Fueling Digital Innovation with Customer Identities

  • LANGUAGE: English DATE: Tuesday, April 19, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Fueling Digital Innovation with Customer Identities

How to manage customers' identities and access, at scale, for better user experiences

Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining information from various sources (registration forms, devices, social accounts, etc.) to provide optimal user experiences is now a prerequisite for customer-facing enterprises.

By following this path, brands have the opportunity to turn unidentified website, mobile application, and connected device users into known, identified customers.

This KuppingerCole webinar outlines the following challenges:

  • Providing reliable identity information for both business decisions and security
  • Accompanying a visitor from first interaction to being a loyal customer
  • Aggregating preferences and interaction history within user profiles
  • Merging existing external data adequately (social profile data, data provided by commercial databases, existing CRM and help desk systems, etc.)
  • Connecting every entity in an IoT ecosystem via identity

Matthias Reinwarth, Senior Analyst at KuppingerCole, will provide an introduction to Customer Identity and Access Management (CIAM) and its requirements, which include: massive scale, security, privacy, flexibility, time to market, performance and availability.

Matthias will be joined by Suresh Sridharan, Senior Director of Technology & Product Strategy at Gigya, who will provide an overview of CIAM use cases, architecture, challenges, benefits, best practices, and live CIAM implementations.


Speakers

Watch now

Downloads

Presentation, KuppingerCole

Presentation, Gigya

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00