Consumer-Focused Identity Management
- LANGUAGE: English DATE: Thursday, April 14, 2016 TIME: 4:00pm AEST
Re-thinking the traditional differences between employees and customers: moving from Identity Management to Identity Relationship Management
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos and other traditional businesses with large user bases are finding it hard to grapple with the IAM needs of the services they deliver. What's worse, these organisations are missing out on opportunities to build deep, engaging relationships with their customers through an archipelago-like siloed approach to customer identity.
By simply creating duplicate IAM systems for consumers, often confusing consumer IAM requirements with employee requirements, is not only costly and risky approach, due to the increased attack surface, but lacks the flexibility to make use of the the complex relationships between consumers, organisations, devices and things that the digital transformation is bringing. It also fails to provide a user experience which consumers, accustomed to social media platforms, now expect.
Digital transformation is here to stay, and it is more than just the Internet of Things (IoT). Everyone and everything is connected, and identity is the glue that enables this interconnectivity. Therefore, we need to move from IAM to Identity Relationship Management (IRM).
- The Digital Transformation affects every organization and is here to stay
- Digital Transformation mandates organizational change
- More than humans, everything & Everyone becomes connected. It’s also about Identities of things, devices, services, and apps
- Relationships over identities: customer-organisation, person-person, person-device, organisation-organisation
- Security is a risk – and an opportunity
- Identity is the glue – who or what may get access to what?
- Leverage the popularity of social networking platforms for authentication and basic personal information
- Your requirements are not unique: configuration rather than coding
Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.
In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.