Payment Services Directive (PSD2)

Blog

The Power of Utility in the Future of Marketing

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab In the future, marketing will be driven neither by demographics, on- or off-line behavioral identifiers or psychographics, but by understanding and fulfilling the individual utility expectations of the…

Executive View

Executive View: Entrust IdentityGuard for Enterprise - 71321

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and…

Webcast

Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Just like traditional IAM, CIAM requires identity governance to verify and maintain the required quality of the identity attributes collected from consumers. “Quality over quantity” should be your motto from now on: not only it ensures that the data your marketing and business…

Blog

The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry

The EU’s General Data Protection Regulation (GDPR) will force many changes in technology and processes when it comes into effect in May 2018.  We have heard extensively about how companies and other organizations will have to provide capabilities to: Collect explicit consent…

Webcast

The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018

Many organizations are currently looking into deploying their own CIAM programs, because they recognize CIAM’s potential to provide better marketing insights, improve customer registration experience and increase security. However, in the light of the upcoming data protection…

Leadership Brief

Leadership Brief: Why Adaptive Authentication Is A Must - 72008

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

Executive View

Executive View: Ubisecure Identity Server - 70838

Ubisecure Identity Server is an integrated consumer identity and access management suite for on-premise deployment. Ubisecure Identity Cloud is for cloud-based deployments. Ubisecure features strong federation capabilities and the ability to leverage some bank and national IDs.

Webcast

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices

As opposed to traditional monolithic applications, a (micro)service-based architecture comprises multiple loosely coupled modules (“services”) that serve specific business purposes and communicate over lightweight network protocols. Such services can be developed, deployed and…

Blog

CIAM Vendor Gigya to be Acquired by SAP Hybris

This past weekend we learned that Gigya will be acquired by SAP Hybris.  California-based Gigya has been a top vendor in our CIAM Platforms Leadership Compass reports. Gigya offers a pure SaaS CIAM solution, and has one of the largest customer bases in the market.  SAP’s…

Webcast

Heather Flanagan - Consumer ID will Move GDP

Heather Flanagan talks about the confidence that is needed to accelerate the digital economy and now business and governments can work together toward that common goal of growing the economy.  Digital ID is how we get the confidence as a platform to grow the economy.

Webcast

Eve Maler - UMA deep dive - GDPR, PSD2 - pivot to CIAM

Presentation at the Kantara Workshop

Webcast

What is CIAM and why do we need it?

Panel discussion at the Kantara Workshop

Webcast

John Tolbert - The CIAM Solutions Market

KuppingerCole's Lead Analyst John Tolbert presents the findings from a recently published Leadership Compass on CIAM solutions

Webcast

Steve Tout - Risk Aware IAM for an Insecure World

In a world full of uncertainties and data breaches, Identity and Access Management (IAM) must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction. With such large-scale breaches becoming…

Blog

Recapping CIW Seattle 2017

Last week we completed the opening dates on the Consumer Identity World Tour in Seattle.  To kick off the event, the Kantara Initiative held a one-day workshop to showcase the work that they do.  Kantara is an international standards organization which develops technical…

Webcast

Jason Rose - Getting to Know You: Building Deep Customer Relationships Gradually through Progressive Identity

Webcast

Colin Wallis - Programmatic advertising is dead, long live Consumers! Really?

The truly awful practice of tracking through cookie matching may finally have found its nemesis in combined effects of ad blockers, new browsers, and the GDPR.  But there is still a big headwind to be navigated before we can say the job is done. What could be the role of industry…

Webcast

Grad Conn - Marketing to the Future: A CMO’s Roadmap for Customer Experience Management

Webcast

Phil Lam - It Takes a Village to Protect Your Customers Online

When large-scale breaches occur, they not only hurt the impacted service but also erode the trust our customers have in online commerce as a whole. Protecting our customers online can no longer be a siloed activity but need to be coordinated among service providers to ensure customers…

Webcast

The User Experience Panel

The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the…

Webcast

How to Work Together in a Privacy Preserving Way to Mitigate Risks

Digital identity is central to all electronic transactions. Prevention of credential misuse is the first responsibility of identity management professionals today. Proper identity management includes identity vetting, issuance of credentials, risk-appropriate authentication and…

Webcast

Christian Goy - The “Why” Behind Customer Journeys

People are notoriously unreliable witnesses to their own thoughts and motivations. However, the ability to design behavior-based solutions is the common denominator of every successful modern brand. Behavioral science is the way to navigate the chaos of choice and during this keynote we…

Webcast

Tim Maiorino - GDPR is coming, what is it and why does it affect me anyway?

As if Data Protection wasn't regulated to the bone already, Europe has come up with a new set of rules introducing a new level of regulation – in terms of detail, scope and in terms of applicability. The new rules have significant impact on how business are required to structure their…

Webcast

Christian Goy - Approaching Tomorrow Through a New Lens

We share how understanding the human mind and the principle of behavioral economics can alter the way we approach product ideas, new thinking and what the future might/could look like, let's say, for self-driving cars or smart cities.

Webcast

Ryan Fox - The Role of Financial Institutions in Providing Trusted Identities Beyond Banking

Keynote at the Consumer Identity World 2017 in Seattle, USA

Webcast

From Dumb Cookies to Informed Consent: Privacy-by-design as a Strategic Requirement

This panel includes a look at the GDPR requirements, with an emphasis on the business opportunities for creating closer customer relationships when moving to informed consent; including the ability to potentially convince customers of moving to non-freemium models and paying for better…

Executive View

Executive View: iWelcome IDaaS and CIAM - 70298

iWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers with GDPR compliance, and as such as provides unparalleled consent management features.

Executive View

Executive View: VeriClouds CredVerify™ - 72567

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

Advisory Note

Buyer’s Guide: Consumer Identity and Access Management Solution - 70259

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs…

Webinar

Oct 12, 2017: The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018

Consumer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last few years to meet evolving business requirements. Many businesses and public-sector organizations are finding that they must provide better…

Blog

A Short History of EIC - Europe's Leading Event on Digital ID & Transformation

More than 12 years ago, the first EIC attracted an already surprisingly large number of practitioners dealing with directory services, user provisioning and single sign-on, as well as vendors, domain experts, thought leaders and analysts. I remember Dick Hardt giving an incredibly visionary…

Executive View

Executive View: Auth0 Customer Identity Management - 71053

Auth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business - to - Employee (B2E), and Business - to - Business (B2B) scenarios. Auth0’s Customer Identity Management solution is focused on developers an d as such is highly…

Webinar

Oct 17, 2017: Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Consumer Identity and Access Management is a fast-growing market. Emerging just a few years ago, it has quickly evolved to become an indispensable tool for many organizations to improve the reach and targeting of their marketing activities, increase the number of new customer registrations…

Blog

General Data Protection Regulation – Rather an Evolution Than Revolution

Guest post by Tim Maiorino, Counsel of Osborne Clarke The newest EU legislation on data protection is the General Data Protection Regulation (GDPR) which will be enforceable from May 26th 2018. It will bring several important changes, altering the requirements of data protection law in the…

Blog

Tomorrow’s Customer Journey Starts In The Buyer's Head

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab The world of customer journeys is a terrible mess. The linear path to purchase does not exist. “Predictable shopping patterns, once so fundamental to marketing and advertising strategy, have gone…

Blog

Finally: Building up Trust as a Foundation for Sustainable Business Strategies

It seems almost ironical, but the currently and constantly growing number of legal and regulatory requirements might be the important (and first actually working) catalyst for changing the attitude of organizations towards privacy. While the true rationale behind it are most probably the…

Blog

IBM Moves Security to the Next Level – on the Mainframe

In a recent press release, IBM announced that they are moving security to a new level, with “pervasively encrypted data, all the time at any scale”. That sounded cool and, after talks with IBM, I must admit that it is cool. However, it is “only” on their IBM Z…

Executive View

Executive View: SecureAuth IdP - 71327

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service.       

Webinar

Sep 28, 2017: Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices

In the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are…

Blog

The Return of Authorization

Authorization is one of the key concepts and processes involved in security, both in the real world as well as the digital world.  Many formulations of the definition for authorization exist, and some are context dependent.  For IT security purposes, we’ll say authorization…

Executive View

Executive View: Telekom Magenta Security - 70342

Unter der Bezeichnung Magenta Security werden alle Angebote für  Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und  zählt damit zu den ersten Adressen für…

Executive View

Executive View: Gigya Identity Enterprise - 70299

Gigya provides a complete solution for  Consumer Identity and Access Management. Entirely cloud - based, Gigya delivers advanced consumer identity and marketing service  functionality for enterprise customers.

Webcast

Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience

Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and…

Blog

GDPR vs. PSD2: Why the European Commission Must Eliminate Screen Scraping

The General Data Protection Regulation (GDPR) and Revised Payment Service Directive (PSD2) are two of the most important and most talked about technical legislative actions to arise in recent years.  Both emanate from the European Commission, and both are aimed at consumer protection.…

Executive View

Executive View: Signicat - 72537

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements.

Blog

PSD2 – the EBA’s Wise Decision to Reject Commission Amendments on Screen Scraping

In a response to the EC Commission, the EBA (European Banking Authority) rejected amendments on screen scraping in the PSD2 regulation (Revised Payment Services Directive) that had been pushed by several FInTechs. While it is still the Commission’s place to make the final decision, the…

Executive View

Executive View: IdentityX® from Daon - 71312

Daon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk,…

Blog

At the Intersection of Identity and Marketing

Digital Transformation is driving a diverse set of business initiatives today, including advanced marketing techniques, creating new consumer services, acquiring better customer information, and even deploying new identity management solutions.  As organizations discover new and…

Blog

PSD2: Strong Customer Authentication Done Right

The Revised Payment Services Directive (PSD2), an upcoming EC regulation, will have a massive impact on the Finance Industry. While the changes to the business are primarily based on the newly introduced TPPs (Third Party Providers), which can initiate payments and request access to account…

Press Release

Analyst Companies Publish Survey about the Current State of Identity and Access Management in Organizations on behalf of BetaSystems

Wiesbaden, June 29th, 2017 – KuppingerCole Ltd., an international and independent analyst organization with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation, together with CXP Group, an independent…

Survey

State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003

The „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well…

Survey

Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003

Organizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most…

Leadership Brief

Leadership Brief: 5 Steps to Consumer Identity and Access Management - 72549

Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance.

Webcast

How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation

The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels. Employees are also bringing consumer digital habits into the workplace and merging their home and…

Leadership Brief

GDPR and PSD2: Challenges and Opportunities for CIAM

GDPR and PSD2 will pose enormous technical challenges. Learn more about the challenges and opportunities and how CIAM solutions can help organizations comply with these new regulations. This Leadership Brief shows the slides which correspond with the keynote KuppingerCole Lead Analyst…

Webinar

Jul 19, 2017: Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience

Digital Transformation is all about following the connected consumer into the new world of digital services, throughout all available channels, highly individualized, privacy aware, compliant and value driven "by design". CIAM describes the underlying infrastructure enabling your business to do so.

Advisory Note

Advisory Note: Identity in IoT - 70282

The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding notions of digital identity has been problematic to date, but identity management solutions…

Webcast

Denis Joannides - Empowering the Digital Insurers

In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to a digital Insurer. Denis discusses the importance of a secure infrastructure including…

Webcast

Identity 2.0: The Next Generation of Customer Identity

Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and…

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for…

Webcast

Architecting a Digital Strategy for PSD2 and Open Banking

PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe and in the UK respectively. The regulations require that banks operating across the region…

Webinar

Jun 27, 2017: How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation

The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels.

Press Release

European Identity & Cloud Awards 2017

Wiesbaden, May 11, 2017 – Last night the European Identity & Cloud Awards 2017 were presented by KuppingerCole at the 11th European Identity & Cloud Conference (EIC). The awards honor outstanding projects and initiatives in Identity & Access Management (IAM),…

Press Release

KuppingerCole’s 11th European Identity and Cloud Conference 2017

Wiesbaden, May 08, 2017 – The European Identity & Cloud Conference, taking place May 9 – 12, 2017 at the Infinity Ballhaus Forum Unterschleissheim, Munich/Germany , is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and…

Webinar

May 30, 2017: Identity 2.0: The Next Generation of Customer Identity

Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and…

Blog

Follow-Up on “Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards”

The GDPR continues to be a hot topic for many organizations, especially for those who store and process customer data. A core requirement for compliance to GDPR is the concept of “consent,” which is fairly new for most data controllers. Coming up with GDPR is that parties…

Executive View

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Leadership Brief

Leadership Brief: Mobile Connect - 71518

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Webcast

Digital Transformation in Government

Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed…

Webcast

Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards

A core requirement coming up with GDPR is that parties processing personally identifiable information need to ask the user for his/her consent to do so and let the user revoke that consent any time and as easy as it was given. Keeping an audit able trail of consent, scope of use and…

Webinar

May 16, 2017: Architecting a Digital Strategy for PSD2 and Open Banking

PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe and in the UK respectively. The regulations require that banks operating across the region expose…

Blog

GDPR as an Opportunity to Build Trusted Relationships with Consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live…

Webcast

GDPR as opportunity to build trusted relationships with consumers

The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018.

Webcast

Martin Kuppinger - Findings from a Recent KuppingerCole Study on PSD2 Readiness

Webinar

Apr 04, 2017: Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards

Companies that manage consumer identities and personal profiles have a bit more than one year left to comply with the new European General Data Protection Regulation (EU-GDPR).

Press Release

Results from KuppingerCole Study: The Future of Banking - Innovation & Disruption in light of the revised European Payment Services Directive (PSD2)

Wiesbaden, March 02, 2017 – Today KuppingerCole Ltd., an international and independent analyst company with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation published the outcomes of their latest…

Conference

Sep 12 - 13, 2017: Consumer Identity World USA 2017

The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time.

Leadership Brief

Leadership Brief: Securing PSD2 APIs - 72513

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs), Payment Initiation Service Providers (PISPs) and any Third Party Providers (TPPs) to use.

Blog

PSD2 RTS Final Draft: The good and the not-so-good

The European Banking Authority released the final draft of the Regulatory Technical Specifications for PSD2 this week.  It contains several improvements and clarifications, but there are still a few areas that fall short of industry expectations. After the release of the initial…

Blog

GDPR and Customer Data - Eyes on the Stars and Feet on the Ground

Big data analytics is getting more and more powerful and affordable at the same time. Probably the most important data within any organisation is knowledge of and insight into its customer's profiles. Many specialized vendors target these organisations. And it is obvious: The identification…

Conference

Sep 12 - Dec 14, 2017: Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Webinar

Apr 06, 2017: Digital Transformation in Government

Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed…

Executive View

Executive View: AWS Lambda - 72524

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Blog

The Importance of Consent Management: CIAM vs. GDPR

Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights.  Many companies with deployed…

Blog

PSD II, Adaptive Authentication, and Multi-Factor Authentication

The upcoming updated Payment Services Directive (PSD II) will, among other changes, request Multi-Factor Authentication (MFA) for all payments above 10€ which aren’t done electronically. This is only one major change PSD II brings (another major change are the mandatory open…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The Power of Utility in the Future of Marketing

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab In the future, marketing will be driven neither by demographics, on- or off-line behavioral identifiers or psychographics, but by understanding and fulfilling the individual utility expectations of the [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00