Consumer-Focused Identity Management
- LANGUAGE: English DATE: Thursday, April 14, 2016 TIME: 4:00pm AEST
Re-thinking the traditional differences between employees and customers: moving from Identity Management to Identity Relationship Management
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos and other traditional businesses with large user bases are finding it hard to grapple with the IAM needs of the services they deliver. What's worse, these organisations are missing out on opportunities to build deep, engaging relationships with their customers through an archipelago-like siloed approach to customer identity.
By simply creating duplicate IAM systems for consumers, often confusing consumer IAM requirements with employee requirements, is not only costly and risky approach, due to the increased attack surface, but lacks the flexibility to make use of the the complex relationships between consumers, organisations, devices and things that the digital transformation is bringing. It also fails to provide a user experience which consumers, accustomed to social media platforms, now expect.
Digital transformation is here to stay, and it is more than just the Internet of Things (IoT). Everyone and everything is connected, and identity is the glue that enables this interconnectivity. Therefore, we need to move from IAM to Identity Relationship Management (IRM).
- The Digital Transformation affects every organization and is here to stay
- Digital Transformation mandates organizational change
- More than humans, everything & Everyone becomes connected. It’s also about Identities of things, devices, services, and apps
- Relationships over identities: customer-organisation, person-person, person-device, organisation-organisation
- Security is a risk – and an opportunity
- Identity is the glue – who or what may get access to what?
- Leverage the popularity of social networking platforms for authentication and basic personal information
- Your requirements are not unique: configuration rather than coding
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.