Blog

    

Data-Driven Customer Engagement Is a Mindset, Not a Toolset

Posted by Ishan Kumar on 9/1/16 9:16 AM

Jon Singleton is Co-Founder and Chief Technology Officer of DatumLabs. He has almost two decades of experience designing and implementing database solutions across multiple platforms, for Fortune 500 companies including Automotive, Healthcare, Pet Nutrition, Digital and Direct Marketing Agencies, Technology, Finance, Sports and Retail. 

UnboundID: Many companies are striving to gain a single view of the customer or close to it. What are the data management challenges behind this?

Singleton: It requires a master data management (MDM) process. Implementing MDM in an enterprise is really hard, which is why people don’t want to do it. The challenges stem from the systems they use to compliance needs and defined IT processes. It’s not just the data itself but dealing with the processes that protect the data and manage the data’s movement. When you deal with decision-makers to get budget, they often think about MDM as an out-of-the-box solution, but MDM is not just a toolset. It is a mindset and a combination of processes applied across the enterprise and different data stores to accomplish the MDM goals. Clients with the most success focus on what they want to accomplish, and how can they set things up from a data standpoint to accomplish that. Once they talk through those factors and determine what they want for ROI, selling internally becomes a lot easier.

Read More

Topics: Big Data, Security Best Practices, Expert Interviews

Identity Data Security Is Required for Digital Transformation Value

Posted by Steve Shoaff on 8/19/16 10:47 AM

A strong digital presence can help you engage with customers where they spend increasingly more time—on a growing number of mobile apps, online channels and connected devices. Digital business is gaining momentum and companies recognize that digital transformations are business critical. According to a Loudhouse survey, 86% of digital decision makers say that they have two years to make progress on their digital initiatives or fall behind the competitors.

As companies focus on digital transformation, they face many challenges, but one in particular has the potential to threaten the success of not only digital business strategies, but the healthy adoption of digital business as a whole. The issue of securing customer identity data has always been important, yet the negative impact of breaches is growing making it even more crucial to get it right. A recent Ponemon Institute report found that the cost of a data breach has increased by 29% since 2013, and this number is expected to continue rising.

Read More

Topics: Customer Experience, Security Best Practices

Is Artificial Intelligence the Next Frontier for Identity Management?

Posted by Derick Townsend on 8/12/16 10:16 AM

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels. 

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Security Best Practices

Luxury Brands Meticulously Protect Customer Data Privacy and Security

Posted by Michael Tarbet on 8/5/16 9:51 AM

Henry McIntosh is Director of Content Marketing at Twenty One Twelve, a digital marketing agency in the UK serving luxury brands. He is a regular contributor to Luxurious Magazine.

UnboundID: What are some top trends right now for luxury brands in digital marketing?

McIntosh: At the moment visual and video content are key to many strategies. Look at the Twitter, Facebook or website of many luxury brands and strong imagery and professional videos will play an important part of the experience. This predilection to the visual has also seen platforms like Snapchat and Instagram enjoy growing prominence. I feel that live video will become more of a factor in forthcoming years.

Read More

Topics: Security Best Practices, Expert Interviews

Are You Asking the Right Data Access Questions?

Posted by Ishan Kumar on 7/29/16 9:30 AM

Traditionally, Identity and Access Management (IAM) was focused on allowing or denying access to data storage systems, but today, protecting identity data is far more complex. The growing digital ecosystem and increasing cyber risks mean that organizations are faced with securing data across multiple channels and apps against a varying range of threats. With so many potential vulnerability points, not every app or person should have access to all of the data in a profile, particularly highly sensitive and valuable Personally Identifiable Information (PII).

In this multichannel, multi-threat environment, answering the question, "Who can access the data?" isn't going to provide adequate defenses. The more effective question is, "What data can each app, service or business function access?"

Read More

Topics: Consumer Identity and Access Management, Security Best Practices, Videos

Liberate Customer Identity Data with Strong Security

Posted by Emeka Obianwu on 7/15/16 10:00 AM

Customer identity data can be your greatest asset. When your entire organization accesses and uses the data to engage with customers in one-to-one personalized interactions, make data-driven decisions, or provide relevant marketing offers, everyone wins. Customers have a better experience with your brand. Sales go up.

But there is a dark force holding businesses back from realizing this goal. Data breaches. The fear of theft and misuse prevents many organizations from using customer identity data to its full potential. Security concerns cause many data security teams and Identity and Access Management (IAM) pros to limit the flow of valuable information within the organization. What’s more, they often create cumbersome login and identity verification processes that result in bad user experiences for customers trying to access their accounts.

Read More

Topics: Customer Experience, Security Best Practices

Your Firewall Is Not Enough

Posted by Bjorn Aannestad on 6/24/16 9:00 AM

A question that comes up frequently in regards to customer data, particularly Personally Identifiable Information (PII), is whether or not data should be encrypted when there is a strong firewall in place. The answer in nearly all cases is “yes.” End-to-end data encryption, when it is in the data store, when it is in transit and when it arrives at its end-use point, provides protection from insider attacks. What’s more, it offers a second defense layer. If someone does get through the firewall, the data is still protected.

Read More

Topics: Security Best Practices, Videos

New Era of Data Threats and Opportunities Escalates Security Needs

Posted by Dave Malcolm on 6/9/16 9:48 AM

Mark Kuharich has been a software developer since 1996. He has worked as a senior developer at Premera Blue Cross, Starbucks and Microsoft. Currently he works as a mobile architect at Byndl.

Kuharich: When I came to work here, I found it interesting that we were going to provide a mobile story for this industry because vending is not known for being cutting edge. It’s a low-margin sector. Mobile is totally new for them. For people who live on their phones though, it’s a no brainer to buy a vending meal from an app. The customer is a micro-market service and the purchases are usually $10 or less, which might surprise people, but it’s a perfect fit for mobile pay.

Read More

Topics: Mobile Apps, Security Best Practices, Expert Interviews

Did World Password Day Make a Difference?

Posted by Michael Tarbet on 5/6/16 10:29 AM

Yesterday was World Password Day and the Internet and social media were full of helpful advice and reminders to change your passwords. People threw parties to commemorate the occasion, and even Betty White made a video to weigh in on the importance of multi-factor authentication (MFA). 

All joking aside, weak passwords remain one of the biggest data security threats online. We all know it, and yet many of us don’t do what we should to keep our online data protected. Many people are guilty of using passwords that are easy to guess, re-using the same password for all accounts and not changing passwords often enough.

Read More

Topics: Data Management, Security Best Practices

IT Leaders Don’t Have to Sacrifice Productivity for Data Security

Posted by Steve Shoaff on 5/5/16 9:52 AM

Both the cost and frequency of data breaches have been on the rise in recent years. According to a study by the Ponemon Institute, the cost of data theft increased on average from $159 to $174 per record in 2015. In light of these statistics and the fact that security ranks as the number one concern on IT leaders’ minds, it seems counterintuitive that organizations still are not doing all they can to protect data and prevent breaches.

The reason may not be surprising to anyone who is balancing the often-conflicting demands of securing data and keeping operations humming along efficiently. When prioritizing between the two, the immediate needs of speed and productivity end up coming ahead of security, not by choice, but by urgency.

Read More

Topics: Legacy IAM Modernization, Security Best Practices