The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018
- LANGUAGE: English DATE: Thursday, October 12, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Consumer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last few years to meet evolving business requirements. Many businesses and public-sector organizations are finding that they must provide better digital experiences for and gather more information about the consumers who are using their services. Enterprises want to collect, store, and analyze data on consumers to create additional sales opportunities and increase brand loyalty.
Many organizations are currently looking into deploying their own CIAM programs, because they recognize CIAM’s potential to provide better marketing insights, improve customer registration experience and increase security. However, in the light of the upcoming data protection regulations like GDPR, which will profoundly change the way personal information collection is regulated, you must be especially careful and well-prepared for hot inter-departmental discussions concerning your future CIAM plans. Remember: even an inadvertent violation of the new compliance regulations can be extremely costly.
In this webinar, you will learn about 4 major functional areas of CIAM and the business value they can deliver:
- Consent management
- Authentication trends
- Improved user experiences
In the first part of this webinar, John Tolbert, Lead Analyst at KuppingerCole, will describe how Consumer Identity solutions differ from traditional IAM systems. He will cover the 8 functional areas listed above.
In the second part, Eric Maass, Director of Identity and Access Management Strategy at IBM, will provide detailed recommendations for planning a successful CIAM program for the highly connected consumer.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.