Continuing the Conversation: UnboundID Blog Moves to Ping Blog

Posted by Steve Shoaff on 11/2/16 11:23 AM

We often talk about how it’s a dynamic time to be in the identity management industry, and Ping Identity’s recent acquisition of UnboundID underscores just how quickly things are moving. We’re wasting no time as we address the rapidly evolving need for customer identity and access management (CIAM) that fuels digital business strategies like multi-channel customer engagement, mobile application launches, the Internet of Things and many innovations to come.

In the short time since the acquisition, we've made exceptional progress integrating UnboundID and Ping Identity product capabilities to deliver the most comprehensive CIAM platform on the market. (To learn more about the integration and how the platform is helping enterprises accelerate their digital strategies, see today’s press announcement.)

Product advances aren’t the only things we’ve been working on. We have also been working to integrate the UnboundID brand into the Ping Identity brand.

Read More

Topics: Consumer Identity and Access Management

Build Trust with Influencers by Protecting Identities

Posted by Emeka Obianwu on 10/21/16 12:18 PM

Mel Carson is a speaker, author and founder of Delightful Communications, a Seattle-based digital marketing and branding firm. Previously, he worked as Digital Marketing Evangelist at Microsoft Advertising. He began his digital advertising career as an editor at the search engine LookSmart.

UnboundID: Influencer marketing has been getting a lot of attention lately. What should marketers consider?

Carson: Influencer marketing is a channel within a company’s overall marketing and PR program and marketers are seeing it pay dividends. Research has shown that one of the best ways to reach your audience is through advocacy. Where an average 50% of people trust what the brand says across all forms of ads, 83% will trust what their peers and friends say, according to 2015 data from Nielsen. Our clients want to find knowledgeable people in their industry who write blogs or articles but who also have a presence in terms of their social following. They must have a successful track record in their sector. The basic idea is to build a relationship with influencers, so that they will talk about your product or service within their circles. Some companies will even bring these influencers in house to meet with their marketers and designers, and learn more about the products.

Read More

Topics: Consumer Identity and Access Management

Digital Identity Powers the Omnichannel Life of Pets

Posted by Keri LeBlanc on 10/7/16 9:30 AM

Robert Pearson is Global VP of Marketing & Ecommerce at Wagly, a pet care and services provider with campuses in California, Washington and Arizona. Pearson has held senior marketing positions at Swell, Men’s Wearhouse and other brands. He was named a Direct Marketing News "30 under 30" Top Marketing Executive in 2009.

UnboundID: Which customer experience values resonate with Wagly customers and how are you meeting them?

Pearson: At Wagly, we have a unique challenge in that all of the services available for pets, from daycare to veterinary, boarding and grooming, are underneath one roof. We have discovered that what the pet owner really wants is not just a simpler and easier experience, but someone who is looking out for the well-being of their pets. True pet owners can see the difference. We work to define the kind of customer we need and want and then we design an experience to attract them.

Read More

Topics: Customer Experience, Consumer Identity and Access Management

Turn User-Centric into Identity-Centric

Posted by Steve Shoaff on 9/2/16 9:30 AM

Improving digital customer experience is fundamentally an identity problem, yet many organizations are still operating with an outdated approach that revolves around the concept of “technology users” instead of customer identities.

Moving from a focus on “users” to “identities” may seem like a slight adjustment, but it’s a powerful paradigm shift that reshapes your entire infrastructure, and ultimately transforms the quality of your customers' experiences. Delivering seamless consumer engagement across multiple channels requires an identity-centric approach built on a single customer profile instead of separate databases of users created for each new application or service.

Once businesses embrace the idea that customer identities fuel their digital business initiatives, the challenge often becomes an Identity and Access Management (IAM) priority. As IAM pros shift to supporting digital transformations, one of the first things to understand is Customer Identity and Access Management (CIAM) is fundamentally different than the workforce IAM they have managed for the last several decades. A goal of workforce IAM is to reduce the risk and cost associated with onboarding and off-boarding new employees; the purpose of CIAM is to help drive revenue growth by leveraging identity data to acquire and retain customers.

Read More

Topics: Customer Experience, Consumer Identity and Access Management

How to Adopt an Identity-Centric Approach to Digital Business

Posted by Bjorn Aannestad on 8/26/16 9:30 AM

We’re quickly moving toward a future that is identity-centric. In the digital world, identities lie at the heart of several different information ecosystems, including big data, marketing technology and the rapidly evolving Internet of Things (IoT). And as these ecosystems become increasingly business-critical, adopting an identity-centric approach to technology infrastructures will be vitally important to customer experience, security and privacy.

So what does an identity-centric approach look like? Many of today’s Identity and Access Management (IAM) solutions were originally developed to manage workforce identities. While they deliver some of the needed capabilities, there are additional considerations required to support a truly identity-centric focus. You need to be able to create a unique identifier for each person. Then you must be able to authenticate the user and authorize their access to various systems and apps. Additionally, you need the ability to manage dynamic profiles that consist of a combination of structured and unstructured data, including demographics, preferences and relationships.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT)

Public and Private Collaboration Tackles Identity Management Challenges

Posted by Emeka Obianwu on 8/18/16 9:30 AM

Sarah Squire is a Senior Identity Solution Architect with Engage Identity, a Seattle-based consultancy focused on people-centered solutions for identity and access management. Her work includes advising the HEAlth Relationship Trust (HEART) Initiative at the OpenID Foundation and the User Managed Access (UMA) working group at the Kantara Initiative.

UnboundID: Describe the unique identity management challenges in healthcare and the current efforts to resolve them?

Squire: One of the projects I work on at the OpenID Foundation is the HEART working group. We are a consortium of public and private entities. One of the use cases that we are working on right now is what we call the clipboard problem. A patient being treated for an illness might be seeing dozens of different providers and each time they go in for an office visit they have to fill out new intake forms. It’s tedious, and it’s a problem that is easy to solve with technology. Doing so can make the whole system more efficient and safer. There are many people such as the elderly, those with low literacy levels, and those for whom English is a second language who have difficulty completing these forms. Those individuals in particular could hugely benefit from being able to just click a button to release information from one provider to another.

Read More

Topics: Consumer Identity and Access Management, Expert Interviews

Is Artificial Intelligence the Next Frontier for Identity Management?

Posted by Derick Townsend on 8/12/16 10:16 AM

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels. 

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Security Best Practices

Unexpected Ways IAM Pros Can Help the CMO

Posted by Keri LeBlanc on 8/11/16 10:36 AM

The world of digital business is changing rapidly, and it's highly competitive. Companies can easily lose customers to competitors, in most cases with only a single click. This environment puts pressure on CMOs to innovate and improve customer experience on a scale and at a pace that's never been encountered before. As marketing teams accelerate their efforts to successfully drive top-line growth across a growing array of apps, devices and channels, they are running into obstacles.

The problems they face can seem unrelated, from data breach worries and proving bottom line value to meeting customers’ growing expectations. Yet look closely and you’ll recognize that many of the challenges relate to a single issue—a lack of identity management capabilities that enable marketing teams to manage, secure, and use customer identity data.

Read More

Topics: Consumer Identity and Access Management, Multi-Channel Engagement

Ping Identity Acquires UnboundID to Create the Most Comprehensive Customer Identity Management Platform

Posted by Steve Shoaff on 8/2/16 8:05 AM

Anyone who has recognized important work that needs to be done and then made a commitment to achieving it will understand the excitement that we at UnboundID feel about joining forces with Ping Identity. It’s a step that will advance the work that both companies have been unwaveringly devoted to accomplishing in the Customer Identity and Access Management (CIAM) market.

UnboundID and Ping Identity share a dedication to developing next-generation identity management technologies that address today’s digital business challenges. Through our partnership over the last several years, we have successfully combined our complementary identity access, directory and user management products into powerful solutions for some of the world’s leading companies. This acquisition will allow us to amplify this work at the scale, speed and reach that the identity management market needs as it experiences rapid change.

Read More

Topics: Consumer Identity and Access Management

Are You Asking the Right Data Access Questions?

Posted by Ishan Kumar on 7/29/16 9:30 AM

Traditionally, Identity and Access Management (IAM) was focused on allowing or denying access to data storage systems, but today, protecting identity data is far more complex. The growing digital ecosystem and increasing cyber risks mean that organizations are faced with securing data across multiple channels and apps against a varying range of threats. With so many potential vulnerability points, not every app or person should have access to all of the data in a profile, particularly highly sensitive and valuable Personally Identifiable Information (PII).

In this multichannel, multi-threat environment, answering the question, "Who can access the data?" isn't going to provide adequate defenses. The more effective question is, "What data can each app, service or business function access?"

Read More

Topics: Consumer Identity and Access Management, Security Best Practices, Videos