KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Privacy has become a global concern, with regulations such as GDPR coming into effect. In this context, e-commerce businesses that operate globally cannot simply adopt data protection regulations of a single country/region. Supporting each and every regulation as they emerge is challenging and greatly increases the maintenance cost. Furthermore, these kinds of regular modifications can lead to poor customer experiences.
Leveraging well-known privacy by design principles into your system design strategy is a long-term and sustainable solution for most of these privacy challenges. Once these principles are adopted, it is possible to achieve each individual privacy regulation compliance easily with minimum time and effort. This talk introduces a number of well-known privacy by design principles and explores how they implemented in real-world scenarios. This talk also highlights the benefits of each of these principles with potential implications.
Privacy has become a global concern, with regulations such as GDPR coming into effect. In this context, e-commerce businesses that operate globally cannot simply adopt data protection regulations of a single country/region. Supporting each and every regulation as they emerge is challenging and greatly increases the maintenance cost. Furthermore, these kinds of regular modifications can lead to poor customer experiences.
Leveraging well-known privacy by design principles into your system design strategy is a long-term and sustainable solution for most of these privacy challenges. Once these principles are adopted, it is possible to achieve each individual privacy regulation compliance easily with minimum time and effort. This talk introduces a number of well-known privacy by design principles and explores how they implemented in real-world scenarios. This talk also highlights the benefits of each of these principles with potential implications.
When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organization the consumer typically does this with two contrasting expectations. On the one hand, the consumer wants to benefit from the organization as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their products and services through various channels and deploying various types of devices. It is essential to know the relevant attributes of that customer at the right time: An improved user experience leads to customer satisfaction and thus to returning customers.
Our world is becoming more digital and more mobile every day. The sensitivity of information being exchanged online grows rapidly and data privacy is a real concern to many people.
How are we facing new challenges to keep pace with today's digital transformation?
Getting rid of all paper flows, taking KYC-process to the next level, improve customers’ experience, introduce a safer way to login and confirm transactions, be compliant with EU regulations and PSD2.
Creating a digital ID in a country is one of the solution, but it requires more then just technology.
This panel will explore contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users. Learn best practices from data protection & privacy experts on how to use the latest defenses to secure your organization against the latest threats and to offer your customer a smooth customer journey without fears.
In the digitalized world, passwords are not sufficient anymore to protect digital logins and transactions. What’s even worse: In 81 percent of all cases, they are the main reason for a hack. Once a password is stolen, it opens the doors to fraudulent use and data theft. Furthermore, since most consumers link their online accounts at Amazon, eBay or Twitter to their Facebook or Google account, attackers only have to hack one password in order to gain access to the entire range of applications. This also enables them to easily compromise the complete digital identity of a user. All these examples show, that passwords are outdated. Their single application for the protection of digital identities is not only careless, but very harmful. However, there is a remedy, which is reliable and widely available today: the 2- or multi-factor authentication (2FA/MFA). Providers of online portals and services can offer their users a broad range of easy-to-use tokens, which relieve consumers of the burden to remember another password – from push tokens that only have to be confirmed by tapping the “OK” field on the smartphone’s touchscreen to scanning a QR code with the smartphone’s camera. In his presentation, Dr. Amir Alsbih explains the latest challenges and solutions in the protection of digital identities and illustrates how consumers can benefit of new MFA technologies.
In an ever-changing and rapidly evolving world, the fight about the customer is getting tougher. Companies that can offer a customer-centric approach have the advantage. With new technologies such as mobile, internet of things, social media, and big data, the approach towards customers is getting redefined.
During this presentation, TrustBuilder’s Sales Director for Benelux Kurt Berghs will give some industry-based examples of how policy-based Customer Identity and Access Management (CIAM) can help with these new challenges.
For different markets such as finance, insurance, HR and retail, a secure CIAM provides better and more flexible services to consumers such as using social media accounts, adaptive authentication, single sign-on or even customer onboarding. Attribute-based access control helps to put your customer’s expectations first in an automated business landscape.
Consent Management is a crucial aspect of PSD2 and GDPR regulation. At initial thought, consent seems to be simple but from legal and regulatory perspective its complexity arises. Managing consent within an organization should be well planned with all units of businesses and audit trail to prove the veracity of the consent should be tied to identity and security systems of the organization.
Customer Experience (CX) is the central starting point when it comes to the strategic definition of your CIAM. The management of millions of identities and the handling of several millions of interactions per day is a technical challenge that changes every day. However, ease of use, efficiency and joy of use by the customer are indispensable prerequisites. At the same time, it is imperative that every consumer can control access to his personal data.
Managing customer information in a digitally changing economy with many business partners in need of access is one of today's biggest challenges and will continue to evolve rapidly. Understanding the wishes and requirements of customers and mapping them successfully in CIAM processes is a key to successful online business. The customer has a constantly growing selection of service providers online, your CIAM is one of the levers with which you can inspire customers for your business, and to achieve a lasting customer loyalty to your company
Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for advertisers and every other data mining company. But if we do care, what are the implications for marketers? What does it mean for the generation of products and services we develop?
This session will highlight how we rationalize or perceive data-privacy, why we care, and what we expect from companies when it comes to our own data. This session will explore and explain how understanding individuals’ expectation about privacy, and the principle of behavioral economics will have an enormous impact on how companies conduct business today and more importantly, tomorrow.
Obviously, our work at Hub Airports has already radically changed the Consumer’s expectations of how their Identity is to be handled at Airport Border Control; since we were on the front page of the Times, the Telegraph and NYT; as well as over 150 other publications. Gateless border control and multiple biometrics, coupled with self-managed crypto-identity will be the future. This may seem travel-specific, but the same identity that will get you into a country will also open a fully authorized bank account - with KYC/AML and the relevant National FinCrime agency approval. So with WEF involvement, this work is making quite a wide impact.
Blockchain, Identity and Privacy: Three words that buzz, fade and mature.
The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how security and privacy can be enhanced by blockchain technology and outline the challenges ahead. Further, we discuss If and when blockchain-based identity projects reach critical mass in terms of user adoption, they could help get more decentralized services off the ground.
How are companies, consumers and authorities taking the new regulation?