Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Identity Coherence
Copyright © Identity Summit 2015, all rights reserved.
Transforming the Customer
Journey
Steve Tout
@st...
Virtual Identity – Extending and Managing
IAM From Enterprise To The Cloud
 Part analyst, developer, investor, instigator...
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Transform IAM, Transform the Customer Journey
Integrating IAM acros...
Try Purchase Use EngageActing
Doing
Thinking
Feeling
Overall
Downloading trial software
Register contact profile
Activate ...
Copyright © Identity Summit 2015, all rights reserved.
What challenges do many enterprises face today?
A lot of complexity...
Copyright © Identity Summit 2015, all rights reserved.
Stretch your canvas
IAM vendors are great, but they are no substitu...
How wide is your canvas?
Copyright © Identity Summit 2015, all rights reserved.
Identity Coherence
An imaginary canvas for composing unique and cus...
Protecting the enterprise cloud
Automating incident management & remediation
Managed service for cloud security automation...
Copyright © Identity Summit 2015, all rights reserved.
Questions?
@stevetout
Upcoming SlideShare
Loading in …5
×

Identity Coherence 2015

489 views

Published on

Identity Coherence is an imaginary canvas for composing unique and customized IAM solutions that identify and authorize users, regardless of context.
Identity Coherence delivers on the promise of Integrated GRC solutions that reduce risk and automates compliance.
Identity Coherence provides various approaches for automating common administrative tasks for operational efficiency.
Identity Coherence plans for organizational alignment and business transformation through innovation in IAM architecture, strategy, integrations and program management

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Identity Coherence 2015

  1. 1. Identity Coherence Copyright © Identity Summit 2015, all rights reserved. Transforming the Customer Journey Steve Tout @stevetout
  2. 2. Virtual Identity – Extending and Managing IAM From Enterprise To The Cloud  Part analyst, developer, investor, instigator of disruptive opportunities and introvert  15+ years in enterprise IAM: VMware, Oracle, US Bank, AT&T Wireless  Director – Cybersecurity & Privacy at PwC  Author at Elsevier Syngress
  3. 3. Copyright © Identity Summit 2015, all rights reserved.
  4. 4. Copyright © Identity Summit 2015, all rights reserved. Transform IAM, Transform the Customer Journey Integrating IAM across a broad spectrum of applications… • Can increase revenues from renewals and trial conversions • Reduces password fatigue & frustration across customer touch points • Drives increasing levels of assurance through efficiencies in policy enforcement • Links IAM to your BI and CRM in real-time for richer insights into trends and patterns
  5. 5. Try Purchase Use EngageActing Doing Thinking Feeling Overall Downloading trial software Register contact profile Activate account with 2-Step registration Online checkout Contact Sales Click to chat Buy more licenses Activate a new service subscription Become a enterprise customer Install & register software Manage On-prem to cloud Migrate AD to cloud/SaaS portal Delegate administration Promote user to Admin role Register for Support Forums Contact Support Register for Conference Become a partner Do I have to register to download this? Does my login ID from 2 years ago still work? Does my cloud login work for this? Is this a global ID? Do I login in order to obtain a license or activate my subscription? Will tenant cloud know who I am or do I have to register again? How will I sync or migrate my users to tenant cloud? Do I use my local account or my enterprise credentials to login to cloud? How will I login to tenant cloud? How can I assign access to others within my organization? Can I audit who has access to my tenant? Does my enterprise login ID work for support? Do I have to register a new account for conference attendance? How do I access my Partner content? Consistent messaging & UI and central Login builds confidence and trust Enterprise respected my privacy and did not ask for too much information My authentication experience is the same now as it was during Trial Eval I have visibility into new products and services that my identity is allowed to see and purchase Happy that Enterprise recognizes my global ID and credentials across all of its products and services Enterprise provides me with the tools I need to monitor and manage my users Excited that the enterprise really knows me and correctly identifies me in every context of interaction I will recommend to my colleagues based on my experiences Confidence Helpfulness Confidence Helpfulness Confidence Helpfulness Confidence Helpfulness Customer Journey – The Effects of IAM Transformation
  6. 6. Copyright © Identity Summit 2015, all rights reserved. What challenges do many enterprises face today? A lot of complexity and shortage of talent, but also… • A hodgepodge of identity provisioning systems and processes • End-of-life systems that need to be retired • Provisioning that is embedded into applications • Dependency on expensive legacy SOA frameworks • Lack of a uniform and efficient way to audit provisioning systems • Inconsistent policy enforcement across a disparate provisioning landscape • A lack of executive sponsorship
  7. 7. Copyright © Identity Summit 2015, all rights reserved. Stretch your canvas IAM vendors are great, but they are no substitute for • Formalizing your IAM program and IAM leadership • Installing a dedicated PMO • Integrating IAM with your GRC and ITSM
  8. 8. How wide is your canvas?
  9. 9. Copyright © Identity Summit 2015, all rights reserved. Identity Coherence An imaginary canvas for composing unique and customized… • IAM solutions that identify and authorize users, regardless of context • Integrated GRC solutions that reduce risk and automates compliance • Approaches for automating common administrative tasks for operational efficiency • Plans for organizational alignment and business transformation through innovation in IAM architecture, strategy, integrations and program management
  10. 10. Protecting the enterprise cloud Automating incident management & remediation Managed service for cloud security automation Real time continuous threat protection Providing two-factor and multi-factor Auth for Forgerock IRM 2FA and MFA in a multi-device, multi-connectivity world “New School” cyber defenses and partnerships
  11. 11. Copyright © Identity Summit 2015, all rights reserved. Questions? @stevetout

×