Enviar pesquisa
Carregar
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
•
Transferir como PPTX, PDF
•
4 gostaram
•
649 visualizações
ForgeRock
Seguir
ForgeRock Identity Live 2017 - Dusseldorf
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 37
Baixar agora
Recomendados
Amer Sports - ForgeRock Identity Live - Dusseldorf
Amer Sports - ForgeRock Identity Live - Dusseldorf
ForgeRock
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
ForgeRock
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
Identity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike Ellis
ForgeRock
Identity Live Paris 2017 | Marko Orenius, Amer Sports
Identity Live Paris 2017 | Marko Orenius, Amer Sports
ForgeRock
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
Recomendados
Amer Sports - ForgeRock Identity Live - Dusseldorf
Amer Sports - ForgeRock Identity Live - Dusseldorf
ForgeRock
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
ForgeRock
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
Identity Live Paris 2017 | Mike Ellis
Identity Live Paris 2017 | Mike Ellis
ForgeRock
Identity Live Paris 2017 | Marko Orenius, Amer Sports
Identity Live Paris 2017 | Marko Orenius, Amer Sports
ForgeRock
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
ForgeRock
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
ForgeRock
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
ForgeRock
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
ForgeRock
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
ForgeRock
Connected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the Wheel
ForgeRock
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
Identity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko Orenius
ForgeRock
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
ForgeRock
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
ForgeRock
Sydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your Customers
ForgeRock
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
ForgeRock
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
ForgeRock
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
Gigya
White Paper: DIY vs CIAM
White Paper: DIY vs CIAM
Gigya
Mais conteúdo relacionado
Mais procurados
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
ForgeRock
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
ForgeRock
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
ForgeRock
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
ForgeRock
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
ForgeRock
Connected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the Wheel
ForgeRock
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
Identity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko Orenius
ForgeRock
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
ForgeRock
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
ForgeRock
Sydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your Customers
ForgeRock
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
ForgeRock
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
ForgeRock
Mais procurados
(20)
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Connected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the Wheel
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Identity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko Orenius
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
Sydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your Customers
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
Semelhante a Gartner - ForgeRock Identity Live 2017 - Dusseldorf
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
Gigya
White Paper: DIY vs CIAM
White Paper: DIY vs CIAM
Gigya
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Enterprise Management Associates
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Enterprise Management Associates
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAM
Gigya
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
Gigya
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
Benjamin Canner
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
PoulomiMukherjee12
Internal vs. external identity access management
Internal vs. external identity access management
Tatiana Grisham
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
Gigya
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Cloudera, Inc.
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAM
Gigya
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
PaaSword EU Project
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
Cloudera, Inc.
Connect, Collect, Convert
Connect, Collect, Convert
Gigya
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
Ian Gilbert
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
Gigya
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
Gigya
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
WSO2
Semelhante a Gartner - ForgeRock Identity Live 2017 - Dusseldorf
(20)
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: DIY vs CIAM
White Paper: DIY vs CIAM
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Internal vs. external identity access management
Internal vs. external identity access management
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAM
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
Connect, Collect, Convert
Connect, Collect, Convert
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
Mais de ForgeRock
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
ForgeRock
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
ForgeRock
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
ForgeRock
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
ForgeRock
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
ForgeRock
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
ForgeRock
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
ForgeRock
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
ForgeRock
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
ForgeRock
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
ForgeRock
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
ForgeRock
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica Lara
ForgeRock
Identity Live in Austin Keynote
Identity Live in Austin Keynote
ForgeRock
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
ForgeRock
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
ForgeRock
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
ForgeRock
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
ForgeRock
Mais de ForgeRock
(20)
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica Lara
Identity Live in Austin Keynote
Identity Live in Austin Keynote
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
Último
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
ChristopherTHyatt
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Último
(20)
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
1.
CONFIDENTIAL AND PROPRIETARY This
presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Felix Gaehtgens The Important Role of Consumer IAM in the Digital Transformation
2.
1 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Conversion Retention Advocacy ConsiderationAwareness Start Consumer identity and access management (CIAM) enables the digital customer experience. It is a foundational element of your digital transformation! Awareness Consideration Conversion Retention Advocacy
3.
2 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
4.
3 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
5.
4 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. CIAM and the Digital Customer Relationship Consumer IAM Customer Experience Privacy & Compliance Security Digital Customer Relationship
6.
5 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Customer Experience Connect Registration Authentication Retain Engagement and loyalty Customer identity analytics Marketing integration Collect User profile management Preference management
7.
6 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Privacy and Compliance Legal Audit & Compliance Security Risk Management Board of Directors PII Protection Russia PDPA Social Media TOS Consumer Bill of Rights GDPR Privacy Shield CASL COPRA WCAG
8.
7 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Security: The Six Principles Of Resilience Business Outcomes Risk-Based Data Flows Facilitator Detect and Respond Principle of Trust and Resilience People-Centric Identity^
9.
8 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. CIAM Requirements Identify customers across multiple channels. Create customer engagement through a seamless user experience. Collect first-party data about customers. Unify customer data across platforms. Enable customization, branding and personalization. Prevent fraud and secure data. Protect consumer privacy. Integrate with marketing and master data management systems.
10.
9 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
11.
10 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Not Your Parent's IAM System Employee Consumer Medium to Large Scale Massive Centralized Control Distributed Business Focus Individual Captive Audience Volunteer Limited & Structured Data Vast & Unstructured
12.
11 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Registration Moves user from an anonymous user to a known user: – Represents a shift in the relationship between the business and the user Provides an opportunity for data collection Lays the foundation for a rich customer identity Subscription Social sharing JIT provisioning Registration Progressive profiling
13.
12 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Registration "Lite" Growing demand for lite touch registrations: – Subscription Only: Email registration No password required – Social Identity: Connectivity to common social platforms Data sharing – JIT provisioning
14.
13 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Registration: Account Creation Simplicity is king! – Prebuilt templates – Conditional workflows – Check boxes – Prepopulation of fields Customizations and branding – Extensions and APIs to support UI customizations and integration with existing UIs
15.
14 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Identity Proofing Verifies the authenticity and identity of a user and helps prevent fraud Common in high assurance CIAM use cases: – Financial transactions – Health related transactions Collect evidence from the applicant Verify the claimed identity exists Verify the claimed identity belongs to the applicant 1 2 3
16.
15 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. - Consumers demand low or no touch authentication mechanisms. - CIAM authentication methods bleed into EIAM use cases. Username and password (old school) Social login SMS Push Biometrics (replacing passwords) Authentication
17.
16 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Setting the standard! Consumer IAM solutions highly utilize industry standards including: SAML OAuth OpenID Connect Simplified sign-on with social login. Unified customer experience: – SSO across web applications and other digital touchpoints. – SSO across multiple accounts split by brand/company/product, etc. Universal logout. Authentication: SSO
18.
17 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Continuously evaluate risk Make authentication decisions based on behavior Balance security and usability: – Stepup based on behavior: Low-risk behavior = seamless authn. High-risk = stronger authn. Authentication: Adaptive
19.
18 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. User Profile Management Allow users to manage all aspects of their user profile: – Identity data – Social links – Marketing opt-in and opt-out – Preferences – Passwords Create customer identity data incrementally and over time Enhance identity data to create deeper and more meaningful relationships with customers
20.
19 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. CIAM vendors must stay well-informed on data protection & privacy laws as well as social providers' terms of service in order to remain in compliance with ever-changing policies. Transparency and control are essential to a CIAM offering: – Consent at login, registration and defined interactions – Control of social attribute sharing – View and manage all consents – Opt-in and opt-out – Account disassociate/delete Preference Management
21.
20 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Audit, Reporting & Security Analytics Focus on protecting both the business' assets and consumers' privacy Differs from enterprise IAM audits Includes: – Reporting – Real-Time Monitoring – Fraud Detection – Behavioral/Contextual Analysis – SIEM and GRC Integration
22.
21 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
23.
22 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Data Storage Scale, scale, scale: – More and more organizations are hosting identity repositories in the cloud Must support structured and nonstructured data Must handle complex relationships Identity store must be extensible: – Schema extensions – Unlimited attributes on user record – Fully indexed data – Able to pull in additional detail
24.
23 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Data Aggregation CIAM VDS
25.
24 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Mobile Optimized, Omnichannel Experience Social Media Smart Mobiles Physical Store Online Catalog Websites Gaming Consoles Kiosks Computers
26.
25 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Digital Touchpoint Consumer Digital Product/Service IoT
27.
26 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Performance, Scale and Availability Always available 24/365: – Load balancing – Failover – Data replication Performance at scale: – Subsecond logins – Traffic spikes – Millions of users 10s 100K 1M 25M 500M
28.
27 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Security and Compliance Providers should be ISO 27001 certified Implement advanced access controls and permissions: – Group membership – Role-based access control – Fine-grained access control (e.g., only your own patient records) – Support for multiple authentication methods Data encryption (at rest and in transit) Adherence to data residency and retention laws: – Vendors are responding to new requirements
29.
28 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Master Data Management/Marketing Integration Identity data provides valuable customer insights May integrate with common MDM, marketing and customer relationship management systems: – Bidirectional integration May be some overlap between CIAM tool and marketing tools: – Determine data flows – Determine which system is performing what functions Support for CIAM analytics varies among vendors
30.
29 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. I've Got an API for That! Buy, build or both? Indicative of early market and developer focus. Driven by need to customize and brand (agile Mode 2 operations). Mature solutions must support both APIs and GUI.
31.
30 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Degree of Productization Versus Method of Customization Limited Agility Full- Featured and Agile Homegrown Limited Function Custom Product API API and GUI
32.
31 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. IDaaS Versus On-Premises IDaaS Software Software platform and installation ease Software maintenance and upgrade ease Security and data protection Privacy Agility — Worse — Better
33.
32 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
34.
33 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Vendors — Deployment Approach Gigya Janrain LoginRadius IDaas Microsoft Okta Salesforce ForgeRock Oracle Own Instance Radiant Logic Varies Auth0 CA Technologies IBM Ping Identity
35.
34 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Vendor Venn Diagram Enterprise Marketing Developer-Focused Auth0 Gigya CA Technologies Janrain LoginRadius ForgeRock Oracle Microsoft IBMSalesforce Okta Radiant Logic UnboundID Ping Identity
36.
35 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. IAM teams engage your digital business peers, today! Build a CIAM solution that: – Provides a seamless customer experience – Protects consumer data and privacy – Secures your business assets Consider the impact of mobile and IoT initiatives on CIAM requirements. Utilize push and biometric authentication mechanisms Put end users in the driver's seat with consent management Recommendations
37.
36 © 2017
Gartner, Inc. and/or its affiliates. All rights reserved. Match scale of implementation to vendor capabilities across multiple dimensions (authentication volume, number of databases, etc.). Consider if you require a tool that is tailored for developers or business people or both. Understand how CIAM innovations may enhance EIAM initiatives. Recommendations
Baixar agora