SlideShare a Scribd company logo
1 of 2
Download to read offline
CASE STUDY
About Frontier Communications
Frontier Communications (NASDAQ: FTR) offers
broadband, voice, video, security solutions and
more to residential customers and small to large
businesses in 28 states. Frontier is dedicated to
helping clients enhance their lives and communities
one connection at a time.
The Challenge
To reduce postage costs and encourage users to switch to
paperless billing, Frontier Communications chose to replace
its internal registration and third-party online bill pay systems
with a more seamless solution. “We knew that to give users a
better experience, we needed to integrate customer identity
management across the enterprise,” said Eric Del Sesto, VP of
IT at Frontier. “Whatever solution we chose had to streamline
registration on the front-end while standardizing security protocols
on the back-end.”
The Solution
Gigya’s Registration-as-a-Service (RaaS) provides Frontier
Communications with the flexibility to quickly deploy custom
registration forms and flows across its web and mobile properties,
complete with identity validation and verification policies. All data
collected through registration and known users’ on-site actions
is organized into unified profiles in Gigya’s Profile Management
database, which serves as a single source of truth across
properties. Profile Management automatically maintains data
privacy compliance, protection and quality.
Frontier Communications
Standardizes Security
& Customer-Centricity
Communications
SUCCESS HIGHLIGHTS
•	 Standardizing security best practices across
the enterprise
•	 Streamlining registration on front-end and
back-end
•	 Shifting from an account-centric to
customer-centric view
60% increase in
registered users
60%
© 2015 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other
trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available
to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable).
Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at
http://www.gigya.com/privacy-policy/.
Rev: Gigya_Case_Study_Frontier_Communications_062015
The Benefits
Giving users a more streamlined registration process has resulted
in a 60% increase in registered users across web properties.
Since implementing Gigya, Frontier has shifted its focus from
managing billing accounts to understanding user identities,
resulting in more personal, customer-centric experiences. A
single profile can now be connected to multiple billing accounts,
and users can log in to access TV programming on any device
based on their subscription permissions.
Choosing Gigya as the registration experience and system of
record across Frontier’s web properties has not only streamlined
front-end user experiences, but also back-end data management.
Profile Management makes it easy to migrate existing users,
as well as scale to accommodate additional properties and
subscription growth. This single, centralized repository has
effectively standardized password encryption, data storage and
security across the enterprise.
WORKING WITH
GIGYA KEEPS US
UP-TO-DATE AND
COMPLIANT WHEN IT
COMES TO SECURITY
BEST PRACTICES FOR
MANAGING CUSTOMER
DATA: ONE USER
IDENTITY, ONE
PASSWORD AND ONE
WAY OF ENCRYPTING
AND STORING
INFORMATION.
Eric Del Sesto
VP of IT at Frontier Communications

More Related Content

What's hot

Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data PrivacyGigya
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote ForgeRock
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy PracticesGigya
 
Privacy, Policy, and Encryption
Privacy, Policy, and EncryptionPrivacy, Policy, and Encryption
Privacy, Policy, and Encryptionaccessnowinc
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTForgeRock
 
Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Lauren Tobin
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...TrustArc
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Case Study: Harvard Business Review
Case Study: Harvard Business ReviewCase Study: Harvard Business Review
Case Study: Harvard Business ReviewGigya
 
LoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLinkLoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLinkKristina Quinn
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategyTrustArc
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID - itsme
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guideTrustArc
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya
 

What's hot (19)

Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy Practices
 
Privacy, Policy, and Encryption
Privacy, Policy, and EncryptionPrivacy, Policy, and Encryption
Privacy, Policy, and Encryption
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
Digital Enterprise
Digital EnterpriseDigital Enterprise
Digital Enterprise
 
Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
Update Your CCPA Plan with Practical Insights into the Proposed Regulations, ...
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Case Study: Harvard Business Review
Case Study: Harvard Business ReviewCase Study: Harvard Business Review
Case Study: Harvard Business Review
 
LoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLinkLoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLink
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another level
 
Presentation on e signature
Presentation on e signaturePresentation on e signature
Presentation on e signature
 
2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide2019 10-23 ccpa survival guide
2019 10-23 ccpa survival guide
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 

Similar to Case Study- Frontier Communications

Data Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceData Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceGigya
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, ConvertGigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media CompanyGigya
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertIan Gilbert
 
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Gigya
 
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMData Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMGigya
 
Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023The Digital Insurer
 
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Gigya
 
Data Sheet: Why Social Login
Data Sheet: Why Social LoginData Sheet: Why Social Login
Data Sheet: Why Social LoginGigya
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
Data Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform TiersData Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform TiersGigya
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerGigya
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​Gigya
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
Case Study: Rallyhood
Case Study: RallyhoodCase Study: Rallyhood
Case Study: RallyhoodGigya
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and MarketoGigya
 
Cleartech Infosys Capabilities
Cleartech Infosys CapabilitiesCleartech Infosys Capabilities
Cleartech Infosys Capabilitiescleartech
 
DigitalEdge Billing.pdf
DigitalEdge Billing.pdfDigitalEdge Billing.pdf
DigitalEdge Billing.pdfCogitate.us
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyGigya
 

Similar to Case Study- Frontier Communications (20)

Data Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceData Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX Marketplace
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
 
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
 
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMData Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAM
 
Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023
 
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
Data Sheet: Why Social Login
Data Sheet: Why Social LoginData Sheet: Why Social Login
Data Sheet: Why Social Login
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
Data Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform TiersData Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform Tiers
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
Case Study: Rallyhood
Case Study: RallyhoodCase Study: Rallyhood
Case Study: Rallyhood
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and Marketo
 
Cleartech Infosys Capabilities
Cleartech Infosys CapabilitiesCleartech Infosys Capabilities
Cleartech Infosys Capabilities
 
DigitalEdge Billing.pdf
DigitalEdge Billing.pdfDigitalEdge Billing.pdf
DigitalEdge Billing.pdf
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 

Case Study- Frontier Communications

  • 1. CASE STUDY About Frontier Communications Frontier Communications (NASDAQ: FTR) offers broadband, voice, video, security solutions and more to residential customers and small to large businesses in 28 states. Frontier is dedicated to helping clients enhance their lives and communities one connection at a time. The Challenge To reduce postage costs and encourage users to switch to paperless billing, Frontier Communications chose to replace its internal registration and third-party online bill pay systems with a more seamless solution. “We knew that to give users a better experience, we needed to integrate customer identity management across the enterprise,” said Eric Del Sesto, VP of IT at Frontier. “Whatever solution we chose had to streamline registration on the front-end while standardizing security protocols on the back-end.” The Solution Gigya’s Registration-as-a-Service (RaaS) provides Frontier Communications with the flexibility to quickly deploy custom registration forms and flows across its web and mobile properties, complete with identity validation and verification policies. All data collected through registration and known users’ on-site actions is organized into unified profiles in Gigya’s Profile Management database, which serves as a single source of truth across properties. Profile Management automatically maintains data privacy compliance, protection and quality. Frontier Communications Standardizes Security & Customer-Centricity Communications SUCCESS HIGHLIGHTS • Standardizing security best practices across the enterprise • Streamlining registration on front-end and back-end • Shifting from an account-centric to customer-centric view 60% increase in registered users 60%
  • 2. © 2015 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/. Rev: Gigya_Case_Study_Frontier_Communications_062015 The Benefits Giving users a more streamlined registration process has resulted in a 60% increase in registered users across web properties. Since implementing Gigya, Frontier has shifted its focus from managing billing accounts to understanding user identities, resulting in more personal, customer-centric experiences. A single profile can now be connected to multiple billing accounts, and users can log in to access TV programming on any device based on their subscription permissions. Choosing Gigya as the registration experience and system of record across Frontier’s web properties has not only streamlined front-end user experiences, but also back-end data management. Profile Management makes it easy to migrate existing users, as well as scale to accommodate additional properties and subscription growth. This single, centralized repository has effectively standardized password encryption, data storage and security across the enterprise. WORKING WITH GIGYA KEEPS US UP-TO-DATE AND COMPLIANT WHEN IT COMES TO SECURITY BEST PRACTICES FOR MANAGING CUSTOMER DATA: ONE USER IDENTITY, ONE PASSWORD AND ONE WAY OF ENCRYPTING AND STORING INFORMATION. Eric Del Sesto VP of IT at Frontier Communications