Is Artificial Intelligence the Next Frontier for Identity Management?

Posted by Derick Townsend on 8/12/16 10:16 AM

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels. 

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Security Best Practices

Unexpected Ways IAM Pros Can Help the CMO

Posted by Keri LeBlanc on 8/11/16 10:36 AM

The world of digital business is changing rapidly, and it's highly competitive. Companies can easily lose customers to competitors, in most cases with only a single click. This environment puts pressure on CMOs to innovate and improve customer experience on a scale and at a pace that's never been encountered before. As marketing teams accelerate their efforts to successfully drive top-line growth across a growing array of apps, devices and channels, they are running into obstacles.

The problems they face can seem unrelated, from data breach worries and proving bottom line value to meeting customers’ growing expectations. Yet look closely and you’ll recognize that many of the challenges relate to a single issue—a lack of identity management capabilities that enable marketing teams to manage, secure, and use customer identity data.

Read More

Topics: Consumer Identity and Access Management, Multi-Channel Engagement

Luxury Brands Meticulously Protect Customer Data Privacy and Security

Posted by Michael Tarbet on 8/5/16 9:51 AM

Henry McIntosh is Director of Content Marketing at Twenty One Twelve, a digital marketing agency in the UK serving luxury brands. He is a regular contributor to Luxurious Magazine.

UnboundID: What are some top trends right now for luxury brands in digital marketing?

McIntosh: At the moment visual and video content are key to many strategies. Look at the Twitter, Facebook or website of many luxury brands and strong imagery and professional videos will play an important part of the experience. This predilection to the visual has also seen platforms like Snapchat and Instagram enjoy growing prominence. I feel that live video will become more of a factor in forthcoming years.

Read More

Topics: Security Best Practices, Expert Interviews

Ping Identity Acquires UnboundID to Create the Most Comprehensive Customer Identity Management Platform

Posted by Steve Shoaff on 8/2/16 8:05 AM

Anyone who has recognized important work that needs to be done and then made a commitment to achieving it will understand the excitement that we at UnboundID feel about joining forces with Ping Identity. It’s a step that will advance the work that both companies have been unwaveringly devoted to accomplishing in the Customer Identity and Access Management (CIAM) market.

UnboundID and Ping Identity share a dedication to developing next-generation identity management technologies that address today’s digital business challenges. Through our partnership over the last several years, we have successfully combined our complementary identity access, directory and user management products into powerful solutions for some of the world’s leading companies. This acquisition will allow us to amplify this work at the scale, speed and reach that the identity management market needs as it experiences rapid change.

Read More

Topics: Consumer Identity and Access Management

Are You Asking the Right Data Access Questions?

Posted by Ishan Kumar on 7/29/16 9:30 AM

Traditionally, Identity and Access Management (IAM) was focused on allowing or denying access to data storage systems, but today, protecting identity data is far more complex. The growing digital ecosystem and increasing cyber risks mean that organizations are faced with securing data across multiple channels and apps against a varying range of threats. With so many potential vulnerability points, not every app or person should have access to all of the data in a profile, particularly highly sensitive and valuable Personally Identifiable Information (PII).

In this multichannel, multi-threat environment, answering the question, "Who can access the data?" isn't going to provide adequate defenses. The more effective question is, "What data can each app, service or business function access?"

Read More

Topics: Consumer Identity and Access Management, Security Best Practices, Videos

Customer Data Boosts ROI for Digital Marketing

Posted by Bjorn Aannestad on 7/28/16 7:30 AM

Dave Chaffey is CEO and co-founder of digital marketing advice site Smart Insights. He has been recognized as one of 50 marketing ‘gurus’ worldwide who have shaped the future of marketing by the Chartered Institute of Marketing.

UnboundID: Social media channels continue to shift. Microsoft just bought LinkedIn, SnapChat is the fastest growing social media app. Twitter seems to be on the downside. How do you view the latest changes for marketers?

Chaffey: It’s important to keep a close eye on the changing fortunes of the main social networks since those that were most effective in the past won’t necessarily work now. Marketers need to change their focus and experiment with the new organic and paid options to influence their audiences. For example, Google has recently introduced Customer Match that allows you to show ads to your customers based on data about those customers that you share with Google. Instagram and Snapchat have also introduced new ad options within the last 12 months.

Read More

Topics: Consumer Identity and Access Management, Multi-Channel Engagement, Expert Interviews

Include a Unified Customer Profile In Your Growth Strategy

Posted by Dave Malcolm on 7/22/16 8:00 AM

Derric Haynie is a startup and growth marketer and founder of SplashOPM, a San Diego-based marketing agency.

UnboundID: What’s the role of customer identity management in marketing today?

Haynie: I am betting that new technologies over the next few years will allow better ways for marketers to manage and use customer data. I'm also envisioning a world where customers manage their own data and what they share with companies.For now, it's mostly a jumbled mess, with either too little or too much data, not enough analysis and insights, and not enough structured learning. Being a "data-driven" marketer is not an option; it should be implied.

Read More

Topics: Customer Experience, Consumer Identity and Access Management, Expert Interviews

The Internet of Things Demands a New Identity Management Approach

Posted by Steve Shoaff on 7/20/16 9:30 AM

A study conducted by BI Intelligence predicts there will be 24 billion Internet of Things (IoT) devices by the year 2020. It’s a staggering growth rate that signals dramatic changes for the way we live, how brands connect with customers, and how businesses manage operations.

According to new research from Forrester, Identity and Access Management (IAM) is at the center of IoT’s evolution. IoT is about increasing software control of the physical world. That entails managing billions of connections between devices and humans. The result is the emergence of a new IAM discipline, IAM for IoT.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT)

Liberate Customer Identity Data with Strong Security

Posted by Emeka Obianwu on 7/15/16 10:00 AM

Customer identity data can be your greatest asset. When your entire organization accesses and uses the data to engage with customers in one-to-one personalized interactions, make data-driven decisions, or provide relevant marketing offers, everyone wins. Customers have a better experience with your brand. Sales go up.

But there is a dark force holding businesses back from realizing this goal. Data breaches. The fear of theft and misuse prevents many organizations from using customer identity data to its full potential. Security concerns cause many data security teams and Identity and Access Management (IAM) pros to limit the flow of valuable information within the organization. What’s more, they often create cumbersome login and identity verification processes that result in bad user experiences for customers trying to access their accounts.

Read More

Topics: Customer Experience, Security Best Practices

Why You'll Regret DIY Customer Identity Management

Posted by Keri LeBlanc on 7/14/16 9:00 AM

Digital business is rapidly changing identity management. In the past, organizations only had to focus on managing workforce identities. Today this scope has expanded to managing millions of customer identities in support of new mobile apps and digital services—and the requirements are entirely different. From extreme scale fluctuations (like holiday sales spikes) to complex data security and privacy policies, customer identity management demands more capabilities.

It can be tempting to opt for a homegrown solution when evaluating customer data management solutions. A do-it-yourself identity management solution built with a NoSQL database is attractive. These big data systems can be simple to deploy and they are often cheap, or even free. Developers, in particular, are drawn to them because NoSQL is schema-less, it’s easy to write apps in this environment, and these databases can be deployed in the cloud. Plus, they offer infinite scalability. What’s not to love?

Read More

Topics: Big Data, Consumer Identity and Access Management, Videos