SlideShare a Scribd company logo
1 of 26
Adding Relationship Management
To Identity: It’s A Must For
Customer-Obsessed Companies
Eve Maler, Principal Analyst, Security & Risk
June 5, 2014
@xmlgrrl
© 2012 Forrester Research, Inc. Reproduction Prohibited 2
In April 2014, ForgeRock commissioned Forrester
Consulting to evaluate companies’ IAM practices and
requirements when it comes to customer-facing
scenarios versus employee-facing ones. Forrester tested
the assertion that companies can obtain significant
value by implementing IRM solutions that treat
customer identities, and their identity data, as mission-
critical for the top line of the business.
© 2012 Forrester Research, Inc. Reproduction Prohibited 3
In April 2014, ForgeRock commissioned Forrester
Consulting to evaluate companies’ IAM practices and
requirements when it comes to customer-facing
scenarios versus employee-facing ones. Forrester tested
the assertion that companies can obtain significant
value by implementing IRM solutions that treat
customer identities, and their identity data, as mission-
critical for the top line of the business.
In conducting online surveys of 111 B2C and B2B2C
executives with responsibility for IAM and six
interviews, Forrester found that new business and
technical demands require a strategic focus for which
existing IAM infrastructure may not be sufficient, and
that there is a significant opportunity to utilize IRM-
supportive technologies in support of customer-facing
IT initiatives.
© 2012 Forrester Research, Inc. Reproduction Prohibited
The Age of the Customer is a 20-year business cycle in which the
most successful enterprises will Reinvent themselves to
Systematically Understand and Serve increasingly powerful
customers.
The age of the customer – what is it?
4
© 2012 Forrester Research, Inc. Reproduction Prohibited
Four institutional imperatives in the AoC
Become a
digital
business
leader
Reinvent
Transform
digitally
enabled
customer
experiences
Systematically
Create
contextual
mobile
offerings
Serve
Turn big data
into customer
insights
Understand
Age of the
customer
© 2014 Forrester Research, Inc. Reproduction Prohibited 6
The past
© 2014 Forrester Research, Inc. Reproduction Prohibited 7
Today
© 2012 Forrester Research, Inc. Reproduction Prohibited
Source: Forrester Consumer Technographics, US and Canadian Online Population 18+, 2013
Mobile connects us everywhere
Canada USA
“Where do you access the Internet on your smartphone?”
© 2012 Forrester Research, Inc. Reproduction Prohibited
Source: May 2013 “Winning The Customer Experience Game” Forrester report
Of course, behind every customer
touchpoint is a technology story
© 2012 Forrester Research, Inc. Reproduction Prohibited
So, what did we find in our study?
The demand for “external-facing
IAM” is widespread.
Traditional IAM architecture is not
prepared for customer engagement.
IRM success is evaluated differently
from IAM success.
IRM platforms must be agile,
modular, coordinated, and scalable.
10
Companies are straining
against a view of IAM as a
tactical IT concern
© 2012 Forrester Research, Inc. Reproduction Prohibited
IRM deserves its special moniker
because it operates at special scale
12
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
Partner Employee Consumer
0
500,000
1,000,000
1,500,000
2,000,000
2,500,000
3,000,000
101 –
1,000
1,001 –
10,000
500,001 –
5,000,000
© 2012 Forrester Research, Inc. Reproduction Prohibited
Companies are dubious about the IRM
preparedness of existing IAM solutions
13
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
Considering the IAM technology
solutions you use internally
now, how prepared are these
solutions for use in external
deployment scenarios?
Not at all
prepared, 8%
Not very
prepared, 22%
Somewhat
prepared, 36%
Very prepared,
34%
Base: 111 B2C and B2B2C Executives
66% feel
less than
“very
prepared”
Yes, 88%
No, 5%
N/A 5% Don’t know,
2%
Does your budget for building out
external-facing, customer and
partner identity and access
management include investment in
new IAM software?
IRM priorities are increasing
the pressure on IAM projects
© 2012 Forrester Research, Inc. Reproduction Prohibited
The definition
of success is
shifting
15
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
Have you been asked to measure the
revenue impact of your customer-facing
IT projects?
Yes,
83%
No, 9%
Don’t
know,
8%
Base: 86 [Those who work on customer-facing IAM projects]
Base: 111 B2C and B2B2C Executives
© 2012 Forrester Research, Inc. Reproduction Prohibited
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
Metrics are moving from input to output
and from internal to business-focused
What types of success metrics govern your
IAM-related projects today?
5) Drive customer intelligence
4) Drive increased revenue
3) Fraud detection/prevention
rates
2) Regulatory compliance (e.g.,
PCI, HIPAA, EU Data Protection
Directive, etc.)
1) On-time and on-budget
What types of success metrics do you anticipate
will govern your IAM-related projects three years
from now?
5) Drive customer intelligence
4) Regulatory compliance (e.g.,
PCI, HIPAA, EU Data Protection
Directive, etc.)
3) Drive increased revenue
2) Fraud detection/prevention
rates
1) On-time and on-budget
© 2012 Forrester Research, Inc. Reproduction Prohibited
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
Metrics are moving from input to output
and from internal to business-focused
How will success metrics that govern your
IAM-related projects increase or decrease
over the next three years?
-7%
-1%
5%
7%
8%
On-time and on-budget
Regulatory compliance
Drive customer intelligence
Drive increased revenue
Fraud detection/prevention
rates
Three years from now versus today
Base: 111 B2C and B2B2C Executives
© 2012 Forrester Research, Inc. Reproduction Prohibited
IRM requires the right architecture
We’re undergoing a digital transformation. I didn’t
think IAM was going to be so important for this, but
now I realize it’s valuable to create a targeted
architecture and not have to build specialized
applications each time. The users will be able to
access the same platform, and their access will be
controlled by authorization. It’s really an enabler in
completely transforming the way we do things. People
expect 24/7 access.
– Media/advertising
100%
© 2012 Forrester Research, Inc. Reproduction Prohibited
Source: January 24, 2014 “Mobile Moments Transform Customer Experience” Forrester report
Mobile expectations are rising; customer-
obsessed companies prioritize mobility
© 2012 Forrester Research, Inc. Reproduction Prohibited 20
Mobile is a really difficult thing to control in our
environment.13,000 students probably have 15,000
different devices – probably more like 30–90,000
different devices. So I don’t do anything to attempt to
control their mobile experience, other than making the
system available to them.
– Higher education institution
About a year and a half ago, we put the
entire sales team on mobile devices.
They don’t even get provisioned laptops
[anymore].
– Cloud services provider
© 2012 Forrester Research, Inc. Reproduction Prohibited
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
Strategic priorities reflect the IRM
imperative
“Please indicate which of the following are, or will be, strategic IAM priorities for your company.”
21%
24%
25%
22%
20%
21%
19%
25%
28%
35%
37%
32%
36%
27%
31%
41%
39%
21%
33%
33%
40%
40%
46%
43%
36%
32%
48%
Managing IAM for multiple types of network-connected devices owned by employees
Using IAM to control and enable employee access to cloud/SaaS services
Mitigating operational expenses and security risk by extending IAM to employees
Consolidating disparate employee IAM systems
Ensuring IAM systems scale to handle anticipated customer growth
Managing IAM for multiple types of network-connected devices owned by customers
Using IAM to enable and unify customer access to cloud-based services
Consolidating disparate customer IAM systems
Driving business value and revenue by extending IAM to customers
Will be a priority in more than a year Will be a priority in the next year Is a current priority
Base: 111 B2C and B2B2C Executives
IAMIRM
© 2012 Forrester Research, Inc. Reproduction Prohibited
What do you need to scale?
IAM
Roles and entitlements
IRM
Users and engagement
[F]or external users, the effort
tends to be more focused
around the technology and
the deployment, whereas
when you start internally,
there’s a lot more focus on
method and process and
business change, about 80%
business change and 20%
technical. For external-facing
systems, it tends to be 80%
technology and
implementation and 20%
process.
– Global IT services
© 2012 Forrester Research, Inc. Reproduction Prohibited
What do you need to do to users?
IAM
Control
IRM
Enable
A business customer can also
wear a consumer hat. … The
platform will know if the user
is a merchant. …The user will
be able to jump right from the
ad itself, and be able to
upgrade directly. It’s the
cross-use of the platform with
the different identities that
we’re trying to implement.
– Media/advertising
© 2012 Forrester Research, Inc. Reproduction Prohibited
What do you need to do about mobility?
IAM
Trap at the front door
IRM
Accept gracefully
I can’t take Nigeria off the
network like I’d like to. I’m
100% sure I have someone
doing research there; they’re
all over the world, all the time.
– Higher education institution
© 2012 Forrester Research, Inc. Reproduction Prohibited 25
Increase your customer obsession
quotient by:
• Evolving your customer-facing projects to
account for strategic IRM
• Preparing your identity platform for mobility
• Leveraging IRM agility to build security and
customer intelligence
Thank you
Eve Maler
+1 425.345.6756
emaler@forrester.com
@xmlgrrl

More Related Content

What's hot

CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CloudIDSummit
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey ResultsTony Fish
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...
Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...
Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...ProductNation/iSPIRT
 
Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyFIDO Alliance
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?Partnerpedia
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...
Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...
Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...Data Con LA
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 

What's hot (20)

CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...
Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...
Presentation by VondaSoft at the Zensar #TechShowcase. An iSPIRT ProductNatio...
 
Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...
Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...
Data Con LA 2019 - Pitney Bowes methodologies to Organize, Enrich and Analyze...
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 

Similar to Adding Relationship Management to Identity: It's a Must for Customer-Obsessed Companies

UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYForgeRock
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpYann Hermouet
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechUBM (Technology)
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014Symantec
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewPietro Leo
 
SEND | Digital in the Age of the Customer
SEND | Digital in the Age of the CustomerSEND | Digital in the Age of the Customer
SEND | Digital in the Age of the CustomerContactlab
 
Forrester e procurement 2017 wave
Forrester e procurement 2017 waveForrester e procurement 2017 wave
Forrester e procurement 2017 waveAmy Patton
 
Caspio Low-Code Report, 2020
Caspio Low-Code Report, 2020Caspio Low-Code Report, 2020
Caspio Low-Code Report, 2020Brian Metzger
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportResearchFox
 
Preparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementPreparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementNuxeo
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...happiestmindstech
 
IoT: Powering the Future of Business and Improving Everyday Life
IoT: Powering the Future of Business and Improving Everyday LifeIoT: Powering the Future of Business and Improving Everyday Life
IoT: Powering the Future of Business and Improving Everyday LifeCognizant
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessSameer Khan
 
MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)Kanchana K
 
MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)Kanchana K
 

Similar to Adding Relationship Management to Identity: It's a Must for Customer-Obsessed Companies (20)

UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_Enterp
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
Big Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of ViewBig Data Analytics for Banking, a Point of View
Big Data Analytics for Banking, a Point of View
 
SEND | Digital in the Age of the Customer
SEND | Digital in the Age of the CustomerSEND | Digital in the Age of the Customer
SEND | Digital in the Age of the Customer
 
Forrester e procurement 2017 wave
Forrester e procurement 2017 waveForrester e procurement 2017 wave
Forrester e procurement 2017 wave
 
Caspio Low-Code Report, 2020
Caspio Low-Code Report, 2020Caspio Low-Code Report, 2020
Caspio Low-Code Report, 2020
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Successful Marketing Requires Even Better Measurement and Analytics
Successful Marketing Requires Even Better Measurement and AnalyticsSuccessful Marketing Requires Even Better Measurement and Analytics
Successful Marketing Requires Even Better Measurement and Analytics
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
Preparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementPreparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset Management
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
IoT: Powering the Future of Business and Improving Everyday Life
IoT: Powering the Future of Business and Improving Everyday LifeIoT: Powering the Future of Business and Improving Everyday Life
IoT: Powering the Future of Business and Improving Everyday Life
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data Success
 
MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)
 
MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)MarinoTech_Corporate_Deck_-Kanchana (1)
MarinoTech_Corporate_Deck_-Kanchana (1)
 

More from ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 

More from ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Recently uploaded

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

Adding Relationship Management to Identity: It's a Must for Customer-Obsessed Companies

  • 1. Adding Relationship Management To Identity: It’s A Must For Customer-Obsessed Companies Eve Maler, Principal Analyst, Security & Risk June 5, 2014 @xmlgrrl
  • 2. © 2012 Forrester Research, Inc. Reproduction Prohibited 2 In April 2014, ForgeRock commissioned Forrester Consulting to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones. Forrester tested the assertion that companies can obtain significant value by implementing IRM solutions that treat customer identities, and their identity data, as mission- critical for the top line of the business.
  • 3. © 2012 Forrester Research, Inc. Reproduction Prohibited 3 In April 2014, ForgeRock commissioned Forrester Consulting to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones. Forrester tested the assertion that companies can obtain significant value by implementing IRM solutions that treat customer identities, and their identity data, as mission- critical for the top line of the business. In conducting online surveys of 111 B2C and B2B2C executives with responsibility for IAM and six interviews, Forrester found that new business and technical demands require a strategic focus for which existing IAM infrastructure may not be sufficient, and that there is a significant opportunity to utilize IRM- supportive technologies in support of customer-facing IT initiatives.
  • 4. © 2012 Forrester Research, Inc. Reproduction Prohibited The Age of the Customer is a 20-year business cycle in which the most successful enterprises will Reinvent themselves to Systematically Understand and Serve increasingly powerful customers. The age of the customer – what is it? 4
  • 5. © 2012 Forrester Research, Inc. Reproduction Prohibited Four institutional imperatives in the AoC Become a digital business leader Reinvent Transform digitally enabled customer experiences Systematically Create contextual mobile offerings Serve Turn big data into customer insights Understand Age of the customer
  • 6. © 2014 Forrester Research, Inc. Reproduction Prohibited 6 The past
  • 7. © 2014 Forrester Research, Inc. Reproduction Prohibited 7 Today
  • 8. © 2012 Forrester Research, Inc. Reproduction Prohibited Source: Forrester Consumer Technographics, US and Canadian Online Population 18+, 2013 Mobile connects us everywhere Canada USA “Where do you access the Internet on your smartphone?”
  • 9. © 2012 Forrester Research, Inc. Reproduction Prohibited Source: May 2013 “Winning The Customer Experience Game” Forrester report Of course, behind every customer touchpoint is a technology story
  • 10. © 2012 Forrester Research, Inc. Reproduction Prohibited So, what did we find in our study? The demand for “external-facing IAM” is widespread. Traditional IAM architecture is not prepared for customer engagement. IRM success is evaluated differently from IAM success. IRM platforms must be agile, modular, coordinated, and scalable. 10
  • 11. Companies are straining against a view of IAM as a tactical IT concern
  • 12. © 2012 Forrester Research, Inc. Reproduction Prohibited IRM deserves its special moniker because it operates at special scale 12 Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 Partner Employee Consumer 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 101 – 1,000 1,001 – 10,000 500,001 – 5,000,000
  • 13. © 2012 Forrester Research, Inc. Reproduction Prohibited Companies are dubious about the IRM preparedness of existing IAM solutions 13 Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 Considering the IAM technology solutions you use internally now, how prepared are these solutions for use in external deployment scenarios? Not at all prepared, 8% Not very prepared, 22% Somewhat prepared, 36% Very prepared, 34% Base: 111 B2C and B2B2C Executives 66% feel less than “very prepared” Yes, 88% No, 5% N/A 5% Don’t know, 2% Does your budget for building out external-facing, customer and partner identity and access management include investment in new IAM software?
  • 14. IRM priorities are increasing the pressure on IAM projects
  • 15. © 2012 Forrester Research, Inc. Reproduction Prohibited The definition of success is shifting 15 Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 Have you been asked to measure the revenue impact of your customer-facing IT projects? Yes, 83% No, 9% Don’t know, 8% Base: 86 [Those who work on customer-facing IAM projects] Base: 111 B2C and B2B2C Executives
  • 16. © 2012 Forrester Research, Inc. Reproduction Prohibited Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 Metrics are moving from input to output and from internal to business-focused What types of success metrics govern your IAM-related projects today? 5) Drive customer intelligence 4) Drive increased revenue 3) Fraud detection/prevention rates 2) Regulatory compliance (e.g., PCI, HIPAA, EU Data Protection Directive, etc.) 1) On-time and on-budget What types of success metrics do you anticipate will govern your IAM-related projects three years from now? 5) Drive customer intelligence 4) Regulatory compliance (e.g., PCI, HIPAA, EU Data Protection Directive, etc.) 3) Drive increased revenue 2) Fraud detection/prevention rates 1) On-time and on-budget
  • 17. © 2012 Forrester Research, Inc. Reproduction Prohibited Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 Metrics are moving from input to output and from internal to business-focused How will success metrics that govern your IAM-related projects increase or decrease over the next three years? -7% -1% 5% 7% 8% On-time and on-budget Regulatory compliance Drive customer intelligence Drive increased revenue Fraud detection/prevention rates Three years from now versus today Base: 111 B2C and B2B2C Executives
  • 18. © 2012 Forrester Research, Inc. Reproduction Prohibited IRM requires the right architecture We’re undergoing a digital transformation. I didn’t think IAM was going to be so important for this, but now I realize it’s valuable to create a targeted architecture and not have to build specialized applications each time. The users will be able to access the same platform, and their access will be controlled by authorization. It’s really an enabler in completely transforming the way we do things. People expect 24/7 access. – Media/advertising 100%
  • 19. © 2012 Forrester Research, Inc. Reproduction Prohibited Source: January 24, 2014 “Mobile Moments Transform Customer Experience” Forrester report Mobile expectations are rising; customer- obsessed companies prioritize mobility
  • 20. © 2012 Forrester Research, Inc. Reproduction Prohibited 20 Mobile is a really difficult thing to control in our environment.13,000 students probably have 15,000 different devices – probably more like 30–90,000 different devices. So I don’t do anything to attempt to control their mobile experience, other than making the system available to them. – Higher education institution About a year and a half ago, we put the entire sales team on mobile devices. They don’t even get provisioned laptops [anymore]. – Cloud services provider
  • 21. © 2012 Forrester Research, Inc. Reproduction Prohibited Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 Strategic priorities reflect the IRM imperative “Please indicate which of the following are, or will be, strategic IAM priorities for your company.” 21% 24% 25% 22% 20% 21% 19% 25% 28% 35% 37% 32% 36% 27% 31% 41% 39% 21% 33% 33% 40% 40% 46% 43% 36% 32% 48% Managing IAM for multiple types of network-connected devices owned by employees Using IAM to control and enable employee access to cloud/SaaS services Mitigating operational expenses and security risk by extending IAM to employees Consolidating disparate employee IAM systems Ensuring IAM systems scale to handle anticipated customer growth Managing IAM for multiple types of network-connected devices owned by customers Using IAM to enable and unify customer access to cloud-based services Consolidating disparate customer IAM systems Driving business value and revenue by extending IAM to customers Will be a priority in more than a year Will be a priority in the next year Is a current priority Base: 111 B2C and B2B2C Executives IAMIRM
  • 22. © 2012 Forrester Research, Inc. Reproduction Prohibited What do you need to scale? IAM Roles and entitlements IRM Users and engagement [F]or external users, the effort tends to be more focused around the technology and the deployment, whereas when you start internally, there’s a lot more focus on method and process and business change, about 80% business change and 20% technical. For external-facing systems, it tends to be 80% technology and implementation and 20% process. – Global IT services
  • 23. © 2012 Forrester Research, Inc. Reproduction Prohibited What do you need to do to users? IAM Control IRM Enable A business customer can also wear a consumer hat. … The platform will know if the user is a merchant. …The user will be able to jump right from the ad itself, and be able to upgrade directly. It’s the cross-use of the platform with the different identities that we’re trying to implement. – Media/advertising
  • 24. © 2012 Forrester Research, Inc. Reproduction Prohibited What do you need to do about mobility? IAM Trap at the front door IRM Accept gracefully I can’t take Nigeria off the network like I’d like to. I’m 100% sure I have someone doing research there; they’re all over the world, all the time. – Higher education institution
  • 25. © 2012 Forrester Research, Inc. Reproduction Prohibited 25 Increase your customer obsession quotient by: • Evolving your customer-facing projects to account for strategic IRM • Preparing your identity platform for mobility • Leveraging IRM agility to build security and customer intelligence
  • 26. Thank you Eve Maler +1 425.345.6756 emaler@forrester.com @xmlgrrl

Editor's Notes

  1. Abstract: We’re in the age of the customer. Empowered buyers are demanding a new level of customer obsession, and bring-your-own-everything is accelerating. If you think your organization can stick with classically IT-shaped goals and metrics for identity and access management, the data tells us you’ve got another think coming. The security and customer experience challenges are multi- dimensional; to answer them you’ve got to get strategic about adding notions of relationship and context to IAM.
  2. At Forrester we are focusing on the impact the Age of the Customer is having on all businesses whether it be public or private. Age of the customer is a 20 year business cycle which we believe requires organizations to reinvent themselves to understand and serve their powerful customers.
  3. Those words translate into this…… Data into things that can be computed. Translate rules. Turin machine. Translate our business into Data. Digital Disrupter. You can even disrupt yourself. Systematically. Everything you do you want to do better than your competitors. Understand Big Data . Trends. Predict failures. Mobile Mind Shift. Adoption of new behaviors… associated with new tech. Bring multiple sources of information. Make more info avail to me, as I make a decision. Role they are going to play in the Aggregation of all this. End of the day. All busienss is social. IO function. Network of individuals tryign to get things done. B2B world, those social constructs have been there for years. B2C going through rapid adjustment. Were disjointed and unconnected, now they are. B2B they’ve always been connected. FB 30M members, how do you value them. Yesterday Zuckerburg. Need to fix NSA thing. Consumers are loosing trust. FB Google, Linked People don’t know what they are giving up. B2B modernized thru transactions. Consumer – advertsizing.
  4. Image source: https://www.flickr.com/photos/10288834@N08/8336358017/ | PROVISIONAL USE – WAITING FOR PERMISSION
  5. Image source: https://www.flickr.com/photos/cinetics/8701248037 | BY 2.0
  6. Image source: http://blog.marketo.com/2013/10/the-whole-customer-why-you-need-a-360-degree-view.html
  7. Image source: http://www.flickr.com/photos/seabamirum/2850890725/
  8. Source: “Mobile Mindset Study,” Lookout, 2012 (https://www.lookout.com/resources/reports/mobile-mindset/)
  9. “Trust me!” Image source: flickr.com | swamifred | CC BY-SA 2.0 | http://www.flickr.com/photos/swamifred/2990576502/