KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Customer registration, identity verification, and multi-factor authentication are all critical to reduce fraudulent activity and protect your customers’ identity data. However, they don’t offer the same warm welcome as an instore employee. Join this keynote presentation to learn how to seamlessly convert, engage, and manage millions of customers online—without sacrificing security.
In this keynote we are looking at practically moving existing infrastructures towards the Decentralized Identity world – widely known as Self-Sovereign Identity (SSI). Leveraging the Credential-based Access Control (CrBAC) paradigm, implementing SSI in an enterprise is easier than most people think. We will learn why and how SSI is such a bright way out of the complex and interwoven IAM world still predominant today, more than 11 years after “Dos and Dont´s when Introducing a Compliance Management Tool” in a Role-based Access Control (RBAC) context at EIC 2009.
Many solutions in CIAM focus on authentication, while others have their strengths in integrating with marketing automation. However, there is an additional angle, relevant for both highly regulated industries but also any other industries. It is the onboarding process, regardless of whether specific KYC (Know Your Customer) requirements must be formally met or not.
Martin Kuppinger will talk about the role and approaches of Identity Verification in the context of CIAM and how this maps to the entire onboarding process as well as recurring authentication. He will look at new technologies such as DID (Decentralized Identity), but also discuss how registration can be simplified if lesser requirements apply – e.g. by rethinking the flow and putting registration and verification to the end (or even further back – think about using the first successful shipping as part of verification).
AUDI has developed a worldwide digital ecosystem for its customers. In order to participate at the ecosystem and to consume the provided services a profound CIAM infrastructure has been developed by AUDI. |
Key takeaways: |
|
- CIAM product placement at a premium car manufacturer |
The KCLive Award honors outstanding projects, standards, or people in the field of Identity Management, Cybersecurity and AI.
Consumers are now accessing gated content, customer portals or smart devices in ways and at a scale never seen before. The most successful companies aren’t just focused on providing secure, seamless and painless access for the end-user. They’re also passionate about delivering a customer experience that will help them drive growth. And it starts at the login box.
The challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time. This combination must be taken seriously to provide a smooth Customer Experience (CX) and to guarantee that every consumer can control the access to his personal information. Join this panel to hier the best practise advises of experts in the branch.
Earlier in 2020, the European Union published “A European Strategy for Data” outlining its vision for a connected single digital market where the benefits of the digital economy could enhance the lives of its citizens, residents and trade partners.
However, we now find ourselves at a very real crossroad. A post-pandemic world will be a new type of normal. Amidst the tragic loss of lives there have been breakthroughs in science, new ways of working along with embracing new digital tools.
We are at the beginning of a new design and architectural phase where just because technology can, doesn’t mean it should. Personal data linked to identity, fuelled by AI sits at the centre of these decisions.
Enabling citizens, students, patients, passengers and consumers to more equitably join the value chains fuelled by data will ultimately lead to greater trust and personalisation, resulting in a more prosperous society. However, this will require new commercial models, enforceable regulation and the digital tools to transform our connected society.
This session will focus on the implementation of real-world case studies including standards, commercial models and technology choices.
At the peak of the COVID-19 pandemic, the Province of New Brunswick in Canada needed to enable digital access to COVID-19 test results. Simeio, working with New Brunswick’s Provincial healthcare arm MyHealthNB delivered a digital identity solution. This enabled secure access which was validated against authoritative data sources to proof identity. This also allowed New Brunswick citizens to stay safe and practice social distancing by obtaining results securely and confidentially. |
Healthcare organizations are the most vulnerable from a modernization perspective due to years of lack of investment and focus. The COVID-19 pandemic has put added strain for hospital organizations to modernize and shift their mode of delivery to virtual care. This session will speak about a use-case that highlights challenges a Canadian Province faced and what tools and solutions were developed to deliver expedited access the COVID-19 test results in 18 days.
|
Consumer identity and access management (CIAM) is the connective technology between consumers and brands. CIAM is an important consideration when navigating routes to market for your products and services. A consumer’s journey navigating solutions to problems is where you can leverage the CIAM building blocks — capture, engage, manage and administration — for more personalized campaigns and direct consumer engagement. Read on to learn the meaning and drivers of these building blocks. |
Capture: Every business will need to capture users’ identities and profiles to engage with them in a personal manner. |
With the July 2020 decision of the Court of Justice of the European Union, the „Privacy Shield“ called framework that allowed personal information to be transferred between the EUC und the US; had been invalidated with immediate effect. The only remaining justification to keep on exchanging such information have been the „Standard Contractual Clauses“ (SCC, although they do not fully replace the Privacy Shield. Therefore, the questions now are:
This Keynote session with Dr. Karsten Kinast, LL.M, and KuppingerCole´s CEO Berthold Kerl will be a combination of an initial interview and a q+a part, where you directly can ask your questions.
Consumer identity and access management (CIAM) has arrived in the business processes of digital enterprises. Customers, prospects, devices, things and their relationships are becoming increasingly important. At the same time, the innovation cycles for customer-oriented applications are becoming shorter and shorter. And CIAM itself is facing continuously changing challenges.
The service-oriented paradigm of the KuppingerCole Identity Fabric provides the perfect foundation for a steady evolution. This applies both to the CIAM system itself and to CIAM as a building block of a company-wide identity infrastructure.
Thus the KuppingerCole Identity Fabric serves as the umbrella for an entire IAM architecture. It supports distinctive features for CIAM where required, while ensuring efficiency and reuse wherever possible.