Mike gives us his view on “Digital Identity’s Next Act” as digital transformation, regulations, and the Internet of Things change the way organizations do business.
Connected Car: Putting Digital Identity Behind the WheelForgeRock
A modern connected vehicle is no longer just a car with a built-in wireless access point – it is a complex network of multiple interconnected systems from different vendors that are constantly communicating with each other as well as with various external parties, both consumer-facing and industrial. Each connected car is a rolling IoT ecosystem where industrial applications and protocols coexist with consumer-grade apps and services.
Identity Live Sydney 2017 - Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Live Sydney 2017 - Andrew LathamForgeRock
Identity is the key to providing compelling products and services for customers. Digital services are leveraging internet of things (IoT) devices–health sensors, home lighting, commercial building control, connected vehicles, and so on–but security, privacy and consent is a major concern. To provide a secure connected experience for customers, you need a holistic identity strategy, where “identities” represent not just humans, but devices, things, and services, and you also need to harness the complex relationships between them. Customers need assurance their interactions with IoT devices are secure, and they need control over how all of their data is used and shared. Learn how you can solve these and other challenging customer identity and access management (CIAM) problems today, and be ready for the identity challenges of the future with ForgeRock.
Identity Live London 2017 | Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Live London 2017 | Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Connected Car: Putting Digital Identity Behind the WheelForgeRock
A modern connected vehicle is no longer just a car with a built-in wireless access point – it is a complex network of multiple interconnected systems from different vendors that are constantly communicating with each other as well as with various external parties, both consumer-facing and industrial. Each connected car is a rolling IoT ecosystem where industrial applications and protocols coexist with consumer-grade apps and services.
Identity Live Sydney 2017 - Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Live Sydney 2017 - Andrew LathamForgeRock
Identity is the key to providing compelling products and services for customers. Digital services are leveraging internet of things (IoT) devices–health sensors, home lighting, commercial building control, connected vehicles, and so on–but security, privacy and consent is a major concern. To provide a secure connected experience for customers, you need a holistic identity strategy, where “identities” represent not just humans, but devices, things, and services, and you also need to harness the complex relationships between them. Customers need assurance their interactions with IoT devices are secure, and they need control over how all of their data is used and shared. Learn how you can solve these and other challenging customer identity and access management (CIAM) problems today, and be ready for the identity challenges of the future with ForgeRock.
Identity Live London 2017 | Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Live London 2017 | Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...ForgeRock
Daniel Raskin, SVP Product Management, ForgeRock - The identity world is evolving … again. The growth of IoT endpoints is outpacing the scale of standard identity platforms. More non-traditional things are now given digital identities. New device protocols force identity platforms to become proficient in "foreign languages," in order to communicate with next-generation devices and services. The identity use case of yesteryear is gone: We need to reinvent what a typical identity deployment looks like. In this session, we will explore this changed world and discuss how identity needs to adapt.
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
By Steve Ferris SVP Global Customer Success, ForgeRock, Alain Barbier Principal Customer Engineer, ForgeRock, Leonard Moustacchis Senior Customer Engineer, ForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Live Sydney 2017 - Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
The ForgeRock Identity Platform is trusted by companies around the world to be their foundation for digital transformation. ForgeRock extends their leadership in this space with the latest release of the ForgeRock Identity Platform, featuring advanced capabilities to meet the needs of today’s consumer facing digital services. In this webinar, learn how new features improve customer engagement and insight, offer greater privacy controls, extend security and usability for internet of things (IoT), enable DevOps and dynamic architectures, and more.
Digital growth demands identity management. Digital identities allow companies to identify and engage with their customers across devices, from laptops to mobiles, tablets, connected cars, healthcare wearables, and connected home devices. Companies cannot take advantage of mobile, cloud, or Internet of Things (IoT) innovations without a scalable, replicable identity strategy. This session is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Identity Live Sydney 2017 - Michael DowlingForgeRock
Businesses operate in a digital ecosystem that’s ever more connected, collaborative and complex. That means becoming a “self-sustaining enterprise”. What does this mean? Think about the business ecosystem as a neighbourhood. A self-sustaining enterprise understands and responds to who’s moving in and out, what they’re doing, and what threats they present. Identity is key to understanding and navigating new relationships in order to perform as effectively as possible while managing risk at an optimal level.
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017ForgeRock
Lisa O'Connor, Global Security R&D Lead at Accenture Technology Labs - Businesses operate in a digital ecosystem that’s ever more connected, collaborative and complex. That means becoming a “self-sustaining enterprise.” What does this mean? Think about the business ecosystem as a neighborhood. A self-sustaining enterprise understands and responds to who’s moving in and out, what they’re doing, and what threats they present. Understand and navigate new relationships in order to perform as effectively as possible while managing risk at an optimal level.
Identity Live Paris 2017 | Marko Orenius, Amer SportsForgeRock
By Marko Orenius, Director, Digital Business Platform, Amer Sports Digital Services
Amer Sports is a world-leading sporting goods company with internationally recognized brands and is a manufacturer of apparel and equipment for athletes around the world. Digitalisation is now impacting the sports industry and consumer expectations of service, at both the retail and individual training level. Amer Sports views the coming disruption as an opportunity and is building capabilities to compete in an omnichannel marketing environment. Therefore, sports equipment IoT development is a high investment priority. Digital identities are at the core of this change and technology is allowing a new enterprise architecture to emerge. The way forward requires distinct thinking in the areas of privacy, security and scalability.
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
Victor Ake's presentation on identity in the age of the internet of things during the KuppingerCole European Identity and Cloud Conference 2016.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Ian will discuss the challenges and opportunities that come with managing customer identity management at HSBC, one of the largest banking and financial services organisations in the world. With over 37 million customers spread across 37 different markets, digital identity has become a strategic initiative for HSBC in order to modernise infrastructure and build stronger relationships with their customers. Ian will cover HSBC's path to consolidating on a single digital identity solution, as well as a few of the reasons why they chose ForgeRock including standards support, biometrics and API security.
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Devices, and Things: Better Than a Fish in Your Ear
In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things. The ForgeRock Identity Gateway, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes. And no slimy little fish required!
Highlights:
- Intro to the ForgeRock Identity Platform
- New features available in this release
- Maintaining existing infrastructure through password replay
- Gateway and a Mobile device walk into a bar….
- Federating services
- Mobilizing those apps
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...ForgeRock
Daniel Raskin, SVP Product Management, ForgeRock - The identity world is evolving … again. The growth of IoT endpoints is outpacing the scale of standard identity platforms. More non-traditional things are now given digital identities. New device protocols force identity platforms to become proficient in "foreign languages," in order to communicate with next-generation devices and services. The identity use case of yesteryear is gone: We need to reinvent what a typical identity deployment looks like. In this session, we will explore this changed world and discuss how identity needs to adapt.
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
By Steve Ferris SVP Global Customer Success, ForgeRock, Alain Barbier Principal Customer Engineer, ForgeRock, Leonard Moustacchis Senior Customer Engineer, ForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Live Sydney 2017 - Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
The ForgeRock Identity Platform is trusted by companies around the world to be their foundation for digital transformation. ForgeRock extends their leadership in this space with the latest release of the ForgeRock Identity Platform, featuring advanced capabilities to meet the needs of today’s consumer facing digital services. In this webinar, learn how new features improve customer engagement and insight, offer greater privacy controls, extend security and usability for internet of things (IoT), enable DevOps and dynamic architectures, and more.
Digital growth demands identity management. Digital identities allow companies to identify and engage with their customers across devices, from laptops to mobiles, tablets, connected cars, healthcare wearables, and connected home devices. Companies cannot take advantage of mobile, cloud, or Internet of Things (IoT) innovations without a scalable, replicable identity strategy. This session is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Identity Live Sydney 2017 - Michael DowlingForgeRock
Businesses operate in a digital ecosystem that’s ever more connected, collaborative and complex. That means becoming a “self-sustaining enterprise”. What does this mean? Think about the business ecosystem as a neighbourhood. A self-sustaining enterprise understands and responds to who’s moving in and out, what they’re doing, and what threats they present. Identity is key to understanding and navigating new relationships in order to perform as effectively as possible while managing risk at an optimal level.
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017ForgeRock
Lisa O'Connor, Global Security R&D Lead at Accenture Technology Labs - Businesses operate in a digital ecosystem that’s ever more connected, collaborative and complex. That means becoming a “self-sustaining enterprise.” What does this mean? Think about the business ecosystem as a neighborhood. A self-sustaining enterprise understands and responds to who’s moving in and out, what they’re doing, and what threats they present. Understand and navigate new relationships in order to perform as effectively as possible while managing risk at an optimal level.
Identity Live Paris 2017 | Marko Orenius, Amer SportsForgeRock
By Marko Orenius, Director, Digital Business Platform, Amer Sports Digital Services
Amer Sports is a world-leading sporting goods company with internationally recognized brands and is a manufacturer of apparel and equipment for athletes around the world. Digitalisation is now impacting the sports industry and consumer expectations of service, at both the retail and individual training level. Amer Sports views the coming disruption as an opportunity and is building capabilities to compete in an omnichannel marketing environment. Therefore, sports equipment IoT development is a high investment priority. Digital identities are at the core of this change and technology is allowing a new enterprise architecture to emerge. The way forward requires distinct thinking in the areas of privacy, security and scalability.
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
Victor Ake's presentation on identity in the age of the internet of things during the KuppingerCole European Identity and Cloud Conference 2016.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Ian will discuss the challenges and opportunities that come with managing customer identity management at HSBC, one of the largest banking and financial services organisations in the world. With over 37 million customers spread across 37 different markets, digital identity has become a strategic initiative for HSBC in order to modernise infrastructure and build stronger relationships with their customers. Ian will cover HSBC's path to consolidating on a single digital identity solution, as well as a few of the reasons why they chose ForgeRock including standards support, biometrics and API security.
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Devices, and Things: Better Than a Fish in Your Ear
In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things. The ForgeRock Identity Gateway, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes. And no slimy little fish required!
Highlights:
- Intro to the ForgeRock Identity Platform
- New features available in this release
- Maintaining existing infrastructure through password replay
- Gateway and a Mobile device walk into a bar….
- Federating services
- Mobilizing those apps
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
The Future is Now: What’s New in ForgeRock Identity Management ForgeRock
In this webinar, learn how ForgeRock Identity Management makes it easy for users to sign up to services using full-featured social registration capabilities, provides integration with Customer Data Management (CDM) systems, and is ready for today’s future-proof customer identity and access management (CIAM) solutions, and much more.
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise.
Jay Samit (Deloitte): Delivering ROI with Digital RealityAugmentedWorldExpo
A talk from the Work Track at AWE USA 2017 - the largest conference for AR+VR in Santa Clara, California May 31- June 2, 2017.
Jay Samit (Deloitte): Delivering ROI with Digital Reality
Today, Virtual Reality, Augmented Reality and Mixed Reality implementations are delivering billion dollar efficiencies for industries ranging from transportation, technology, retail, travel, manufacturing, and automotive. Sharing the groundbreaking results of clients, Deloitte’s head of Digital Reality will share the metrics achieved in actual case studies where Digital Reality transformed corporate processes and yielded high value return on investment.
http://AugmentedWorldExpo.com
CES 2018 Technology and Trends Impact on Brands v1.1
This year we had several people from designaffairs attend CES 2018.
So with that in mind, the brand research and strategy team (BRS) at designaffairs along with guests from the interface and interaction design department did a quick digestion of what we saw along with some interpretation.
The hot topics discussed were:
- Digital assistants (voice) as a way to frame your brand's strategy.
- AI's power to accelerate technologies including voice, VR and robotics
- The rise of many voice platforms and what this could mean for consumers including; confusion, ethics, privacy
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
Presented by Stein Myrseth, Senior Technology Solutions Director of ForgeRock and Gerhard Zehethofer, VP or Industries (IOT & Manufacturing) present at Identity Live in Austin in 2018
Align Your ITSM and SecOps Strategy for Unstoppable ITSecPod
To deal with the rising number of cyberattacks, ITSM strategy should align with SecOps (Security Operations). With SecOps functions merged within the ITSM landscape, organizations can build a robust Cyberattack prevention process and aid users in serving the rising business demands.
Having visibility over IT assets, understanding their security risk exposures, and responding to the risks on time will uphold ITSM objectives. ITSM tools must integrate with external tools eco-system to facilitate Vulnerability Management, Patch Management, and vulnerability response within the SecOps strategy.
Join us in the live webinar where Chandrashekar, CEO, SecPod, and Eric Bohren, Sr Director of Partnerships, Freshworks, talk about “Align Your ITSM and SecOps Strategy for Unstoppable IT”
In this webinar, you will learn
The need to integrate ITSM and SecOps strategy
Benefits of Integrating ITSM & SecOps Tools
About FreshService and SecPod SanerNow’s Integration
Lasse Andresen, CTO and Founder, ForgeRock
A technology preview from our CTO office. Presentation looks at the Innovation coming out of ForgeRock Labs including the IoT SmartCity demonstration.
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
An overview of the Alliance, the problem we are addressing the password problem, how FIDO is addressing it, the new ecosystem we are creating and the road ahead.
We have a packed agenda with hands-on tutorials, customer spotlights, product roadmaps and peer-to-peer sessions for like-minded system users. We are also covering industry best practices that impact long-term success in today’s business environment, including retail execution, business intelligence, mobility and data synchronization.
From Denver based identity and access management vendor Ping Identity comes this presentation explaining how financial services can benefit from identity management solutions.
Similar to Identity Live Paris 2017 | Mike Ellis (20)
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
Containerized IAM on AWS and Beyond
The do’s and don’ts of running containerized Identity systems in the cloud and what it’s like to run and operate this type of solution
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
Containerized IAM on Amazon Web Services - Deep Dive
A deep technical look at the architecture behind running containerized IAM on AWS and what your team needs for a successful deployment
You’ll experience an in depth review of:
Assets and processes needed to containerize ForgeRock
Architecture and processes guiding containerized IAM on AWS
How containers are deployed into Kubernetes
Monitoring and management strategies
Continuous integration configuration
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
Applying Innovative Tools for GDPR SuccessForgeRock
The GDPR's enforcement date is finally around the corner: May 25th. Have you successfully conceived of this groundbreaking EU regulation as a business opportunity? Have you addressed the challenges of both compliance and customer trust in a more comprehensive fashion? In this webcast, ForgeRock experts Nick Caley, VP of Financial and Regulatory, and Eve Maler, VP of Innovation and Emerging Technology, and Carlos Scott, Digital Risk Consultant will:
Discuss the GDPR in the context of regulatory compliance, digital innovation, and "ripped from the headlines" tensions in consumer trust and the personal data economy
Describe important privacy, consent, and trust innovations made in recent times, including in the standards world (OAuth, UMA, and more)
Demonstrate capabilities of the ForgeRock Identity Platform that address GDPR requirements, including a Profile and Privacy Management dashboard
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
32. Delivering a single view of
the customer across
brands and sport products,
increasing customer
loyalty.
ForgeRock is enabling
consumers to use identity-
enabled sporting
equipment and
mobile/cloud gaming
engagement.
34. Securing the connected car
and enabling connection to
personalized Toyota
resources in the cloud.
85% of Auto Executives
agree that the digital ecosystem
will generate higher revenues
than the hardware of the car itself
– KPMG 2017
We are all familiar with the analogy of the light at the end of a tunnel. The question is…is that the way forward and out or is it a train barreling down at us?
I think we are facing this exact dilemma in the industry …. but it’s not a single train coming at us, its more like this..
If what you had to solve for is a single train on a single track, life would be easy. Not unlike solving focused identity issues like single sign on. A user desiring to use a single username password to access applications. While a serious need, there are lots of solutions out there to solve for that and many are very good. We offer a great one ourselves. But our world is in fact more complex than that…it’s a tunnel filled with lights, filled with challenges. It’s not just the identity of people, it’s the identity of everything.
In the identity world, solving complex problems is our daily life. Identity as a technology started over 20 years ago solving for the security issues of employees needing access a single application such as an HR system or an email system. My how things have changed.
[History of Identity Video]
From IAM, to CIAM, to digital identity management
But it’s far more than WHAT the thing is or WHO the person is but also using that information to develop all new business models, all new applications, all new industries. This is broadly defined as the process of “digital transformation”, something I’m sure you’ve heard all before.
This massively interconnected world is changing the way we work, the way we play, the way we communicate.
According to a recent McKinsey report, digital technologies and processes have penetrated only about 35% of the way into the average industry, meaning that merely a third of a typical company’s products and operations that could be digitized have been. Yet the impact has already been dramatic: Globally, digital disruption is shaving 45% off incumbent companies’ revenue growth and 35% off their earnings before interest and taxes (EBIT). As digitization accelerates, the hit to revenues and profits of digital laggards will grow significantly, even as the digital leaders capture disproportionate gains.
This massively interconnected world is changing the way we work, the way we play, the way we communicate.
According to a recent McKinsey report, digital technologies and processes have penetrated only about 35% of the way into the average industry, meaning that merely a third of a typical company’s products and operations that could be digitized have been. Yet the impact has already been dramatic: Globally, digital disruption is shaving 45% off incumbent companies’ revenue growth and 35% off their earnings before interest and taxes (EBIT). As digitization accelerates, the hit to revenues and profits of digital laggards will grow significantly, even as the digital leaders capture disproportionate gains.
This massively interconnected world is changing the way we work, the way we play, the way we communicate.
According to a recent McKinsey report, digital technologies and processes have penetrated only about 35% of the way into the average industry, meaning that merely a third of a typical company’s products and operations that could be digitized have been. Yet the impact has already been dramatic: Globally, digital disruption is shaving 45% off incumbent companies’ revenue growth and 35% off their earnings before interest and taxes (EBIT). As digitization accelerates, the hit to revenues and profits of digital laggards will grow significantly, even as the digital leaders capture disproportionate gains.
Digital transformation means that the rules of the game are changing as well. We have new regulations for the digital age.
Take a look at the financial services sector in the UK and Europe for example.
Two regulations, Open Banking and the Second Payments Services Directive (PSD2) are transforming how banks, fintechs, and others share, handle, and work with personal customer data. Existing regulations were meant for
old world, analog banks. With the rise of digital banking comes a need for new regulations.
Open Banking:
January 13, 2018
At the core of Open Banking core, it’s about giving the customer greater choice of financial providers and control over personal data. Mandated by the Competition and Markets Authority and aimed at the 9 largest banks in the UK, Open Banking is meant to increase competition by requiring these banks to share customer data via secure APIs. This opens up the market for innovation as now fintech startups, digital banks, and even non-banks like retailers can securely
access bank customer data and use it to build innovative new products and services. For example, HSBC, who we’ll be hearing more from later today, has released the beta version of their
new HSBC Beta personal financial management app as part of their preparations for Open Banking. The app allows customers to connect over 20 different accounts from competing banks in order to view all of their balances in one place and receive personalized
financial advice based on spending habits and other features. This is the start of a new era in banking where personal data is more easily shared, not kept proprietary as before. It also requires new approaches to privacy
and consent.
PSD2:
Q1 of 2018
Alternately, the Second Payments Services Directive (PSD2) applies to all of Europe but has similar requirements to Open Banking around customer data sharing via secure APIs, with more specific requirements around strong customer authentication for added security.
Like Open Banking, PSD2 will go into force in early 2018 as well and is meant to encourage innovation, not only among banks, but among payments providers as well. PSD2 has a focus on increasing the speed and efficiency of payments within the EU market and allowing third party access to customer account information,
GDPR:
May 25, 2018
And there’s also the elephant in the room, the EU General Data Protection Regulation, that we all know, creating new standards around customer privacy and consent. GDPR goes into force soon and will touch all industries with real, serious consequences.
It’s all about giving the customer control over their personal data, about giving power back to the people. And I think this is just the beginning. We’re going to see a lot more
privacy regulations coming soon to fit the needs of the digital world. In areas like the IoT and connected car, we’ve already seen some early attempts at controlling the collection and use of personal data.
Here are a few more trends and challenges that we think are having a significant impact on digital organizations
Internet of Things: Systems must now scale to the billions
Privacy and Consent: Customers have a right to control their data
Marketing Efficiencies: powered by a single customer record
Omnichannel Operation: Customers expect a world class customer experience
Modernization: Unifying identity silos created thru M&A, LOBs, and integrating with legacy systems
Stat Source
Gartner
GDPR
Accenture: https://www.accenture.com/t20160825T041338__w__/us-en/_acnmedia/PDF-23/Accenture-Expectations-Vs-Experience-Infographic-June-2016.pdf
Aberdeen: https://www.digitalcommerce360.com/2013/12/31/why-omnichannel-strategy-matters/
ForgeRock research
It seems like digital transformation is an unstoppable force. But there is one thing that can slow it down: security challenges
The number of hacks and breaches has risen dramatically in the past years.
In the first half of 2017 there were more data leaked, lost, or stolen than in all of 2016 combined - Gemalto
http://au.pcmag.com/news/49777/more-data-leaked-in-first-half-of-2017-than-all-of-2016
Cybersecurity is a serious issue and one that identity has a major role in. Over 81% of hacks and breaches using stolen or weak passwords.
Verizon DBIR 2017
What happens when things really go wrong?
You have a massive breach of privacy and trust. We may never know all the reasons behind the Yahoo! hack in 2013, but one thing does strike me is the incredible scale of it. Around 3 billion accounts were compromised.
https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1
To combat various breaches and hacks, we’ve seen new technologies like biometrics adopted to go beyond the password. We saw this with Apple FaceID in the new iPhone X. However, the adversaries are well funded, highly motivated, and patient. Take for example the recent use of a contact lens to compromise the iris scanner on the Samsung Galaxy S8.
https://motherboard.vice.com/en_us/article/wjeyk5/hackers-unlock-samsung-galaxy-s8-with-fake-iris
We’ve also seen examples where hackers and even children and siblings can thwart Apple FaceID be it with masks and other methods of replicating facial structure or by being related!
https://www.wired.com/story/10-year-old-face-id-unlocks-mothers-iphone-x/
And of course, we all know about the massive IoT botnets that have formed out of unsecured IoT devices. Be it the Mirai botnet of earlier this year, or more recent Reaper botnet, they pose significant threats to security on the Internet, with the power to cripple organizations. This will only grow as a problem as the IoT continues to expand and everything becomes a connected thing.
https://www.wired.com/story/reaper-iot-botnet-infected-million-networks/
While technology will continue to improve and add features that require signs of life and other factors, so will the skills
of bad actors. It’s critical that security continues to involve in a way that helps to increase security, without increasing friction. I know I don’t want to live in a world where we to input 10 factors of authentication before gaining access.
We’ve established that identity is a security concern. But it also offers a tremendous opportunity for organizations. It enables you to know your customers and citizens and create true value for them.
To know your customers means not just who they are, but where they are, their behaviors, their movements. Your ability to anticipate their next move, their desire or their need is critical to succeeding in the future. And identity is the foundation of all of this.
Quote from the Forrester IAM Trends Report 2017
The experts at Forrester sum it up well: identity is the key to engaging with your customers in a secure and private way
If you’ve ever been to a Four Seasons resort or other high end establishments like the Ritz Carlton you understand the exceptional level of service they provide. It’s as if they know what I want before I ask. They offer personalized service that is truly Impressive. But it’s a very manual system of keeping track of guests, ensuring the staff has the information on their identity, what they like, and what they need.
How do we duplicate that level of white glove service in the digital world? Or better yet, how do we leverage digital technologies to enhance the ordinary experiences in the physical world? How can this be taken to the next level?
Marriott (owners of the Ritz) is on a journey to digitally transform their guest experience. They’re deploying identity-based solutions to completely revamping the customer experience by marrying the digital and physical worlds. In the future (and in test now in some locations), with your consent, Marriott, through their app on your phone will be tracking you and understanding your location and relate it to any reservation you may have. Their systems will evaluate your travel and understand your journey enough to predict your arrival time. Prior to arrival on property they will send you a welcome and ask you to authenticate yourself and confirm your intent to check in soon. As you enter the hotel, beacons will pick up your signal and once again welcome you and ask you if you’d like to check it. Another authentication and your room number appears on your phone and you go directly to your room by passing the registration desk. Your phone in this case acts as your key (if you choose) and magically unlocks the door to your awaiting personalized room complete with feather pillow, margarita pizza and Amstel Light, all taken from not only your preferences but your past behavior of always ordering the pizza and beer when you check in between 7 and 10pm! It will be a truly seamless, personalized guest experience that is enabled by digital identity. Sure, the Ritz provides a similar experience but it requires a small army of highly trained staff to provide you personal, 1-1 service, and also costs much more! Does it scale? Nope. There’s a reason the Ritz and others are renowned as high-end resorts and hotels, their focus on impeccable customer service is enabled by high guest to staff ratio. In fact, employees at the Ritz are encouraged to improve and empowered to fix or improve a guest’s experience and can spend up to $2000 a day on a guest. As nice as this is, it just isn’t feasible at all of Marriott’s properties. By using new digital technology, Marriott is delivering this 5 star experience, at scale.
That Marriott example is real and leverages identity across multiple systems (reservation, geo tracking, room service, loyalty program and security). It’s a classic example of the relationship between people, their devices (phone) and things (beacons and door locks).
If your company or organization isn’t thinking out of the box like Marriott about how to change the very way you conduct business, I can guarantee you that either your competitors are or some young start up here in Austin or somewhere in the world is creating the next UBER for your industry.
ForgeRock customer Marriott (owners of the Ritz) is on a journey to digitally transform their guest experience. They’re deploying identity-based solutions to completely revamping the customer experience by marrying the digital and physical worlds. In the future (and in test now in some locations), with your consent, Marriott, through their app on your phone will be tracking you and understanding your location and relate it to any reservation you may have. Their systems will evaluate your travel and understand your journey enough to predict your arrival time. Prior to arrival on property they will send you a welcome and ask you to authenticate yourself and confirm your intent to check in soon. As you enter the hotel, beacons will pick up your signal and once again welcome you and ask you if you’d like to check it. Another authentication and your room number appears on your phone and you go directly to your room by passing the registration desk. Your phone in this case acts as your key (if you choose) and magically unlocks the door to your awaiting personalized room complete with feather pillow, margarita pizza and Amstel Light, all taken from not only your preferences but your past behavior of always ordering the pizza and beer when you check in between 7 and 10pm! It will be a truly seamless, personalized guest experience that is enabled by digital identity. Sure, the Ritz provides a similar experience but it requires a small army of highly trained staff to provide you personal, 1-1 service, and also costs much more! Does it scale? Nope. There’s a reason the Ritz and others are renowned as high-end resorts and hotels, their focus on impeccable customer service is enabled by high guest to staff ratio. In fact, employees at the Ritz are encouraged to improve and empowered to fix or improve a guest’s experience and can spend up to $2000 a day on a guest. As nice as this is, it just isn’t feasible at all of Marriott’s properties. By using new digital technology, Marriott is delivering this 5 star experience, at scale.
That Marriott example is real and leverages identity across multiple systems (reservation, geo tracking, room service, loyalty program and security). It’s a classic example of the relationship between people, their devices (phone) and things (beacons and door locks).
If your company or organization isn’t thinking out of the box like Marriott about how to change the very way you conduct business, I can guarantee you that either your competitors are or some young start up here in Austin or somewhere in the world is creating the next UBER for your industry.
Just as how Marriott is all about improving the guest experience, HSBC, who I mentioned earlier, is laser focused on revolutionizing the banking experience for its customers.
You all know HSBC, the largest bank in the UK and one of the largest in the world. HSBC chose ForgeRock to support their digital identity needs across the globe and because of ability to help them not only with current challenges around access management and identity management, but with impending ones like Open Banking and PSD2 as well. As one of the CMA9 banks that is mandated to open up APIs to share customer data, HSBC had a serious challenge and looked to ForgeRock’s standards based solution to secure customer data sharing.
Their HSBC Beta app is one example of how HSBC builds upon the ForgeRock Identity Platform to quickly deliver a new, innovative service.
You’ll be hearing more about the HSBC story later today, from Ian Sorbello and I think it’s just a fantastic example of the way digital identity can be used to transform an industry.
There is no industry immune from the digital revolution. This slide shows a McKinsey survey of where digital penetration is occurring.
Media and entertainment lead the pack. One of our customers, the BBC, driven by deregulation of media and competitive pressures from new entrants like Netflix, is using identity to dramatically change their delivery and overall business model as well.
> Fully integrated and scalable cloud-based identity management solution for the myBBC service, 20M+ accounts
> Powers device pairing with connected TVs
> Unique customer identity enables personalization, multi-device support, permissions, consent, start-stop streaming and more
> Enables secure data sharing while respecting customer privacy with contextually sensitive registration process, layered approach to data privacy during registration
> Powers personalized services, recommendations, and engagement based on context, preferences, consumption patterns, and more
The global population is a little over 7 billion people.
Of those 7 billion just over half connect to the internet.
Compare that to connected things. Gartner estimates that at end of of 2017 there will be over 8.4 things connected to the internet. That’s more than double the number of people connected to the internet and greater than the world’s total population.
And by 2020 Gartner estimates over 20.5 Billion devices connected to the internet.
The global population is a little over 7 billion people.
Of those 7 billion just over half connect to the internet.
Compare that to connected things. Gartner estimates that at end of of 2017 there will be over 8.4 things connected to the internet. That’s more than double the number of people connected to the internet and greater than the world’s total population.
And by 2020 Gartner estimates over 20.5 Billion devices connected to the internet.
The global population is a little over 7 billion people.
Of those 7 billion just over half connect to the internet.
Compare that to connected things. Gartner estimates that at end of of 2017 there will be over 8.4 things connected to the internet. That’s more than double the number of people connected to the internet and greater than the world’s total population.
And by 2020 Gartner estimates over 20.5 Billion devices connected to the internet.
Connected devices without security are a serious risk for any organization.
The security issues alone of these connected devices is incredible. And sadly, security of things has been an afterthought. But that doesn’t have to be the case. We are here to change that….by bringing the power of digital identity to the IoT
Dynamic vs. static – personalize experience and build trust
To build better secure interactions with customers and citizens, Context is important
Context is the little piece of information that is not static
It is dynamic and informs us about the behaviour or the situation of the user
It can affect the user experience and/or security of the interaction
EXamples of User behaviour: A non common IP address, not logged in in the last 3 months
Using a tablet instead of the desktop at an unusual hour, etc.
Traditional IAM can’t do what digital identity management can.
It’s about building trusted relationships between people, services, and things, at massive scale.
What’s the value of relationships?
RELATIONSHIPS
context and intelligence for customer experience, privacy, and security
Relationships are how people, services, and things interact within your digital ecosystem.
Identity relationships can help drive efficient, secure access, protect customer privacy, and improve the customer experience.
Traditional identity systems are based on static rules. At ForgeRock, we believe that identity goes hand in hand with relationships and the context that comes with it.
You need to know how John relates to his connected car, his mobile device, and smart phone for some truly exciting things to happen. These devices and services can communicate with each other and understand their role in the digital ecosystem as a result of these identity relationships. And these relationships can change over time. So once John sells his connected car, it will update with Robert’s new information and connect to his digital ecosystem. Identity is at the center of all of these contextual interactions.
RELATIONSHIPS
convey authorization information
and provide context
POLICY
fed by relationships and attributes
What can you do with the ForgeRock Identity Platform? (Meant to position how ForgeRock fits into the Samsung ecosystem)
You can leverage the power of trusted identities to introduce new products and services, at massive scale.
Our standards based architecture and flexibility enable you to quickly build your products and services anywhere you want, be it on prem, public or private cloud, or hybrid model
With trusted identities provided by the ForgeRock Identity Platform you can go beyond security to building and benefiting from the relationships between your people, services, and things
At ForgeRock, we believe strongly in the power of identity to help secure the IoT. You heard about it with BBC and you’ll hear about it with a few of our other customers that are at the bleeding edge as well. Continuous, contextual security, adaptive authentication, privacy tools, and more, these are all ways in which our customers are using the ForgeRock Identity Platform to build trusted relationships with their people, services, and things.
That’s why with our new release of the ForgeRock Identity Platform, we introduced general availability of ForgeRock Edge Security. Now organizations can secure their devices from chip to cloud. The Identity of Things is real but it requires an identity platform that is capable handling complexity and massive scale to move beyond traditional identity use cases.
Want proof that edge computing is going to change the world?
Just last week, our partners at Dell Technologies announced that they were investing $1B in R&D for IoT and edge over the next 3 years. Dell is one of the companies leading the IoT revolution and we’re proud to partner with them to help secure the edge.
Lastly, I wanted to talk about AMER Sports.
[Bounce Basketball]
For those of you who do not know this FINNISH company, I am sure that you know at least 1 of their brands: Salomon, Wilson, Suunto, Atomic or Precor.
> Create a single view of and for the customer with the ForgeRock Identity Platform, enabling higher revenue per customer and stickiness
> A solution that meets their immediate needs today and will meet their future IoT plans as well
> Common platform reduces integration complexity and TCO
> Secures customer data and enable privacy controls
> Go live with Sportstracker and Movescount populations (3M identities each) in Q2
An example of how ForgeRock is using identity to help Toyota to secure their connected car.
https://www.forgerock.com/app/uploads/2015/06/case_study_toyota_letter.pdf
About Toyota:
Toyota Motor Corporation is a Japanese automaker headquartered in Toyota, Aichi, Japan.
In 2013 the multinational corporation consisted of 333,498 employees worldwide
as of March 2013, is the thirteenth-largest company in the world by revenue. Toyota was the second-largest passenger automobile manufacturer in 2012 (by production), the largest in overall production (including commercial vehicles)
As of November 2013, it is also the largest listed company in Japan by market capitalization (worth more than twice as much as #2-ranked SoftBank) and by revenue.
The Challenge: Create a secure user portal that allows users to sign in once to access all their Toyota resources, and is capable of authenticating cars. This should enable users to link their devices and their cars, and access them both at once via the secure portal.
The Solution:
ForgeRock Access Management supports secure authentication of user accounts on Toyota portal, where users register their car navigation systems, for example.
Users then pair their mobile phones with the car’s navigation system.
They retrieve the destinations sent from Google Maps on their phones to their cars via paired bluetooth, and log into the Toyota portal to activate the internet on the car’s navigation system.
This service is currently available in Austria, Belgium, Denmark, Germany, Spain, Finland, France, Italy, Liechtenstein, Netherlands, Norway, Sweden, Switzerland and United Kingdom. In the future, more countries will become available.
The dashboard is solution that covers the wide range of GDPR requirements and we’re excited for our customers to give control over personal data back to their customers.
We have a saying at ForgeRock “No more data about you, without you”. Privacy is all of our responsibility. Providing data privacy isn’t just the law, it’s the right thing to do.
I am proud represent a company that takes this all quite seriously and in fact offers solutions to help each of your organizations protect your employees, your customers, and your citizen’s privacy and puts the power of consent in their hands.
It’s time to make that a reality.
Today, we released an exciting update to the ForgeRock Identity Platform that includes industry leading capabilities around privacy and consent, purpose built to help with GDPR. Our Profile and Privacy Management dashboard is an example of how
you can stand out from the competition by giving your customers an easy and secure way to control who can access their data, for how long, over what devices.
For example, you can control privacy and consent preferences down to a granular level, controlling how your data is shared with third parties.
And use the user-managed access standard to control how your personal data is shared with other people.
We’ll be showing a more detailed demo later today.
Digital identity has strategic value to every organization. We’ve seen a few examples of what can be done when you go beyond the basic employee and customer use cases.
At ForgeRock, we’re excited for a future where identity is the center of everything. When you walk around your connected world, people, services, and things will recognize you, address you by name
and offer you personalized content and recommendations. There’s a lot of talk about the singularity, where AI exceeds human intelligence. To do that, identity will be critical. There’s no intelligence without identity.
Today’s content is going to be incredible and I hope to meet each and every one of you. Please reach out to us for anything at all you need. Learn, have fun, and enjoy!