How to Adopt an Identity-Centric Approach to Digital Business

Posted by Bjorn Aannestad on 8/26/16 9:30 AM

We’re quickly moving toward a future that is identity-centric. In the digital world, identities lie at the heart of several different information ecosystems, including big data, marketing technology and the rapidly evolving Internet of Things (IoT). And as these ecosystems become increasingly business-critical, adopting an identity-centric approach to technology infrastructures will be vitally important to customer experience, security and privacy.

So what does an identity-centric approach look like? Many of today’s Identity and Access Management (IAM) solutions were originally developed to manage workforce identities. While they deliver some of the needed capabilities, there are additional considerations required to support a truly identity-centric focus. You need to be able to create a unique identifier for each person. Then you must be able to authenticate the user and authorize their access to various systems and apps. Additionally, you need the ability to manage dynamic profiles that consist of a combination of structured and unstructured data, including demographics, preferences and relationships.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT)

From IoT to Blockchain, the Pace of Digital Evolution Is Accelerating

Posted by Dave Malcolm on 8/25/16 11:14 AM

Phil Windley is an Enterprise Architect in the Office of the CIO at Brigham Young University. He is also the co-founder and organizer of the Internet Identity Workshop (IIW), serves as an Adjunct Professor of Computer Science at BYU, writes the popular Technometria blog, and is the author of the books “The Live Web” (Course Technology, 2011) and “Digital Identity” (O'Reilly Media, 2005).

UnboundID: What were the hot areas of discussion at the latest IIW event?

Windley: Generally, it’s a mix of topics, those that have been part of IIW for a long time, like OAuth and multi-factor authentication. We also had a lot of discussions on block chain technology, the distributed decentralized ledger system for Bitcoin. The key idea of block chain is that it allows you to create an identity system that is not controlled by any single entity. Today, if I log into a website and I have the option of using Google or Facebook credentials to do that, it’s very convenient. It saves people a lot of headaches and also allows for some security wins because Google and Facebook put a lot of effort into building identity systems. Yet the identity is still controlled by those big companies. Not everyone likes that idea. They might be worried about privacy or maybe they don’t have an account at one of those sites and they don’t want to create one. Distributed ledger technology creates a system where everyone can join. It’s not controlled by a single entity, but rather by code written by a group of people. It completely decentralizes the identity management system.

Read More

Topics: Internet of Things (IoT), Cloud Computing, Expert Interviews

Identity Data Security Is Required for Digital Transformation Value

Posted by Steve Shoaff on 8/19/16 10:47 AM

A strong digital presence can help you engage with customers where they spend increasingly more time—on a growing number of mobile apps, online channels and connected devices. Digital business is gaining momentum and companies recognize that digital transformations are business critical. According to a Loudhouse survey, 86% of digital decision makers say that they have two years to make progress on their digital initiatives or fall behind the competitors.

As companies focus on digital transformation, they face many challenges, but one in particular has the potential to threaten the success of not only digital business strategies, but the healthy adoption of digital business as a whole. The issue of securing customer identity data has always been important, yet the negative impact of breaches is growing making it even more crucial to get it right. A recent Ponemon Institute report found that the cost of a data breach has increased by 29% since 2013, and this number is expected to continue rising.

Read More

Topics: Customer Experience, Security Best Practices

Public and Private Collaboration Tackles Identity Management Challenges

Posted by Emeka Obianwu on 8/18/16 9:30 AM

Sarah Squire is a Senior Identity Solution Architect with Engage Identity, a Seattle-based consultancy focused on people-centered solutions for identity and access management. Her work includes advising the HEAlth Relationship Trust (HEART) Initiative at the OpenID Foundation and the User Managed Access (UMA) working group at the Kantara Initiative.

UnboundID: Describe the unique identity management challenges in healthcare and the current efforts to resolve them?

Squire: One of the projects I work on at the OpenID Foundation is the HEART working group. We are a consortium of public and private entities. One of the use cases that we are working on right now is what we call the clipboard problem. A patient being treated for an illness might be seeing dozens of different providers and each time they go in for an office visit they have to fill out new intake forms. It’s tedious, and it’s a problem that is easy to solve with technology. Doing so can make the whole system more efficient and safer. There are many people such as the elderly, those with low literacy levels, and those for whom English is a second language who have difficulty completing these forms. Those individuals in particular could hugely benefit from being able to just click a button to release information from one provider to another.

Read More

Topics: Consumer Identity and Access Management, Expert Interviews

Is Artificial Intelligence the Next Frontier for Identity Management?

Posted by Derick Townsend on 8/12/16 10:16 AM

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels. 

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Security Best Practices

Unexpected Ways IAM Pros Can Help the CMO

Posted by Keri LeBlanc on 8/11/16 10:36 AM

The world of digital business is changing rapidly, and it's highly competitive. Companies can easily lose customers to competitors, in most cases with only a single click. This environment puts pressure on CMOs to innovate and improve customer experience on a scale and at a pace that's never been encountered before. As marketing teams accelerate their efforts to successfully drive top-line growth across a growing array of apps, devices and channels, they are running into obstacles.

The problems they face can seem unrelated, from data breach worries and proving bottom line value to meeting customers’ growing expectations. Yet look closely and you’ll recognize that many of the challenges relate to a single issue—a lack of identity management capabilities that enable marketing teams to manage, secure, and use customer identity data.

Read More

Topics: Consumer Identity and Access Management, Multi-Channel Engagement

Luxury Brands Meticulously Protect Customer Data Privacy and Security

Posted by Michael Tarbet on 8/5/16 9:51 AM

Henry McIntosh is Director of Content Marketing at Twenty One Twelve, a digital marketing agency in the UK serving luxury brands. He is a regular contributor to Luxurious Magazine.

UnboundID: What are some top trends right now for luxury brands in digital marketing?

McIntosh: At the moment visual and video content are key to many strategies. Look at the Twitter, Facebook or website of many luxury brands and strong imagery and professional videos will play an important part of the experience. This predilection to the visual has also seen platforms like Snapchat and Instagram enjoy growing prominence. I feel that live video will become more of a factor in forthcoming years.

Read More

Topics: Security Best Practices, Expert Interviews

Ping Identity Acquires UnboundID to Create the Most Comprehensive Customer Identity Management Platform

Posted by Steve Shoaff on 8/2/16 8:05 AM

Anyone who has recognized important work that needs to be done and then made a commitment to achieving it will understand the excitement that we at UnboundID feel about joining forces with Ping Identity. It’s a step that will advance the work that both companies have been unwaveringly devoted to accomplishing in the Customer Identity and Access Management (CIAM) market.

UnboundID and Ping Identity share a dedication to developing next-generation identity management technologies that address today’s digital business challenges. Through our partnership over the last several years, we have successfully combined our complementary identity access, directory and user management products into powerful solutions for some of the world’s leading companies. This acquisition will allow us to amplify this work at the scale, speed and reach that the identity management market needs as it experiences rapid change.

Read More

Topics: Consumer Identity and Access Management

Are You Asking the Right Data Access Questions?

Posted by Ishan Kumar on 7/29/16 9:30 AM

Traditionally, Identity and Access Management (IAM) was focused on allowing or denying access to data storage systems, but today, protecting identity data is far more complex. The growing digital ecosystem and increasing cyber risks mean that organizations are faced with securing data across multiple channels and apps against a varying range of threats. With so many potential vulnerability points, not every app or person should have access to all of the data in a profile, particularly highly sensitive and valuable Personally Identifiable Information (PII).

In this multichannel, multi-threat environment, answering the question, "Who can access the data?" isn't going to provide adequate defenses. The more effective question is, "What data can each app, service or business function access?"

Read More

Topics: Consumer Identity and Access Management, Security Best Practices, Videos

Customer Data Boosts ROI for Digital Marketing

Posted by Bjorn Aannestad on 7/28/16 7:30 AM

Dave Chaffey is CEO and co-founder of digital marketing advice site Smart Insights. He has been recognized as one of 50 marketing ‘gurus’ worldwide who have shaped the future of marketing by the Chartered Institute of Marketing.

UnboundID: Social media channels continue to shift. Microsoft just bought LinkedIn, SnapChat is the fastest growing social media app. Twitter seems to be on the downside. How do you view the latest changes for marketers?

Chaffey: It’s important to keep a close eye on the changing fortunes of the main social networks since those that were most effective in the past won’t necessarily work now. Marketers need to change their focus and experiment with the new organic and paid options to influence their audiences. For example, Google has recently introduced Customer Match that allows you to show ads to your customers based on data about those customers that you share with Google. Instagram and Snapchat have also introduced new ad options within the last 12 months.

Read More

Topics: Consumer Identity and Access Management, Multi-Channel Engagement, Expert Interviews