Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
- LANGUAGE: English DATE: Tuesday, September 11, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in advance, your customer's needs has on the one hand become a must. On the other hand, GDPR is significantly limiting the way how to create such intelligence through collecting personally identifiable data.
In looking at a new balance between Marketing Automation and greatly personalized customer experience, it is becoming tougher to remain compliant and - secure.
Join this Webinar and learn more about:
- How to optimize the customer experience
- How to combine GDPR requirements with your future CIAM strategy
- How IoT affects CIAM
In this webinar, KuppingerCole´s CIAM expert and Lead Analyst John Tolbert will introduce you into the requirements of a future-proof CIAM strategy, with some special focus on “CIAM-as-a-Service.”
In the second presentation, Sadrick Widmann, CPO of WidasConcepts will talk about how Big Data and the Internet of Things are changing CIAM, as well as concepts for intelligent fraud detection in CIAM environments. He will give a practical view of how CIAM works as a foundation for marketing automation and personalized services. He will also discuss with you the influence of IoT on CIAM and how to address it in your CIAM strategy.
cidaas, the European cloud identity and access management system from Widas ID GmbH, delivers an out-of-the-box solution for federated identities, single sign-on and multi-factor authentication. With cidaas, companies create unique user identification and maximum security across all channels. Based on the standards OAuth2.0, OpenID and its “Everything is an API” architecture, cidaas can be seamlessly integrated into any software landscape and scales effortlessly up to many millions of users. For more information on cidaas, please visit our website https://www.cidaas.com
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.