Consumer-Focused Identity Management
- LANGUAGE: English DATE: Thursday, April 14, 2016 TIME: 4:00pm AEST
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos and other traditional businesses with large user bases are finding it hard to grapple with the IAM needs of the services they deliver. What's worse, these organisations are missing out on opportunities to build deep, engaging relationships with their customers through an archipelago-like siloed approach to customer identity.
By simply creating duplicate IAM systems for consumers, often confusing consumer IAM requirements with employee requirements, is not only costly and risky approach, due to the increased attack surface, but lacks the flexibility to make use of the the complex relationships between consumers, organisations, devices and things that the digital transformation is bringing. It also fails to provide a user experience which consumers, accustomed to social media platforms, now expect.
Digital transformation is here to stay, and it is more than just the Internet of Things (IoT). Everyone and everything is connected, and identity is the glue that enables this interconnectivity. Therefore, we need to move from IAM to Identity Relationship Management (IRM).
- The Digital Transformation affects every organization and is here to stay
- Digital Transformation mandates organizational change
- More than humans, everything & Everyone becomes connected. It’s also about Identities of things, devices, services, and apps
- Relationships over identities: customer-organisation, person-person, person-device, organisation-organisation
- Security is a risk – and an opportunity
- Identity is the glue – who or what may get access to what?
- Leverage the popularity of social networking platforms for authentication and basic personal information
- Your requirements are not unique: configuration rather than coding
Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it challenging to identify appropriate passwordless and phishing resistant authentication solutions that are simple, effective, and secure.