015
NGDATA Corp Presentation Public 04022015NGDATA
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 
Disney Data & Analytics Conference
Disney Data & Analytics ConferenceDisney Data & Analytics Conference
Disney Data & Analytics Conferencechad_engelgau
 
Customer insight presentation s houston - boston march 2014
Customer insight presentation   s houston - boston march 2014Customer insight presentation   s houston - boston march 2014
Customer insight presentation s houston - boston march 2014Stuart Houston
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSolarWinds
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewPietro Leo
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)The Digital Insurer
 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14InvestorSymantec
 
Three Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution ChannelThree Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution ChannelVlocity
 
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak) Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak) Tealium
 
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...Mintigo1
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013InvestorSymantec
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...
Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...
Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...Mintigo1
 

Semelhante a Global Trends in BYOID: Key Findings from CA Technologies Survey (20)

Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
Best Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for UtilitiesBest Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for Utilities
 
ISG Market Update
ISG Market UpdateISG Market Update
ISG Market Update
 
Suryl investor presentation
Suryl investor presentationSuryl investor presentation
Suryl investor presentation
 
NGDATA Corp Presentation Public 04022015
NGDATA Corp Presentation Public 04022015NGDATA Corp Presentation Public 04022015
NGDATA Corp Presentation Public 04022015
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Disney Data & Analytics Conference
Disney Data & Analytics ConferenceDisney Data & Analytics Conference
Disney Data & Analytics Conference
 
Customer insight presentation s houston - boston march 2014
Customer insight presentation   s houston - boston march 2014Customer insight presentation   s houston - boston march 2014
Customer insight presentation s houston - boston march 2014
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of View
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)
 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14
 
Three Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution ChannelThree Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution Channel
 
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak) Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
 
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
[Webinar] Predictive Marketing: Competitive Advantage for Today, Survival for...
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...
Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...
Predictive Lead Scoring - What's All The Buzz About? [SF Marketo User Group P...
 

Mais de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Mais de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Global Trends in BYOID: Key Findings from CA Technologies Survey

  • 1. Global  Trends  in  BYOID   Merri4  Maxim   CA  Technologies   July  21,  2014  
  • 2. 2   ©  2014  CA.  ALL  RIGHTS  RESERVED.   abstract   §  While  Bring  Your  Own  IdenLty  (BYOID)  can  deliver  tangible   benefits  to  end  users  and  relying  parLes,  these  benefits  are   accompanied  with  potenLal  risks  and  liability  concerns.     §  CA  Technologies  and  The  Ponemon  InsLtute  recently   conducted  a  worldwide  survey  of  over  3,000  IT  users  and   business  users  to  understand  the  value,  benefits  and   concerns  that  organizaLons  have  around  using  BYOID.     §  This  session  will  review  the  key  findings  from  the  Ponemon   Survey,  deliver  insight  into  the  current  state  of  BYOID  and   provide  guidance  on  how  enterprises  can  overcome  these   barriers  to  gain  the  maximum  value  from  BYOID  without   unnecessarily  increasing  risk  or  fraud.  
  • 3. 3   ©  2014  CA.  ALL  RIGHTS  RESERVED.   §  17+  years  of  product  management/product  markeLng  experience   –  SecurityDynamics   –  RSA  Security   –  Netegrity   –  OpenPages   –  CA  Technologies   §  Tracking/stalking  me:   –  Merri4.maxim@ca.com   –  www.twi4er.com/merri4maxim     About  me  
  • 4. 4   ©  2014  CA.  ALL  RIGHTS  RESERVED.   The  Promise  of  BYOID   Reduce  complexity,  improve  user  experience  
  • 5. 5   ©  2014  CA.  ALL  RIGHTS  RESERVED.   The  Challenge  of  BYOID   “I  am  Losing  Control”  
  • 6. 6   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Survey  Summary   §  In  early  2014,  CA  worked  with  The  Ponemon  InsLtute  to  develop  a  market   survey  to  gauge  interest  and  adopLon  of  BYOID  across  8  geographic   regions   –  USA/Canada   –  Australia   –  Brazil   –  France   –  Germany   –  India   –  UK   –  Italy  
  • 7. 7   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Different  personas  explored  in  this  survey   IT  User   •  I  need  to  manage   customer  data   •  I  need  to  keep   sensiLve  data  secure   •  I  need  to  meet   compliance  and   policy  mandates   Business  User   •  I  want  to  simplify   the  customer   experience   •  I  want  to  know  more   about  my  customers   to  help  improve   retenLon  and  drive   incremental  revenue  
  • 8. 8   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Sample  Sizes     IT  User   Business  User   Total   %  of  total   sample   USA/Canada   570   428   998   32%   Australia   99   110   209   7%   Brazil   158   185   343   11%   France   127   148   275   9%   Germany   182   180   362   13%   India   141   152   293   8%   Italy   143   131   274   8%   UK   169   192   361   12%   TOTAL   1,589   1,526   3,115   Other  demographic  Info   •  100%  of  respondents  were  from  companies  with  >1,000  employees   •  75%  of  respondents  were  from  companies  with  $500M+  in  annual  revenue   •  Target  Ltles  for  IT  users  were  CIO/CISO;  target  Ltles  for  business  users  were  VP/line  of   business  manager   •  Even  distribuLon  across  all  common  verLcal  markets  
  • 9. 9   ©  2014  CA.  ALL  RIGHTS  RESERVED.   General  Findings   §  Need  to  simplify  user  experience  is  driving  interest  in  BYOID     §  Mobile  and  web  customers  are  driving  need  for  BYOID     §  Security  enhancements  sLll  needed  to  drive  more  BYOID  adopLon   §  Business  users  &  IT  users  have  different  opinions  on  value  of  BYOID  
  • 11. 11   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Interest  in  BYOID  is  highest  for  online  &  mobile  users   §  SupporLng  survey  data   –  Q5.  “How  would  you  rate  your  organiza1on’s  level  of  interest  in  accep1ng   digital  iden11es  for  any  of  the  following  user  popula1ons?   §  Employees,  Contractors,  Re1rees,  Job  prospects,  Mobile  users,  Website  users   –  82%  of  all  business  users  across  all  regions  responded  “Very  High”  or  “High”  for   mobile  users   –  79%  of  all  business  users  across  all  regions  responded  “Very  High”  or  “High”  for   website  users   –  None  of  the  other  idenLty  types  were  even  close   §  Key  takeaway:       –  Customers  want  and  expect  a  simple  user  experience  =>  BYOID  can  assist  
  • 12. 12   ©  2014  CA.  ALL  RIGHTS  RESERVED.   IT  Users  and  Business  Users  are  looking  at  BYOID  for  different   reasons   §  Q3:    “What  are  the  main  reasons  for  BYOID  adop1on  in  your   organiza1on  today?  Please  select  all  that  apply.”   –  95%  of  business  users  selected  “To  capture  a4ributes  about  users  from   external  sources”  v.  only  26%  of  IT  users  who  selected  same  AND   –  48%  of  IT  users  also  selected  “To  outsource  password  reset  acLviLes  to   idenLty  providers  ”  v.  only  9%  of  business  users  who  selected  same   §  Key  takeaway:       –  Business  sees  value  in  BYOID  for  gathering  customer  data  whereas  IT  sees   BYOID  as  more  of  a  cost  savings  iniLaLve  
  • 13. 13   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Business  users  and  IT  users  see  different  BYOID  benefits   Top  3  BYOID  Benefits  for  IT  Users   Top  3  BYOID  Benefits  for  Business  Users   IdenLty  ValidaLon-­‐74%   Reduced  fricLon  in  user  experience-­‐78%   Contractor  on-­‐boarding-­‐57%   Simplified  engagement  for  end  users-­‐  75%   Fraud  /  risk  evaluaLon  &  reducLon-­‐55%   IdenLty  ValidaLon-­‐63%   Q18.  “Which  BYOID  benefits  are  of  most  interest  to  your  organiza1on?  Select  all  that  apply   •  Targeted  marke1ng   •  Fraud/risk  evalua1on   •  Iden1ty  valida1on   •  Contractor  on-­‐boarding,     •  Reduced  fric1on  in  user  experience,     •  Simplified  engagement  for  end  users   •  Increased  revenue   •  Security  enhancements   •  Access  to  fresh  iden1ty  informa1on  
  • 14. 14   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Ranking  IdPs  that  you  would  accept  at  your  employer   Top  Ranked  IdP   for  IT  User   Lowest  Ranked   IdP  for  IT  User   Top  Ranked  IdP   for  Business   User   Lowest  Ranked   IdP  for   Business  User   USA/Canada   PayPal   Yahoo   PayPal   Yahoo   Australia   PayPal   Yahoo   Amazon   Facebook   Brazil   PayPal   Yahoo   Yahoo   LinkedIn   France   PayPal   Yahoo/Facebook   Amazon   Google   Germany   PayPal   Yahoo   Microsoq   Google   India   PayPal   Yahoo   PayPal   Facebook   Italy   PayPal   Facebook   Amazon   Facebook   UK   PayPal   Yahoo   Microsoq   Google   Q8:    “Please  rank  the  following  iden1ty  providers  in  order  of  interest  to  your  organiza1on.    1  =  of   most  interested  and  7  =  of  least  interest.    If  possible,  please  avoid  1es.”  
  • 15. 15   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Ranking  IdPs  that  you  would  prefer  to  use  as  an  individual   Top  Ranked  IdP   for  IT  User   Lowest  Ranked   IdP  for  IT  User   Top  Ranked  IdP   for  Business   User   Lowest  Ranked   IdP  for   Business  User   USA/Canada   Google   Yahoo   Google   Yahoo   Australia   Google   Yahoo   Amazon   PayPal   Brazil   Google   Yahoo   Google   LinkedIn   France   Google   Yahoo   Amazon   LinkedIn   Germany   Google   Yahoo   Facebook   LinkedIn   India   Google   Yahoo   Facebook   LinkedIn   Italy   Google   Yahoo   Google   Yahoo   UK   Google   Microsoq   Yahoo   LinkedIn   Q9.  “Please  rank  the  following  iden1ty  providers  in  order  of  interest  to  you  as  an  individual   accessing  other  organiza1ons  or  service  providers.    1  =  of  most  interested  and  7  =  of  least  interest.     If  possible,  please  avoid  1es.”  
  • 16. 16   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Preferred  IdPs  as  organizaLon  v.  as  individual   (aggregated  across  all  geographies)   Highest  Priority   Lowest  Priority   QuesKon  8-­‐as  employer   IT  User   PayPal   Yahoo   Business  User   Amazon   Facebook   QuesKon  9-­‐as  individual   IT  User   Google   Yahoo   Business  User   Facebook   LinkedIn   Intriguing  contrast  between  what  business  user  wants  to  use  as  IdP   for  their  employer  v.  what  they  want  to  use  personally  
  • 17. 17   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Features  that  could  accelerate  BYOID  adopLon   Top  3  Preferred  Features  for  IT  Users   Top  3  Preferred  Features  for  Business  Users   IdenLty  validaLon  processes-­‐73%   IdenLty  validaLon  processes-­‐71%   MulL-­‐factor  authenLcaLon-­‐66%   Simplified  user  registraLon-­‐71%   IdenLty  provider  implemenLng  fraud  risk   engines-­‐57%   IdenLty  provider  implemenLng  fraud  risk   engines-­‐37%   Q14.  ““Which  of  the  following  features  would  most  likely  increase  BYOID  adop1on  within  your   organiza1on?  Please  select  all  that  apply.”   •  Mul1-­‐factor  auth   •  Iden1ty  valida1on  processes   •   Iden1ty  provider  implemen1ng  fraud  risk  engines     •  Simplified  user  registra1on   •  SMS  processes  for  user  valida1on   •  Password  recovery  func1onality   •  Risk  based  evalua1on  of  password  recovery  processes  
  • 18. 18   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Supplemental  data  that  would  increase  value  of  IdPs   Top  3  Preferred  Data  for  IT  Users   Top  3  Preferred  Data  for  Business  Users   Validated  phone  number-­‐46%   Current  shipping  address-­‐86%   None  of  the  above-­‐34%   Validated  phone  number-­‐86%   Payment  informaLon-­‐  29%   Payment  informaLon-­‐  73%   Q17.  What  addi1onal  informa1on  or  services  would  increase  the  value  of  the  BYOID   iden1ty  provider?  Please  select  all  that  apply.   •  Current  shipping  address   •  Validated  phone  number   •  Payment  informa1on   •  Access  to  payment  systems   •  None  of  the  above  
  • 19. 19   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Factors  that  would  enhance  BYOID  efforts   Top  3  Preferred  Factors  for  IT  Users   Top  3  Preferred  Factors  for  Business  Users   Mobile  device  factors-­‐52%   Mobile  device  factors-­‐66%   4  digit  PIN-­‐44%   Passive  factors  such  as  geolocaLon-­‐59%   Risk-­‐based  evaluaLon-­‐39%   4  digit  PIN-­‐25%   Q15  “What  factors  would  you  add  to  a  digital  idenLty  to  increase  control  or  scruLny  by   your  organizaLon?  Select  all  that  apply.”   •  4-­‐digit  PIN   •  Passive  factors  such  as  geo-­‐loca1on   •  One-­‐1me  tokens   •  Smart  cards   •  Mobile  device  factors   •  Risk-­‐based  evalua1on  
  • 20. 20   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Conclusion:   A  New  Value-­‐Based  View  of  IdenLty  is  Emerging:   Risk-­‐based  has  dominated  for  the  last  decade  but  that  is  changing   Evolving  towards  a  more  value/customer-­‐centric  view  of  idenKty   Key  is  finding  appropriate  balance  between  both   Value-­‐based  Risk-­‐based   IT/IT  Security   Line  of  Business  
  • 21. 21   ©  2014  CA.  ALL  RIGHTS  RESERVED.   BYOID  is  a  Joint  Responsibility   IT  User  +  Business  User  Must  Collaborate    
  • 22. 22   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Next  Steps  and  Q&A   §  Survey  available  next  Monday   –  Email  me  for  copy  OR   –  Follow  me  on  Twi4er  (@merri4maxim)-­‐I’ll  tweet  bit.ly  link  for  results   §  ParLcipate  in  Tweetchat  on  this  topic   –  July  29  at  1pm  Eastern   –  Follow  hashtag  #TechViews  to  parLcipate   §  External  webinar  on  August  7  with  Larry  Ponemon  to  discuss   survey  results  
  • 23. Senior  Principal,  Product  MarkeLng   Merri4.maxim@ca.com   @merri4maxim   slideshare.net/CAinc   linkedin.com/company/ca-­‐technologies     ca.com   MerriY  Maxim  
  • 24. 24   ©  2014  CA.  ALL  RIGHTS  RESERVED.   Copyright  ©  2014  CA.    All  rights  reserved.      All  trademarks,  trade  names,  service  marks  and  logos  referenced  herein  belong  to  their  respecLve  companies.   No  unauthorized  use,  copying  or  distribuLon  permi4ed.     THIS  PRESENTATION  IS  FOR  YOUR  INFORMATIONAL  PURPOSES  ONLY.  CA  assumes  no  responsibility  for  the  accuracy  or  completeness  of  the  informaLon.   TO  THE  EXTENT  PERMITTED  BY  APPLICABLE  LAW,  CA  PROVIDES  THIS  DOCUMENT  “AS  IS”  WITHOUT  WARRANTY  OF  ANY  KIND,  INCLUDING,  WITHOUT   LIMITATION,  ANY  IMPLIED  WARRANTIES  OF  MERCHANTABILITY,  FITNESS  FOR  A  PARTICULAR  PURPOSE,  OR  NONINFRINGEMENT.    In  no  event  will  CA  be   liable  for  any  loss  or  damage,  direct  or  indirect,  in  connecLon  with  this  presentaLon,  including,  without  limitaLon,  lost  profits,  lost  investment,  business   interrupLon,  goodwill,  or  lost  data,  even  if  CA  is  expressly  advised  of  the  possibility  of  such  damages.