Tackling Data Privacy Challenges with Identity Management

Posted by Bjorn Aannestad on 3/25/16 9:30 AM

Concerns over data privacy are growing as consumers share more data across more subsections of their lives. Studies have shown that customers don’t mind sharing their data in exchange for value in the form of discounts or information; but they expect brands to ask their permission and to protect their privacy. As Spotify discovered last year when it sparked customer outrage over changes to its privacy policy, people are paying close attention to how brands manage their valuable information. It’s becoming a defining criterion for brand loyalty.

In addition to elevated privacy demands from customers, businesses are grappling with evolving regulations. An increase in privacy data legislation is only one factor contributing to the complexity of meeting compliance requirements. Another aspect of the regulatory landscape posing challenges for IT, security and privacy professionals is that policies are in a state of flux. The recent revocation of Safe Harbor is just one example of the profound disruptive effects that changing legislation can have on organizations. Plus, the wide range of different regulations in play for each geographic region presents additional issues for any business with a global customer base.

Read More

Topics: Consumer Identity and Access Management, Privacy and Preference Management

Machine Intelligence and the Customer Experience

Posted by Keri LeBlanc on 3/23/16 9:30 AM

David Raab is a consultant specializing in marketing technology and analysis for clients in financial services, retail, communications and other industries. His current work is focused on designing marketing architectures and selecting marketing tools. Raab has written hundreds of articles for DM Review, DM News and other industry publications. He blogs regularly here.

UnboundID: Recently you wrote about the shift from transactional to relationship buying in the consumer economy. How is this playing out today in marketing, sales strategies?

Raab: Think of the Nest thermostat. We don’t often think much of thermostats. We never had a relationship with the company that makes thermostats before. But now you get this thing and you train it and it communicates with you. It knows more about you than you might imagine. The consumer must think more carefully about whom they are entrusting all that data with and consider, what if the thermostat maker is sharing data with some I don’t want to have it. So, trust is key here, in that you aren’t sharing data on your customers without asking first. Transparency is also really important. It doesn’t mean you have a document that is 20 pages long and no one reads. It means you have a simple document that explains what you are doing. People should be able to choose to some degree how you use their data, through opt in and opt out capabilities. Finally, trust is a matter of branding. Trust in the company is more important to me than whatever technology the company is using.

Read More

Topics: Customer Experience, Expert Interviews

Identity Management Is Integral to Omnichannel Success

Posted by Emeka Obianwu on 3/17/16 8:30 AM

Mark Davis is a Consulting Enterprise Architect at Advanced Technology Group. His specialties include ecommerce, mobile web, enterprise architecture, enterprise transformation, portfolio management and data management.

UnboundID: You have been an IT architect for many years. How has the role changed over the years?

Davis: Architecture as it relates to my career path has been a constant evolution toward higher levels of strategic planning. The earliest work I did in architecture was at the application or system level; then we added systems of systems, domains, and finally the enterprise as a whole. It’s been a migration from coding to enterprise planning and transformation. Over the last 10 years, the need for enterprise architecture has popped up in most companies I worked for where it used to not exist at all. Now it is a well-funded and recognized area.

Read More

Topics: Multi-Channel Engagement, Expert Interviews

Obama's SXSW Apple, FBI Remarks Fuel Privacy Debate

Posted by Derick Townsend on 3/16/16 1:06 PM

During a keynote speech at the 2016 SXSW Interactive Festival, President Barack Obama addressed some of the hot issues currently facing the technology community, including the debate over data privacy. Obama briefly touched on the Apple vs. FBI case in which the FBI wants Apple to create an iOS that will enable access to encrypted, password-protected data from the terrorists behind the San Bernardino shooting last year. Obama argued that in certain cases, there should be concessions around granting government access to data, or in a sense, he says, “…everybody is walking around with a Swiss bank account in their pocket.”

While these are only sound bites that don’t include the full context and balance of Obama’s remarks, these excerpts are indicative of how politicized this issue has become. Particularly in an election year, this subject has become polarizing, and that presents risks for a decision with so much at stake.

Read More

Topics: Security Best Practices, Privacy and Preference Management, Videos

Pervasive Ad Blocking Drives Need for Personalized Customer Experience

Posted by Dave Malcolm on 3/11/16 8:30 AM

In the past three months, mobile ad blocking app installs grew by 3X. It’s an alarming statistic for publishers and advertisers. They recognize that ad blocking’s increasing popularity has the potential to be a disruptive force for their business models that rely on reaching large audiences to drive revenue. 

The debate between ad blocker companies and the advertising and publishing industries is only just beginning, and it’s heated. At the Mobile World Congress last month, a conference session turned into a contentious battle between ad blocker startup, Shine, CEO Roi Carthy and advertising executives, including Benjamin Faes, managing director of media and platforms at Google. Shine’s technology enables network-level ad blocking, and it has already signed several major telecommunications companies in Europe.

Read More

Topics: Mobile Apps, Customer Experience

Knocking Down Barriers to Internet of Things Adoption

Posted by Ishan Kumar on 3/9/16 9:30 AM

From smart cities and smart factories to smart homes and wearables, we are just beginning to scratch the surface of possible use cases for connected devices. The Internet of Things (IoT)has the potential to collect valuable data from all facets of our lives and use it to make tasks more convenient, save money, and create a greener world, to name a few of the benefits. For example, smart grid initiatives in cities are expected to achieve $10.7 billion savings annually by 2019 through reduced energy consumption and emissions in smart cities. Additionally, smart homes are expected to save consumers as much as 10 percent

Businesses are rapidly pushing forward with IoT initiatives by connecting 5.5 million new things each day. However, we still have a long way to go before IoT is widely adopted and becomes an everyday part of mainstream life. Market entry barriers to IoT are lower than ever before with low-priced devices, processing power and Internet bandwidth combined with fast computational and network speeds. Yet, there are steep challenges that need to be addressed before IoT poses more possibilities than problems. 

Read More

Topics: Internet of Things (IoT)

Apple vs. FBI Exposes Privacy as Barrier to IoT

Posted by Steve Shoaff on 3/2/16 9:56 AM

By refusing to give the FBI access to the San Bernardino terrorists' iPhone data, Apple CEO Tim Cook has found himself at the center of a polarizing issue. The final outcome has implications that go far beyond the company's policies. This controversy could be considered a defining moment for personal data privacy rights, and people are loudly voicing their opinion. 

Some are applauding Apple's stance on preventing the government from accessing the terrorists' data. Others feel that Apple is making a mistake that risks national security. Either way, reactions to the event demonstrate that people deeply care about how companies protect their personal information from hackers, governments and businesses. 

Read More

Topics: Privacy and Preference Management, Videos

Data Security Threats Could Be Lurking Inside Your Organization

Posted by Michael Tarbet on 3/1/16 10:35 AM

When we think of data breaches, we typically think of external hackers stealing personally identifiable information (PII), often with the intent of gaining access to bank accounts, medical records or insurance funds. Yet, this stereotype doesn’t represent the full scope of data breach scenarios. There is another source of data theft that is often overlooked—employees.

Forty-three percent of data breaches occur at the hands of someone within the company. While some of these incidents are the result of human error, others are not so innocent. But regardless of the intent behind them, these data breaches carry serious consequences for brands including costly legal reparations and long-lasting brand damage. 

Read More

Topics: Consumer Identity and Access Management, Security Best Practices

Identity Management Is Changing and Businesses Are Adapting

Posted by Caroline Castrillon on 2/26/16 12:33 PM

Nick Edwards is Senior Enterprise Architect with Identity Solutions, an IT consultancy in Melbourne, Australia. He has more than 25 years of experience in the IT industry, predominantly in the telecommunications, banking, automotive, transportation and education sectors.

UnboundID: What are your clients’ greatest challenges right now in identity management from both a technological and strategic viewpoint?

Edwards: In the past, clients were primarily working with just a few large packaged software applications in a Windows server environment. It was common to use the Windows Active Directory platform to store identity information. Now, many companies are adopting cloud applications and infrastructure. This means you’ve got multiple applications residing on premise, multiple applications in the cloud, and suddenly users are having to login to applications and services using a dozen different credentials. At the same time, companies are now storing a lot of data on consumers and partners and other outsiders. So the main challenge is to provide the right access to the right people. The key pain points are usability, productivity and not slowing people down at work. These challenges and goals haven’t changed too much over the years but the complexity of the IT environment with more infrastructure environments and applications has made all this very challenging. Finally of course there is security, which is much more difficult today with BYOD and mobility.

Read More

Topics: Cloud Computing, Expert Interviews

How to Manage Customer Data to Make the Most of a Merger or Acquisition

Posted by Bjorn Aannestad on 2/25/16 9:30 AM

In 2015 mergers and acquisitions reached record high numbers as companies sought ways to grow market share, boost revenues, and reduce costs in an unpredictable economy. Thanks to the continuation of many of the same market forces, 2016 has the potential to become another year of unprecedented merger and acquisition activity according to Forbes. Within the first quarter alone, we’ve already seen many high profile deals, including Cisco’s acquisition of the Internet of Things company Jasper Technologies, which we explored in a recent video blog.

Data is playing an increasingly important role in the positive benefits that a merger or an acquisition can deliver such as rapid growth during a slowly recovering economy or higher stock valuations. Digital business depends on data, particularly customer data, to function, and this data is being recognized more and more as a valuable business asset. Organizations are paying closer attention to how data is handled as it is transferred from one entity to another.

Read More

Topics: Customer Experience, Security Best Practices

Get our Latest Blog Updates