SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Brought to you by
INTERNAL VS. EXTERNAL IAM:
Strategies to Develop an End-to-End
Customer Data Management
Framework
GIGYA.COM | 2
Long ago, companies recognized the importance of effectively managing employee identities, data and
permissions to help streamline company processes and protect valuable business assets.
Over the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has
created the need for businesses to develop an external identity access management (IAM) strategy to
keep up with the flood of identity data being created as consumers connect across channels.
54 percent of companies have difficulty managing and integrating data from today’s
many varied sources, while 50 percent are concerned about consistent data quality
(DestinationCRM).
The Rise of External IAM
GIGYA.COM |
IAM vs CIAM
Unprepared for and unfamiliar with the challenges of external identity management, many businesses
have attempted to scale internal IAM solutions for external identity management purposes.
But successfully capturing, protecting and leveraging customer identity data requires a whole new set
of tools and technologies built for the customer identity access management (CIAM) era.
We’ve broken down the key differences between traditional IAM and cIAM and the steps you can take
to optimize your external strategy into 3 buckets:
Scalability & Security
Data Collection & Aggregation
Privacy & Compliance
3
SCALABILITY & SECURITY
GIGYA.COM |
100 x 100,000
5
BOTTOM LINE:
External IAM software must be highly scalable with the ability to effectively store
and manage millions of consumer identities at once.
The #1 reason why businesses attempting to leverage internal IAM solutions for external purposes fail is
simple: sheer scale. While companies typically manage tens, hundreds, or at most thousands of employee
identities, the number of customer identities can range well into the billions.
GIGYA.COM | 6
When it comes to employee identity and data created within internal applications, ownership indisputably
belongs to the business. However, customer identities created across sites and applications ultimately
belong to consumers.
But while brands must gain permission to capture and collect consumer identity data, once a customer is
on a business’ property and her information is stored in its database, that business is responsible for
protecting her. This gives way to a whole other management issue: security.
Account Ownership
GIGYA.COM | 7
11% of US adults admit to having abandoned an online purchase
because the site asked for too much information (Forrester).
Protecting identity from an internal standpoint is somewhat straightforward, as your business has the power to
enforce certain protocol to help safeguard business and employee information. But customers are consistently
creating new identities and reusing usernames and passwords across millions of unknown properties.
While requiring users to fill in CAPTCHA, select 3 security questions and verify the last 4 digits of their social
security numbers is one way to help guarantee security on your site, it’s certainly not the most practical.
Usability vs. Security
Businesses must put the proper framework in place to provide customers with a positive, seamless user
experience, while still maintaining security standards from both a data collection and storage perspective.
GIGYA.COM | 8
On average, Gigya Social Login clients increase registration
conversion rates by 32.3%, with clients like Forbes gaining
as much as a 90% increase.
Implementing social login across your web properties is one strategy for
bridging the gap between usability and security. Social login gives
consumers the ability to verify their identities with the click of a button using
their existing social media accounts, increasing registration conversion rates
by as much as 90%.
Social Login as a Solution
Social login also shifts the burden of identity protection, data security and sign-
in support to major networks like Facebook and Google. These social identity
providers boast state-of-the-art security systems with features like multi-factor
authentication, remote logout and unauthorized activity detection.
GIGYA.COM | 9
To improve company security and employee convenience, many
businesses leverage single sign-on (SSO), which allows
employees to move seamlessly across internal applications by
tying all activity to a single, known username and password. As
web-based services and applications multiply, SSO is gaining
momentum across customer-facing properties as well.
Internal federation is typically delivered as an on-premise solution
for internal enterprise applications using SAML standard. In
contrast, external IAM solutions must bundle together internal and
external applications and properties, which often requires a
variation of SSO standards including OAuth, OpenID and SAML.
When it comes to CIAM, it’s important to adopt software that gives
you the flexibility to choose the SSO standard that meets your
business’ user experience and security needs.
Federating Identity
DATA COLLECTION & AGGREGATION
GIGYA.COM | 11
As a general rule, company
and employee data is treated
as a liability, with internal IAM
solutions primarily seeking to
secure this information. While
external identity must also be
protected, consumer data has
quickly become every
business’ biggest asset - and
there is a LOT of it.
Over 2.5 exabytes of data are
created every single day
(HBR), and more than 90% of
this “big data” is unstructured
(BusinessInsider).
Identity Data = Pure Gold
TODAY’S DATA GOLDMINE
GIGYA.COM | 12
Internal data is traditionally structured and
controlled, with your business defining the
necessary fixed fields and models. But with
such a huge volume of data and number of
sources, capturing and storing external,
unstructured data in an accurate and
organized manner can be a nightmare.
What happens when a new social network
arrives on the scene? Or customers begin
sharing new types of content? Unstructured
data sources and points like these require
major database updates that cost your
business serious development time and
resources.
Big Data, Bigger Challenge
WHERE DOES BIG DATA COME FROM?
(IBM)
GIGYA.COM | 13
Businesses cite the inability to automate
structured and unstructured data quickly
and effectively among their biggest
challenges, with 60% noting that big data
projects typically take at least 18 months to
complete (Kapow Software).
CIAM calls for a dynamic database with the
ability to effectively normalize data from
disparate sources in real-time. This database
must have the power to reconcile both
structured and unstructured data without the
need to preconfigure database fields.
Data Normalization
GIGYA.COM | 14
With data pouring in across digital, mobile and social channels, it can often get caught in disparate silos
across the organization. This, of course, results in a completely disjointed and disorganized view of your
customer base and individual consumer identities.
A recent Aberdeen study found that 4 in 10 companies say that data remains “siloed” and inaccessible for
analysis. Ultimately, less than ¼ of the information that companies control is even available for extracting
insights (WSJ).
Data Here, There, and Everywhere
GIGYA.COM | 15
While capturing customer identity via solutions like social
login is the first step to unifying individual customer actions
and behaviors across channels, this data is virtually
useless if it is not aggregated into a single repository of
truth.
Ensure that your master database has the ability to directly
integrate and bidirectionally synch with existing business
systems and third-party marketing platforms.
This means selecting a solution equipped to handle and
automatically index any type of data thrown your way,
including social, transactional, behavioral, and much more.
Break Down Data Silos
GIGYA.COM | 16
Establishing a “single repository of truth” is the foundation of an effective CIAM strategy. Of equal importance
is ensuring that this repository is structured in a way that empowers business leaders across the organization
to take action on the goldmine of data housed inside.
Data In, Data Out
93% of executives believe their organization is losing an average of 14% of annual
revenue without the ability to act on the customer data they collect (Oracle).
GIGYA.COM | 17
Improve business agility with a database that seamlessly connects to a corresponding web-based dashboard,
and gives business leaders an actionable view of end-user data based on roles and permissions.
This allows non-technical decision makers to run complex queries based on any number of indexed attributes,
build custom audience segments with no code required, and save and export key reports.
By providing those on the frontlines of your business with the ability to extract and harness the economic value
of customer identity, you save valuable IT time and resources while improving the timeliness and efficacy of
business-wide operations.
Turning Data into Action
PRIVACY & COMPLIANCE
GIGYA.COM |
Privacy, Please
While internal data privacy is managed centrally and based primarily on policies put into place by the
business itself, external data privacy is much messier.
When it comes to managing customer identities and data, your business must adhere to the privacy
policies created by countless lawmakers and third-party identity providers. This list of regulations is
exhaustive and constantly evolving, with current policies including:
Electronic Communications Policy Act
European Union Directive
Fair Credit Reporting Act
Federal Trade Commission Act
Payment Card Industry Data Security Standard
19
GIGYA.COM |
Keeping Up with Compliance
Gartner predicts that by the end of 2015, 50% of new
retail customer identities will be based on consumers’
social network profiles, compared to just 5% in 2013.
Social login is quickly becoming the preferred method of
authentication for customers, which means a big
challenge for IT execs trying to keep up with ever-
changing social network data privacy policies.
As you begin to incorporate registration systems and
social login across your external facing sites and apps,
make sure that you choose a provider that can take on
the burden of managing these privacy updates. Look for
solutions that provide automatic, real-time API updates to
reflect policy and account changes, such as auto-
deletion of non-basic account information when
application permissions are revoked.
20
GIGYA.COM | 21
As we mentioned earlier, CIAM also raises the issue of data ownership. Internal identities are created by the
business, and when an employee creates data during work hours, on a business-owned device or within a
company application, this data belongs to that business.
However, as a customer moves across the Internet on an owned device leveraging services and applications
for personal use, this data belongs to her, and any business looking to access said data should do so in a
transparent and permission-based manner.
Data Ownership
DID YOU KNOW?
71% of consumers state that they are very concerned about online companies
selling or sharing information about them without their permission (Consumer
Reports).
GIGYA.COM | 22
Be sure that your business’ data collection process is completely transparent. No matter the method you
choose, let customers know upfront that you are looking to access their identities and specific data points.
The Power of Permission
Provide your customers the option to
authorize or opt-out of these requests,
and give them the power to view and
update privacy settings at any time via
straightforward user management
controls.
Building your CIAM process on
transparent data collection practices
ensures that your business is upholding
the highest standards of data governance
and leveraging only the highest quality
data.
ABOUT GIGYA
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning
unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations
and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products
and experiences by integrating data into marketing and service applications.
Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern
marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable
registration, authentication, profile management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven
relationships and to provide scalable, secure Customer Identity Management.
For more details about Gigya, visit www.gigya.com.
© 2014 Gigya Incorporated. All rights reserved.
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the
United States and/or other countries. All other trademarks are the property of their respective owners.
Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients
and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client
granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its
clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.
To learn how Gigya can help provide you with the tools and technology needed to develop a successful
CIAM strategy, visit gigya.com or call us at 888.660.1469.

Más contenido relacionado

Destacado

Viewbix tracking journey
Viewbix tracking journeyViewbix tracking journey
Viewbix tracking journey
idan_by
 

Destacado (20)

Autosure digital
Autosure digitalAutosure digital
Autosure digital
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
StrongView and Gigya webinar: Using Social Data to Improve Digital Marketing
 StrongView and Gigya webinar:   Using Social Data to Improve Digital Marketing StrongView and Gigya webinar:   Using Social Data to Improve Digital Marketing
StrongView and Gigya webinar: Using Social Data to Improve Digital Marketing
 
Automotive business-intelligence software - webinar slides
Automotive business-intelligence software - webinar slidesAutomotive business-intelligence software - webinar slides
Automotive business-intelligence software - webinar slides
 
Waffor MioClient - Customer Engagement & Retention Platform
Waffor MioClient - Customer Engagement & Retention PlatformWaffor MioClient - Customer Engagement & Retention Platform
Waffor MioClient - Customer Engagement & Retention Platform
 
Nathalie Nahai - The secret psychology behind social behaviour
Nathalie Nahai - The secret psychology behind social behaviourNathalie Nahai - The secret psychology behind social behaviour
Nathalie Nahai - The secret psychology behind social behaviour
 
Remodista RetailSource Paper - The Seamless Commerce Experience
Remodista RetailSource Paper - The Seamless Commerce ExperienceRemodista RetailSource Paper - The Seamless Commerce Experience
Remodista RetailSource Paper - The Seamless Commerce Experience
 
Unleash the Power: Marketo & Microsoft Dynamics Integrations
Unleash the Power: Marketo & Microsoft Dynamics IntegrationsUnleash the Power: Marketo & Microsoft Dynamics Integrations
Unleash the Power: Marketo & Microsoft Dynamics Integrations
 
The digital transformation: Used car retail performance management 2.0
The digital transformation: Used car retail performance management 2.0The digital transformation: Used car retail performance management 2.0
The digital transformation: Used car retail performance management 2.0
 
Dealers and OEMs in the Omni Channel World
Dealers and OEMs in the Omni Channel World Dealers and OEMs in the Omni Channel World
Dealers and OEMs in the Omni Channel World
 
Putting data to work
Putting data to workPutting data to work
Putting data to work
 
Targeting Beyond Demographics with Social Data
Targeting Beyond Demographics with Social DataTargeting Beyond Demographics with Social Data
Targeting Beyond Demographics with Social Data
 
Streetlife's real time analytics stack
Streetlife's real time analytics stackStreetlife's real time analytics stack
Streetlife's real time analytics stack
 
Viewbix tracking journey
Viewbix tracking journeyViewbix tracking journey
Viewbix tracking journey
 
Capturing online customer data to create better insights and targeted actions...
Capturing online customer data to create better insights and targeted actions...Capturing online customer data to create better insights and targeted actions...
Capturing online customer data to create better insights and targeted actions...
 
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak) Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
Gartner Digital Marketing Conference 2016: Theater Session (C. Slovak)
 
How to use the Big 5 personality traits to write persuasive copy
How to use the Big 5 personality traits to write persuasive copyHow to use the Big 5 personality traits to write persuasive copy
How to use the Big 5 personality traits to write persuasive copy
 
Escritorio ana 101
Escritorio ana 101Escritorio ana 101
Escritorio ana 101
 
Framework IAM
Framework IAMFramework IAM
Framework IAM
 
Variability of Coal Mine Drainage in Pennsylvania Resulting from Coal Mining ...
Variability of Coal Mine Drainage in Pennsylvania Resulting from Coal Mining ...Variability of Coal Mine Drainage in Pennsylvania Resulting from Coal Mining ...
Variability of Coal Mine Drainage in Pennsylvania Resulting from Coal Mining ...
 

Similar a Internal vs. external identity access management

White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
Ian Gilbert
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
ellamee27
 

Similar a Internal vs. external identity access management (20)

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
 
Big Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White PaperBig Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White Paper
 
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive Innovation
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Modernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent DecisionsModernizing Insurance Data to Drive Intelligent Decisions
Modernizing Insurance Data to Drive Intelligent Decisions
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
 
Data Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAMData Sheet: Why Your DMP Needs CIAM
Data Sheet: Why Your DMP Needs CIAM
 
Data Sheet: Why Gigya's Profile Management
Data Sheet: Why Gigya's Profile ManagementData Sheet: Why Gigya's Profile Management
Data Sheet: Why Gigya's Profile Management
 
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdfwhat-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
what-is-datafication-and-why-is-it-the-future-of-business-in-2023.pdf
 

Último

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Internal vs. external identity access management

  • 1. Brought to you by INTERNAL VS. EXTERNAL IAM: Strategies to Develop an End-to-End Customer Data Management Framework
  • 2. GIGYA.COM | 2 Long ago, companies recognized the importance of effectively managing employee identities, data and permissions to help streamline company processes and protect valuable business assets. Over the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has created the need for businesses to develop an external identity access management (IAM) strategy to keep up with the flood of identity data being created as consumers connect across channels. 54 percent of companies have difficulty managing and integrating data from today’s many varied sources, while 50 percent are concerned about consistent data quality (DestinationCRM). The Rise of External IAM
  • 3. GIGYA.COM | IAM vs CIAM Unprepared for and unfamiliar with the challenges of external identity management, many businesses have attempted to scale internal IAM solutions for external identity management purposes. But successfully capturing, protecting and leveraging customer identity data requires a whole new set of tools and technologies built for the customer identity access management (CIAM) era. We’ve broken down the key differences between traditional IAM and cIAM and the steps you can take to optimize your external strategy into 3 buckets: Scalability & Security Data Collection & Aggregation Privacy & Compliance 3
  • 5. GIGYA.COM | 100 x 100,000 5 BOTTOM LINE: External IAM software must be highly scalable with the ability to effectively store and manage millions of consumer identities at once. The #1 reason why businesses attempting to leverage internal IAM solutions for external purposes fail is simple: sheer scale. While companies typically manage tens, hundreds, or at most thousands of employee identities, the number of customer identities can range well into the billions.
  • 6. GIGYA.COM | 6 When it comes to employee identity and data created within internal applications, ownership indisputably belongs to the business. However, customer identities created across sites and applications ultimately belong to consumers. But while brands must gain permission to capture and collect consumer identity data, once a customer is on a business’ property and her information is stored in its database, that business is responsible for protecting her. This gives way to a whole other management issue: security. Account Ownership
  • 7. GIGYA.COM | 7 11% of US adults admit to having abandoned an online purchase because the site asked for too much information (Forrester). Protecting identity from an internal standpoint is somewhat straightforward, as your business has the power to enforce certain protocol to help safeguard business and employee information. But customers are consistently creating new identities and reusing usernames and passwords across millions of unknown properties. While requiring users to fill in CAPTCHA, select 3 security questions and verify the last 4 digits of their social security numbers is one way to help guarantee security on your site, it’s certainly not the most practical. Usability vs. Security Businesses must put the proper framework in place to provide customers with a positive, seamless user experience, while still maintaining security standards from both a data collection and storage perspective.
  • 8. GIGYA.COM | 8 On average, Gigya Social Login clients increase registration conversion rates by 32.3%, with clients like Forbes gaining as much as a 90% increase. Implementing social login across your web properties is one strategy for bridging the gap between usability and security. Social login gives consumers the ability to verify their identities with the click of a button using their existing social media accounts, increasing registration conversion rates by as much as 90%. Social Login as a Solution Social login also shifts the burden of identity protection, data security and sign- in support to major networks like Facebook and Google. These social identity providers boast state-of-the-art security systems with features like multi-factor authentication, remote logout and unauthorized activity detection.
  • 9. GIGYA.COM | 9 To improve company security and employee convenience, many businesses leverage single sign-on (SSO), which allows employees to move seamlessly across internal applications by tying all activity to a single, known username and password. As web-based services and applications multiply, SSO is gaining momentum across customer-facing properties as well. Internal federation is typically delivered as an on-premise solution for internal enterprise applications using SAML standard. In contrast, external IAM solutions must bundle together internal and external applications and properties, which often requires a variation of SSO standards including OAuth, OpenID and SAML. When it comes to CIAM, it’s important to adopt software that gives you the flexibility to choose the SSO standard that meets your business’ user experience and security needs. Federating Identity
  • 10. DATA COLLECTION & AGGREGATION
  • 11. GIGYA.COM | 11 As a general rule, company and employee data is treated as a liability, with internal IAM solutions primarily seeking to secure this information. While external identity must also be protected, consumer data has quickly become every business’ biggest asset - and there is a LOT of it. Over 2.5 exabytes of data are created every single day (HBR), and more than 90% of this “big data” is unstructured (BusinessInsider). Identity Data = Pure Gold TODAY’S DATA GOLDMINE
  • 12. GIGYA.COM | 12 Internal data is traditionally structured and controlled, with your business defining the necessary fixed fields and models. But with such a huge volume of data and number of sources, capturing and storing external, unstructured data in an accurate and organized manner can be a nightmare. What happens when a new social network arrives on the scene? Or customers begin sharing new types of content? Unstructured data sources and points like these require major database updates that cost your business serious development time and resources. Big Data, Bigger Challenge WHERE DOES BIG DATA COME FROM? (IBM)
  • 13. GIGYA.COM | 13 Businesses cite the inability to automate structured and unstructured data quickly and effectively among their biggest challenges, with 60% noting that big data projects typically take at least 18 months to complete (Kapow Software). CIAM calls for a dynamic database with the ability to effectively normalize data from disparate sources in real-time. This database must have the power to reconcile both structured and unstructured data without the need to preconfigure database fields. Data Normalization
  • 14. GIGYA.COM | 14 With data pouring in across digital, mobile and social channels, it can often get caught in disparate silos across the organization. This, of course, results in a completely disjointed and disorganized view of your customer base and individual consumer identities. A recent Aberdeen study found that 4 in 10 companies say that data remains “siloed” and inaccessible for analysis. Ultimately, less than ¼ of the information that companies control is even available for extracting insights (WSJ). Data Here, There, and Everywhere
  • 15. GIGYA.COM | 15 While capturing customer identity via solutions like social login is the first step to unifying individual customer actions and behaviors across channels, this data is virtually useless if it is not aggregated into a single repository of truth. Ensure that your master database has the ability to directly integrate and bidirectionally synch with existing business systems and third-party marketing platforms. This means selecting a solution equipped to handle and automatically index any type of data thrown your way, including social, transactional, behavioral, and much more. Break Down Data Silos
  • 16. GIGYA.COM | 16 Establishing a “single repository of truth” is the foundation of an effective CIAM strategy. Of equal importance is ensuring that this repository is structured in a way that empowers business leaders across the organization to take action on the goldmine of data housed inside. Data In, Data Out 93% of executives believe their organization is losing an average of 14% of annual revenue without the ability to act on the customer data they collect (Oracle).
  • 17. GIGYA.COM | 17 Improve business agility with a database that seamlessly connects to a corresponding web-based dashboard, and gives business leaders an actionable view of end-user data based on roles and permissions. This allows non-technical decision makers to run complex queries based on any number of indexed attributes, build custom audience segments with no code required, and save and export key reports. By providing those on the frontlines of your business with the ability to extract and harness the economic value of customer identity, you save valuable IT time and resources while improving the timeliness and efficacy of business-wide operations. Turning Data into Action
  • 19. GIGYA.COM | Privacy, Please While internal data privacy is managed centrally and based primarily on policies put into place by the business itself, external data privacy is much messier. When it comes to managing customer identities and data, your business must adhere to the privacy policies created by countless lawmakers and third-party identity providers. This list of regulations is exhaustive and constantly evolving, with current policies including: Electronic Communications Policy Act European Union Directive Fair Credit Reporting Act Federal Trade Commission Act Payment Card Industry Data Security Standard 19
  • 20. GIGYA.COM | Keeping Up with Compliance Gartner predicts that by the end of 2015, 50% of new retail customer identities will be based on consumers’ social network profiles, compared to just 5% in 2013. Social login is quickly becoming the preferred method of authentication for customers, which means a big challenge for IT execs trying to keep up with ever- changing social network data privacy policies. As you begin to incorporate registration systems and social login across your external facing sites and apps, make sure that you choose a provider that can take on the burden of managing these privacy updates. Look for solutions that provide automatic, real-time API updates to reflect policy and account changes, such as auto- deletion of non-basic account information when application permissions are revoked. 20
  • 21. GIGYA.COM | 21 As we mentioned earlier, CIAM also raises the issue of data ownership. Internal identities are created by the business, and when an employee creates data during work hours, on a business-owned device or within a company application, this data belongs to that business. However, as a customer moves across the Internet on an owned device leveraging services and applications for personal use, this data belongs to her, and any business looking to access said data should do so in a transparent and permission-based manner. Data Ownership DID YOU KNOW? 71% of consumers state that they are very concerned about online companies selling or sharing information about them without their permission (Consumer Reports).
  • 22. GIGYA.COM | 22 Be sure that your business’ data collection process is completely transparent. No matter the method you choose, let customers know upfront that you are looking to access their identities and specific data points. The Power of Permission Provide your customers the option to authorize or opt-out of these requests, and give them the power to view and update privacy settings at any time via straightforward user management controls. Building your CIAM process on transparent data collection practices ensures that your business is upholding the highest standards of data governance and leveraging only the highest quality data.
  • 23. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. © 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/. To learn how Gigya can help provide you with the tools and technology needed to develop a successful CIAM strategy, visit gigya.com or call us at 888.660.1469.