User recognition and authentication is becoming the central element of companies' digitalisation strategy. Not only are user registration and login the first experiences users make, Identity and Access management will ultimately determine which company recognises and serves the needs of its users best and will be successful in the market.
What you can expect
Thanks for the introduction and warm. Welcome for my side. I'm happy to be back on stage after so long, maybe a short introduction to myself. My name's C I'm product manager at CDA. CDAs is a clouded anti access management solution developed and designed here in Germany. And my keynote will be about, give me 10 minutes. I give you the truth about identity, quite a sensational audience grabbing title. So let's see what can happen in 10 minutes. Nowadays, first of all, in 2020 13 million logins to Facebook happened in 10 minutes overall in 20 with 21 more than 5.2 million records get compromised every 10 minutes. And I'm quite sure every 10 minutes, one user throws away his computer because he hates to enter a password. That leads us to a question. Why do we still need passwords nowadays? Let's have a look at the change in the last decades. Let's start with changes. Overall. In the organizational perspective, we see industrial automation, especially based on mainframes and PCs. We also see business process transformation important there client server, internet coming into game, and then the digital transformation with mobile cloud and big data technologies happening there. Now we are in the stage of intelligent enterprises with intelligent technologies, especially predictions, recommendations, and more the same. We, we see in a communication. We are now with smartphones, smart watches, smart devices.
So we see quite big changes in the last decades and especially rapid changes. If you take a look at authentication, username and password is still the predominant form of authentication owning the recent couple of years, maybe 10 years biometric authentication came into game and that especially on mobile devices, so 60 years and no change, we still use an authentication concept developed to give users access to one device. We still use that authentication concept for users with many devices, many different digital services to get deeper into that. Let's have a look at what is identity. We often talk about identity is equal user and user is equal access. So is that all? What do we miss? Especially in context of intelligent enterprises and intelligent technologies, what we have seen now,
First of all, there's not one identity. We have identities in different roles. So starting for example, with this lady as a doctor or as a private person, interacting with friends, especially in the year in the last year, we also have seen that that can be become more blur. So especially if I'm at home, home office doing sports there that all gets more blur. So we have this young lady being in context of a family as a mother, we have seen in the context of her profession. So being a doctor, she's an employee, maybe an employer, and we have seen the person. So this young lady as a friend that might not be something new, that's not a big insight, but especially if you transferred that insight to use cases, for example, to a theme park that gets important because this young lady can visits a theme park three times a week, always in a different role.
First on Friday, she has a team event with her colleagues. She goes there as an employee on Saturday, she goes there with a group of friends, enjoying the theme park on Sunday. Then she comes there with her family in each of these use cases or in these scenarios, she wants to have different offers, personalized offers and recommendations. If she's there with the family, she might not go to big roller coasters. If she's there with colleagues, she might decide for activities where, where they can participate as a group, even more. We also have different trust levels. We have weak to strong identities taking the co the use case of a theme park. The, the lady can sign up for a newsletter because she's interested in the theme park. When, when then she's a weak identity. Moving on visiting the theme park, she buys a ticket, gives her first name, last name, mobile number, maybe the address.
Then she's a strong identity that gets even more if you include identity verification. So transferring that to another use case, let's take insurance. We have a completely different scenario, but also their trust levels. I'm interested in an insurance. I'll sign up. I'm a weak identity. I want to prepare for a contract. I'll provide all my details. I'm a stronger identity. When I sign up for the I'm the strongest form of identity, I need identity verification to sign my insurance contract, and that has implications. So these identity status has implic or have implications to how I can treat my users, how I can treat the different identities in the context of security. I can treat users with more data or less data differently. If I have more data, I can use behavioral clustering. I can use fraud detection, mechanisms, feed them with the data I have.
And in case of a suspicious behavior, maybe ask for multifactor. So intercept the login process and secure the lockin in a better way, but it's also important for the user experience. So what is the importance of identity, the user experience moving away from the password. If I know more about the user, about the context where he's using the identity, I might be also able to offer him his preferred locking method. So in context, he wants to use his smartwatch for push authentication. I can offer him that way here. I can also offer him in another context, biometric locking options, so I can completely get away from the authentication with password. But as we have heard in the opening keynote, it's not only about authentication. It's about the complete customer journey. So identity is the key to digital journey. What we have learned in the opening keynote, and that's especially the same here.
We have the user identity of the targeted user. So our young lady in the context of mother, friend, or employee, having all the history in the eCommerce or a movie history in Netflix, whatever, and I have similar users also there, I need the identity. I can feed a prediction system with that and can generate recommendations, all of that. And then I have the option to really provide a perfect personalized customer journey. But also there, we miss one important point. We focus on digital identity, but we need to get rid of the digital identity only perspective because many companies have a digital and the real world scenario. And it's often the challenge to close this gap or to do, to do the jump from real world to digital identity or vice versa. In worst case, I end up being stuck on a wired fence between traditional and digital world. But what I need to achieve is a handshake between both and linking digital and real world identity. Only in that aspect, I can provide a full, perfect, personalized customer journey meeting as well as the digital world as well. The real world scenarios, we have had a look at our customer base. 95% of our customers do have real world use cases.
And at least 25% of our customers are already using real world at anti linking features by CS that's because even the real world is a main revenue stream or at least a big revenue stream in their site. So to sum up what we have seen, what you should take out of these 10 minutes, first of all, it's quite crucial to link the digital and the real world identity. A user is more than the access and the person is more than the identity, what we have seen. And last, what we've heard this morning already, the identity is key to a great customer experience or to a digital journey. And now I would say have a great dinner, enjoy a cocktail light or the barbarian evening and see you all later.
How can we help you