Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience
- LANGUAGE: English DATE: Wednesday, July 19, 2017 TIME: 6:00pm CEST, 12:00 noon EDT, 9:00am PDT
Digital Transformation is all about following the connected consumer into the new world of digital services, throughout all available channels, highly individualized, privacy aware, compliant and value driven "by design". CIAM describes the underlying infrastructure enabling your business to do so.
Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights. Companies and public-sector organizations with deployed CIAM solutions can provide better digital experiences for and gather more information about the consumers who are using their services.
If you want to be a leader in the digitally transformed business world, you need to know your customer very well. The difficulty is not to embarrass the consumer with how much you know about him/her, and to leave him/her the option to withdraw consent. CIAM can be seen as a vital element of marketing automation and as such requires us to rethink the way interaction between business and individual takes place. More consumer driven, very agile and privacy-aware by design.
In the first part of the webinar, John Tolbert, Lead Analyst at KuppingerCole, will give you an introduction to CIAM and how organizations take the first steps to plan and implement. Furthermore, he will discuss the interaction between consumer identity and security and privacy. These topics are related to the latest KuppingerCole Leadership Compass about CIAM Solutions
In the second part Katryna Dow, Founder & CEO from Meeco, talks about how GDPR and PSD2 will change the way businesses collect and use personal data and gives a short preview on how organizations can harness the power of customer consent and innovate beyond compliance.
This Webinar gives a preview of the topics that will be presented at KuppingerCole’s upcoming Consumer Identity World tour. The CIW tour begins in Seattle on September 12-13, will visit Paris on November 28-29, and Singapore on December 14 -15.
KuppingerCole, founded in 2004, is an international and independent Analyst organization headquartered in Europe. The company specializes in offering neutral advice, expertise, thought leadership and practical relevance in Information Security, Identity & Access Management (IAM), Governance (IAG), Risk Management & Compliance (GRC) as well as all areas concerning the Digital Transformation. KuppingerCole supports companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges. Maintaining a balance between immediate implementation and long-term viability is at the heart of KuppingerCole’s philosophy.
As a core element of KuppingerCole’s research, the company provides different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously research and update the company’s online research library, and perform manufacturer-independent advisory services.
Further, KuppingerCole organizes conferences, workshops, and webcasts in all fields of identity focused on information security, IAM, Cloud, Digital Risk and Digital Transformation. KuppingerCole’s yearly European Identity & Cloud Conference is Europe’s leading event for thought leadership and best practice in this area and covers the latest and future topics regarding the challenges in digital business.
KuppingerCole is the best advisory partner in making your business successful in the era of Digital Transformation.
You will find additional information on our website:
For the latest news about KuppingerCole follow us on Facebook and Twitter:
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.