Data-Driven Customer Engagement Is a Mindset, Not a Toolset

Posted by Ishan Kumar on 9/1/16 9:16 AM

Jon Singleton is Co-Founder and Chief Technology Officer of DatumLabs. He has almost two decades of experience designing and implementing database solutions across multiple platforms, for Fortune 500 companies including Automotive, Healthcare, Pet Nutrition, Digital and Direct Marketing Agencies, Technology, Finance, Sports and Retail. 

UnboundID: Many companies are striving to gain a single view of the customer or close to it. What are the data management challenges behind this?

Singleton: It requires a master data management (MDM) process. Implementing MDM in an enterprise is really hard, which is why people don’t want to do it. The challenges stem from the systems they use to compliance needs and defined IT processes. It’s not just the data itself but dealing with the processes that protect the data and manage the data’s movement. When you deal with decision-makers to get budget, they often think about MDM as an out-of-the-box solution, but MDM is not just a toolset. It is a mindset and a combination of processes applied across the enterprise and different data stores to accomplish the MDM goals. Clients with the most success focus on what they want to accomplish, and how can they set things up from a data standpoint to accomplish that. Once they talk through those factors and determine what they want for ROI, selling internally becomes a lot easier.

Read More

Topics: Big Data, Security Best Practices, Expert Interviews

How to Adopt an Identity-Centric Approach to Digital Business

Posted by Bjorn Aannestad on 8/26/16 9:30 AM

We’re quickly moving toward a future that is identity-centric. In the digital world, identities lie at the heart of several different information ecosystems, including big data, marketing technology and the rapidly evolving Internet of Things (IoT). And as these ecosystems become increasingly business-critical, adopting an identity-centric approach to technology infrastructures will be vitally important to customer experience, security and privacy.

So what does an identity-centric approach look like? Many of today’s Identity and Access Management (IAM) solutions were originally developed to manage workforce identities. While they deliver some of the needed capabilities, there are additional considerations required to support a truly identity-centric focus. You need to be able to create a unique identifier for each person. Then you must be able to authenticate the user and authorize their access to various systems and apps. Additionally, you need the ability to manage dynamic profiles that consist of a combination of structured and unstructured data, including demographics, preferences and relationships.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT)

From IoT to Blockchain, the Pace of Digital Evolution Is Accelerating

Posted by Dave Malcolm on 8/25/16 11:14 AM

Phil Windley is an Enterprise Architect in the Office of the CIO at Brigham Young University. He is also the co-founder and organizer of the Internet Identity Workshop (IIW), serves as an Adjunct Professor of Computer Science at BYU, writes the popular Technometria blog, and is the author of the books “The Live Web” (Course Technology, 2011) and “Digital Identity” (O'Reilly Media, 2005).

UnboundID: What were the hot areas of discussion at the latest IIW event?

Windley: Generally, it’s a mix of topics, those that have been part of IIW for a long time, like OAuth and multi-factor authentication. We also had a lot of discussions on block chain technology, the distributed decentralized ledger system for Bitcoin. The key idea of block chain is that it allows you to create an identity system that is not controlled by any single entity. Today, if I log into a website and I have the option of using Google or Facebook credentials to do that, it’s very convenient. It saves people a lot of headaches and also allows for some security wins because Google and Facebook put a lot of effort into building identity systems. Yet the identity is still controlled by those big companies. Not everyone likes that idea. They might be worried about privacy or maybe they don’t have an account at one of those sites and they don’t want to create one. Distributed ledger technology creates a system where everyone can join. It’s not controlled by a single entity, but rather by code written by a group of people. It completely decentralizes the identity management system.

Read More

Topics: Internet of Things (IoT), Cloud Computing, Expert Interviews

Identity Data Security Is Required for Digital Transformation Value

Posted by Steve Shoaff on 8/19/16 10:47 AM

A strong digital presence can help you engage with customers where they spend increasingly more time—on a growing number of mobile apps, online channels and connected devices. Digital business is gaining momentum and companies recognize that digital transformations are business critical. According to a Loudhouse survey, 86% of digital decision makers say that they have two years to make progress on their digital initiatives or fall behind the competitors.

As companies focus on digital transformation, they face many challenges, but one in particular has the potential to threaten the success of not only digital business strategies, but the healthy adoption of digital business as a whole. The issue of securing customer identity data has always been important, yet the negative impact of breaches is growing making it even more crucial to get it right. A recent Ponemon Institute report found that the cost of a data breach has increased by 29% since 2013, and this number is expected to continue rising.

Read More

Topics: Customer Experience, Security Best Practices

Public and Private Collaboration Tackles Identity Management Challenges

Posted by Emeka Obianwu on 8/18/16 9:30 AM

Sarah Squire is a Senior Identity Solution Architect with Engage Identity, a Seattle-based consultancy focused on people-centered solutions for identity and access management. Her work includes advising the HEAlth Relationship Trust (HEART) Initiative at the OpenID Foundation and the User Managed Access (UMA) working group at the Kantara Initiative.

UnboundID: Describe the unique identity management challenges in healthcare and the current efforts to resolve them?

Squire: One of the projects I work on at the OpenID Foundation is the HEART working group. We are a consortium of public and private entities. One of the use cases that we are working on right now is what we call the clipboard problem. A patient being treated for an illness might be seeing dozens of different providers and each time they go in for an office visit they have to fill out new intake forms. It’s tedious, and it’s a problem that is easy to solve with technology. Doing so can make the whole system more efficient and safer. There are many people such as the elderly, those with low literacy levels, and those for whom English is a second language who have difficulty completing these forms. Those individuals in particular could hugely benefit from being able to just click a button to release information from one provider to another.

Read More

Topics: Consumer Identity and Access Management, Expert Interviews

Is Artificial Intelligence the Next Frontier for Identity Management?

Posted by Derick Townsend on 8/12/16 10:16 AM

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels. 

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Security Best Practices

Unexpected Ways IAM Pros Can Help the CMO

Posted by Keri LeBlanc on 8/11/16 10:36 AM

The world of digital business is changing rapidly, and it's highly competitive. Companies can easily lose customers to competitors, in most cases with only a single click. This environment puts pressure on CMOs to innovate and improve customer experience on a scale and at a pace that's never been encountered before. As marketing teams accelerate their efforts to successfully drive top-line growth across a growing array of apps, devices and channels, they are running into obstacles.

The problems they face can seem unrelated, from data breach worries and proving bottom line value to meeting customers’ growing expectations. Yet look closely and you’ll recognize that many of the challenges relate to a single issue—a lack of identity management capabilities that enable marketing teams to manage, secure, and use customer identity data.

Read More

Topics: Consumer Identity and Access Management, Multi-Channel Engagement

Luxury Brands Meticulously Protect Customer Data Privacy and Security

Posted by Michael Tarbet on 8/5/16 9:51 AM

Henry McIntosh is Director of Content Marketing at Twenty One Twelve, a digital marketing agency in the UK serving luxury brands. He is a regular contributor to Luxurious Magazine.

UnboundID: What are some top trends right now for luxury brands in digital marketing?

McIntosh: At the moment visual and video content are key to many strategies. Look at the Twitter, Facebook or website of many luxury brands and strong imagery and professional videos will play an important part of the experience. This predilection to the visual has also seen platforms like Snapchat and Instagram enjoy growing prominence. I feel that live video will become more of a factor in forthcoming years.

Read More

Topics: Security Best Practices, Expert Interviews

Ping Identity Acquires UnboundID to Create the Most Comprehensive Customer Identity Management Platform

Posted by Steve Shoaff on 8/2/16 8:05 AM

Anyone who has recognized important work that needs to be done and then made a commitment to achieving it will understand the excitement that we at UnboundID feel about joining forces with Ping Identity. It’s a step that will advance the work that both companies have been unwaveringly devoted to accomplishing in the Customer Identity and Access Management (CIAM) market.

UnboundID and Ping Identity share a dedication to developing next-generation identity management technologies that address today’s digital business challenges. Through our partnership over the last several years, we have successfully combined our complementary identity access, directory and user management products into powerful solutions for some of the world’s leading companies. This acquisition will allow us to amplify this work at the scale, speed and reach that the identity management market needs as it experiences rapid change.

Read More

Topics: Consumer Identity and Access Management

Are You Asking the Right Data Access Questions?

Posted by Ishan Kumar on 7/29/16 9:30 AM

Traditionally, Identity and Access Management (IAM) was focused on allowing or denying access to data storage systems, but today, protecting identity data is far more complex. The growing digital ecosystem and increasing cyber risks mean that organizations are faced with securing data across multiple channels and apps against a varying range of threats. With so many potential vulnerability points, not every app or person should have access to all of the data in a profile, particularly highly sensitive and valuable Personally Identifiable Information (PII).

In this multichannel, multi-threat environment, answering the question, "Who can access the data?" isn't going to provide adequate defenses. The more effective question is, "What data can each app, service or business function access?"

Read More

Topics: Consumer Identity and Access Management, Security Best Practices, Videos