SlideShare uma empresa Scribd logo
1 de 37
CONFIDENTIAL AND PROPRIETARY
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain
information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
© 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Felix Gaehtgens
The Important Role of Consumer IAM in the
Digital Transformation
1 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Conversion
Retention
Advocacy
ConsiderationAwareness
Start
Consumer identity
and access
management
(CIAM) enables the
digital customer
experience. It is a
foundational
element of your
digital
transformation!
Awareness Consideration Conversion Retention Advocacy
2 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Key Issues
1. CIAM and the digital transformation overview
2. CIAM features
3. CIAM architectural considerations
4. CIAM market landscape
3 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Key Issues
1. CIAM and the digital transformation overview
2. CIAM features
3. CIAM architectural considerations
4. CIAM market landscape
4 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
CIAM and the Digital Customer Relationship
Consumer IAM
Customer
Experience
Privacy &
Compliance
Security
Digital Customer Relationship
5 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Customer Experience
Connect
 Registration
 Authentication
Retain
 Engagement
and loyalty
 Customer
identity analytics
 Marketing
integration
Collect
 User profile
management
 Preference
management
6 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Privacy and Compliance
Legal
Audit &
Compliance
Security
Risk
Management
Board of
Directors
PII
Protection
Russia
PDPA
Social
Media
TOS
Consumer
Bill of
Rights
GDPR
Privacy
Shield
CASL
COPRA
WCAG
7 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Security: The Six Principles Of Resilience
Business Outcomes
Risk-Based
Data Flows
Facilitator
Detect and
Respond
Principle of
Trust and
Resilience
People-Centric
Identity^
8 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
CIAM Requirements
 Identify customers across multiple channels.
 Create customer engagement through a seamless user experience.
 Collect first-party data about customers.
 Unify customer data across platforms.
 Enable customization, branding and personalization.
 Prevent fraud and secure data.
 Protect consumer privacy.
 Integrate with marketing and master data management systems.
9 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Key Issues
1. CIAM and the digital transformation overview
2. CIAM features
3. CIAM architectural considerations
4. CIAM market landscape
10 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Not Your Parent's IAM System
Employee Consumer
Medium to Large Scale Massive
Centralized Control Distributed
Business Focus Individual
Captive Audience Volunteer
Limited & Structured Data Vast & Unstructured
11 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Registration
 Moves user from an anonymous user to a
known user:
– Represents a shift in the relationship between the
business and the user
 Provides an opportunity for data collection
 Lays the foundation for a rich customer identity
Subscription
Social sharing
JIT
provisioning
Registration
Progressive
profiling
12 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Registration "Lite"
 Growing demand for lite touch registrations:
– Subscription Only:
 Email registration
 No password required
– Social Identity:
 Connectivity to common social platforms
 Data sharing
– JIT provisioning
13 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Registration: Account Creation
 Simplicity is king!
– Prebuilt templates
– Conditional workflows
– Check boxes
– Prepopulation of fields
 Customizations and branding
– Extensions and APIs to support
UI customizations and
integration with existing UIs
14 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Identity Proofing
 Verifies the authenticity and identity of a user and helps prevent fraud
 Common in high assurance CIAM use cases:
– Financial transactions
– Health related transactions
Collect
evidence
from the applicant
Verify
the claimed
identity
exists
Verify
the claimed
identity
belongs to
the applicant
1 2 3
15 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
- Consumers demand low or no touch authentication mechanisms.
- CIAM authentication methods bleed into EIAM use cases.
 Username and password (old school)
 Social login
 SMS
 Push
 Biometrics (replacing passwords)
Authentication
16 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Setting the standard!
Consumer IAM
solutions highly utilize
industry standards
including:
 SAML
 OAuth
 OpenID Connect
 Simplified sign-on with social login.
 Unified customer experience:
– SSO across web applications and other
digital touchpoints.
– SSO across multiple accounts split by
brand/company/product, etc.
 Universal logout.
Authentication: SSO
17 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
 Continuously evaluate risk
 Make authentication decisions
based on behavior
 Balance security and usability:
– Stepup based on behavior:
 Low-risk behavior = seamless authn.
 High-risk = stronger authn.
Authentication: Adaptive
18 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
User Profile Management
 Allow users to manage all aspects of their user profile:
– Identity data
– Social links
– Marketing opt-in and opt-out
– Preferences
– Passwords
 Create customer identity data incrementally and over time
 Enhance identity data to create deeper and more meaningful
relationships with customers
19 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
CIAM vendors must stay well-informed on data protection & privacy
laws as well as social providers' terms of service in order to remain in
compliance with ever-changing policies.
 Transparency and control are essential to a CIAM offering:
– Consent at login, registration and defined interactions
– Control of social attribute sharing
– View and manage all consents
– Opt-in and opt-out
– Account disassociate/delete
Preference Management
20 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Audit, Reporting & Security Analytics
 Focus on protecting both the business' assets and consumers' privacy
 Differs from enterprise IAM audits
 Includes:
– Reporting
– Real-Time Monitoring
– Fraud Detection
– Behavioral/Contextual Analysis
– SIEM and GRC Integration
21 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Key Issues
1. CIAM and the digital transformation overview
2. CIAM features
3. CIAM architectural considerations
4. CIAM market landscape
22 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Data Storage
 Scale, scale, scale:
– More and more organizations are hosting identity repositories in the cloud
 Must support structured and nonstructured data
 Must handle complex relationships
 Identity store must be extensible:
– Schema extensions
– Unlimited attributes on user record
– Fully indexed data
– Able to pull in additional detail
23 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Data Aggregation
CIAM VDS
24 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Mobile Optimized, Omnichannel Experience
Social
Media
Smart
Mobiles
Physical
Store
Online
Catalog
Websites
Gaming
Consoles
Kiosks
Computers
25 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Digital Touchpoint Consumer Digital Product/Service
IoT
26 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Performance, Scale and Availability
 Always available 24/365:
– Load balancing
– Failover
– Data replication
 Performance at scale:
– Subsecond logins
– Traffic spikes
– Millions of users
10s
100K
1M
25M
500M
27 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Security and Compliance
 Providers should be ISO 27001 certified
 Implement advanced access controls and permissions:
– Group membership
– Role-based access control
– Fine-grained access control (e.g., only your own patient records)
– Support for multiple authentication methods
 Data encryption (at rest and in transit)
 Adherence to data residency and retention laws:
– Vendors are responding to new requirements
28 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Master Data Management/Marketing Integration
 Identity data provides valuable customer insights
 May integrate with common MDM, marketing and customer relationship
management systems:
– Bidirectional integration
 May be some overlap between CIAM tool and marketing tools:
– Determine data flows
– Determine which system is performing what functions
 Support for CIAM analytics varies among vendors
29 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
I've Got an API for That!
 Buy, build or both?
 Indicative of early market
and developer focus.
 Driven by need to customize
and brand (agile Mode 2 operations).
 Mature solutions must support
both APIs and GUI.
30 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Degree of Productization Versus Method of Customization
Limited
Agility
Full-
Featured
and Agile
Homegrown
Limited
Function
Custom Product
API
API and GUI
31 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
IDaaS Versus On-Premises
IDaaS Software
Software platform and installation ease
Software maintenance and upgrade ease
Security and data protection
Privacy
Agility
— Worse — Better
32 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Key Issues
1. CIAM and the digital transformation overview
2. CIAM features
3. CIAM architectural considerations
4. CIAM market landscape
33 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Vendors — Deployment Approach
Gigya
Janrain
LoginRadius
IDaas
Microsoft
Okta
Salesforce
ForgeRock
Oracle
Own
Instance
Radiant Logic
Varies
Auth0
CA
Technologies
IBM
Ping Identity
34 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
Vendor Venn
Diagram
Enterprise
Marketing
Developer-Focused
Auth0
Gigya
CA
Technologies
Janrain
LoginRadius
ForgeRock
Oracle
Microsoft
IBMSalesforce Okta
Radiant Logic
UnboundID
Ping Identity
35 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
 IAM teams engage your digital business peers, today!
 Build a CIAM solution that:
– Provides a seamless customer experience
– Protects consumer data and privacy
– Secures your business assets
 Consider the impact of mobile and IoT initiatives on CIAM
requirements.
 Utilize push and biometric authentication mechanisms
 Put end users in the driver's seat with consent management
Recommendations
36 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.
 Match scale of implementation to vendor capabilities across multiple
dimensions (authentication volume, number of databases, etc.).
 Consider if you require a tool that is tailored for developers or
business people or both.
 Understand how CIAM innovations may enhance EIAM initiatives.
Recommendations

Mais conteúdo relacionado

Mais procurados

Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamForgeRock
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyForgeRock
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustForgeRock
 
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley StevensonIdentity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley StevensonForgeRock
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
Connected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the WheelConnected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the WheelForgeRock
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Identity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko OreniusIdentity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko OreniusForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
Sydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your CustomersSydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your CustomersForgeRock
 
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...ForgeRock
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinForgeRock
 

Mais procurados (20)

Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
 
Identity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley StevensonIdentity Live Sydney 2017 - Ashley Stevenson
Identity Live Sydney 2017 - Ashley Stevenson
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Connected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the WheelConnected Car: Putting Digital Identity Behind the Wheel
Connected Car: Putting Digital Identity Behind the Wheel
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Identity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko OreniusIdentity Live London 2017 | Marko Orenius
Identity Live London 2017 | Marko Orenius
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Sydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your CustomersSydney Identity Summit: Know (and Serve) Your Customers
Sydney Identity Summit: Know (and Serve) Your Customers
 
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 

Semelhante a Gartner - ForgeRock Identity Live 2017 - Dusseldorf

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Enterprise Management Associates
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMData Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMGigya
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceGigya
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesBenjamin Canner
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTPoulomiMukherjee12
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access managementTatiana Grisham
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management Gigya
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMData Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMGigya
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...PaaSword EU Project
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceCloudera, Inc.
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, ConvertGigya
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertIan Gilbert
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerGigya
 
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...Gigya
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
 
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...WSO2
 

Semelhante a Gartner - ForgeRock Identity Live 2017 - Dusseldorf (20)

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMData Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAM
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMData Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAM
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
 
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
 

Mais de ForgeRock

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilForgeRock
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraWhat the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraForgeRock
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote ForgeRock
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David BirchWhere Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David BirchForgeRock
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysForgeRock
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCForgeRock
 

Mais de ForgeRock (20)

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraWhat the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica Lara
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David BirchWhere Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Gartner - ForgeRock Identity Live 2017 - Dusseldorf

  • 1. CONFIDENTIAL AND PROPRIETARY This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Felix Gaehtgens The Important Role of Consumer IAM in the Digital Transformation
  • 2. 1 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Conversion Retention Advocacy ConsiderationAwareness Start Consumer identity and access management (CIAM) enables the digital customer experience. It is a foundational element of your digital transformation! Awareness Consideration Conversion Retention Advocacy
  • 3. 2 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
  • 4. 3 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
  • 5. 4 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. CIAM and the Digital Customer Relationship Consumer IAM Customer Experience Privacy & Compliance Security Digital Customer Relationship
  • 6. 5 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Customer Experience Connect  Registration  Authentication Retain  Engagement and loyalty  Customer identity analytics  Marketing integration Collect  User profile management  Preference management
  • 7. 6 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Privacy and Compliance Legal Audit & Compliance Security Risk Management Board of Directors PII Protection Russia PDPA Social Media TOS Consumer Bill of Rights GDPR Privacy Shield CASL COPRA WCAG
  • 8. 7 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Security: The Six Principles Of Resilience Business Outcomes Risk-Based Data Flows Facilitator Detect and Respond Principle of Trust and Resilience People-Centric Identity^
  • 9. 8 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. CIAM Requirements  Identify customers across multiple channels.  Create customer engagement through a seamless user experience.  Collect first-party data about customers.  Unify customer data across platforms.  Enable customization, branding and personalization.  Prevent fraud and secure data.  Protect consumer privacy.  Integrate with marketing and master data management systems.
  • 10. 9 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
  • 11. 10 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Not Your Parent's IAM System Employee Consumer Medium to Large Scale Massive Centralized Control Distributed Business Focus Individual Captive Audience Volunteer Limited & Structured Data Vast & Unstructured
  • 12. 11 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Registration  Moves user from an anonymous user to a known user: – Represents a shift in the relationship between the business and the user  Provides an opportunity for data collection  Lays the foundation for a rich customer identity Subscription Social sharing JIT provisioning Registration Progressive profiling
  • 13. 12 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Registration "Lite"  Growing demand for lite touch registrations: – Subscription Only:  Email registration  No password required – Social Identity:  Connectivity to common social platforms  Data sharing – JIT provisioning
  • 14. 13 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Registration: Account Creation  Simplicity is king! – Prebuilt templates – Conditional workflows – Check boxes – Prepopulation of fields  Customizations and branding – Extensions and APIs to support UI customizations and integration with existing UIs
  • 15. 14 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Identity Proofing  Verifies the authenticity and identity of a user and helps prevent fraud  Common in high assurance CIAM use cases: – Financial transactions – Health related transactions Collect evidence from the applicant Verify the claimed identity exists Verify the claimed identity belongs to the applicant 1 2 3
  • 16. 15 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. - Consumers demand low or no touch authentication mechanisms. - CIAM authentication methods bleed into EIAM use cases.  Username and password (old school)  Social login  SMS  Push  Biometrics (replacing passwords) Authentication
  • 17. 16 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Setting the standard! Consumer IAM solutions highly utilize industry standards including:  SAML  OAuth  OpenID Connect  Simplified sign-on with social login.  Unified customer experience: – SSO across web applications and other digital touchpoints. – SSO across multiple accounts split by brand/company/product, etc.  Universal logout. Authentication: SSO
  • 18. 17 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.  Continuously evaluate risk  Make authentication decisions based on behavior  Balance security and usability: – Stepup based on behavior:  Low-risk behavior = seamless authn.  High-risk = stronger authn. Authentication: Adaptive
  • 19. 18 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. User Profile Management  Allow users to manage all aspects of their user profile: – Identity data – Social links – Marketing opt-in and opt-out – Preferences – Passwords  Create customer identity data incrementally and over time  Enhance identity data to create deeper and more meaningful relationships with customers
  • 20. 19 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. CIAM vendors must stay well-informed on data protection & privacy laws as well as social providers' terms of service in order to remain in compliance with ever-changing policies.  Transparency and control are essential to a CIAM offering: – Consent at login, registration and defined interactions – Control of social attribute sharing – View and manage all consents – Opt-in and opt-out – Account disassociate/delete Preference Management
  • 21. 20 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Audit, Reporting & Security Analytics  Focus on protecting both the business' assets and consumers' privacy  Differs from enterprise IAM audits  Includes: – Reporting – Real-Time Monitoring – Fraud Detection – Behavioral/Contextual Analysis – SIEM and GRC Integration
  • 22. 21 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
  • 23. 22 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Data Storage  Scale, scale, scale: – More and more organizations are hosting identity repositories in the cloud  Must support structured and nonstructured data  Must handle complex relationships  Identity store must be extensible: – Schema extensions – Unlimited attributes on user record – Fully indexed data – Able to pull in additional detail
  • 24. 23 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Data Aggregation CIAM VDS
  • 25. 24 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Mobile Optimized, Omnichannel Experience Social Media Smart Mobiles Physical Store Online Catalog Websites Gaming Consoles Kiosks Computers
  • 26. 25 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Digital Touchpoint Consumer Digital Product/Service IoT
  • 27. 26 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Performance, Scale and Availability  Always available 24/365: – Load balancing – Failover – Data replication  Performance at scale: – Subsecond logins – Traffic spikes – Millions of users 10s 100K 1M 25M 500M
  • 28. 27 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Security and Compliance  Providers should be ISO 27001 certified  Implement advanced access controls and permissions: – Group membership – Role-based access control – Fine-grained access control (e.g., only your own patient records) – Support for multiple authentication methods  Data encryption (at rest and in transit)  Adherence to data residency and retention laws: – Vendors are responding to new requirements
  • 29. 28 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Master Data Management/Marketing Integration  Identity data provides valuable customer insights  May integrate with common MDM, marketing and customer relationship management systems: – Bidirectional integration  May be some overlap between CIAM tool and marketing tools: – Determine data flows – Determine which system is performing what functions  Support for CIAM analytics varies among vendors
  • 30. 29 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. I've Got an API for That!  Buy, build or both?  Indicative of early market and developer focus.  Driven by need to customize and brand (agile Mode 2 operations).  Mature solutions must support both APIs and GUI.
  • 31. 30 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Degree of Productization Versus Method of Customization Limited Agility Full- Featured and Agile Homegrown Limited Function Custom Product API API and GUI
  • 32. 31 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. IDaaS Versus On-Premises IDaaS Software Software platform and installation ease Software maintenance and upgrade ease Security and data protection Privacy Agility — Worse — Better
  • 33. 32 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Key Issues 1. CIAM and the digital transformation overview 2. CIAM features 3. CIAM architectural considerations 4. CIAM market landscape
  • 34. 33 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Vendors — Deployment Approach Gigya Janrain LoginRadius IDaas Microsoft Okta Salesforce ForgeRock Oracle Own Instance Radiant Logic Varies Auth0 CA Technologies IBM Ping Identity
  • 35. 34 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Vendor Venn Diagram Enterprise Marketing Developer-Focused Auth0 Gigya CA Technologies Janrain LoginRadius ForgeRock Oracle Microsoft IBMSalesforce Okta Radiant Logic UnboundID Ping Identity
  • 36. 35 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.  IAM teams engage your digital business peers, today!  Build a CIAM solution that: – Provides a seamless customer experience – Protects consumer data and privacy – Secures your business assets  Consider the impact of mobile and IoT initiatives on CIAM requirements.  Utilize push and biometric authentication mechanisms  Put end users in the driver's seat with consent management Recommendations
  • 37. 36 © 2017 Gartner, Inc. and/or its affiliates. All rights reserved.  Match scale of implementation to vendor capabilities across multiple dimensions (authentication volume, number of databases, etc.).  Consider if you require a tool that is tailored for developers or business people or both.  Understand how CIAM innovations may enhance EIAM initiatives. Recommendations