Consumer-Focused Identity Management
- LANGUAGE: English DATE: Thursday, April 14, 2016 TIME: 4:00pm AEST
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos and other traditional businesses with large user bases are finding it hard to grapple with the IAM needs of the services they deliver. What's worse, these organisations are missing out on opportunities to build deep, engaging relationships with their customers through an archipelago-like siloed approach to customer identity.
By simply creating duplicate IAM systems for consumers, often confusing consumer IAM requirements with employee requirements, is not only costly and risky approach, due to the increased attack surface, but lacks the flexibility to make use of the the complex relationships between consumers, organisations, devices and things that the digital transformation is bringing. It also fails to provide a user experience which consumers, accustomed to social media platforms, now expect.
Digital transformation is here to stay, and it is more than just the Internet of Things (IoT). Everyone and everything is connected, and identity is the glue that enables this interconnectivity. Therefore, we need to move from IAM to Identity Relationship Management (IRM).
- The Digital Transformation affects every organization and is here to stay
- Digital Transformation mandates organizational change
- More than humans, everything & Everyone becomes connected. It’s also about Identities of things, devices, services, and apps
- Relationships over identities: customer-organisation, person-person, person-device, organisation-organisation
- Security is a risk – and an opportunity
- Identity is the glue – who or what may get access to what?
- Leverage the popularity of social networking platforms for authentication and basic personal information
- Your requirements are not unique: configuration rather than coding
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.