SlideShare a Scribd company logo
Don’t Let your Corporate Strategy
be Hostage to your IT Strategy
2
Don’t Let your Corporate Strategy be
Hostage to your IT Strategy
In Forrester’s recent report, “2017 Predictions: Dynamics That Will Shape The Future In The
Age Of The Customer”1
there are some startling strategic planning assumptions.
Among them:
Digital innovation is being demanded by every business unit wanting to capitalize on an
increasingly mobile customer base that expects dynamic and personalized experiences
across an expanding range of touchpoints.
This reality has recently transformed IT’s role to that of the main driver of new growth
initiatives, prompting a shift in perspective and strategy for CIOs. As Sapphire Ventures
managing director Jai Das recently noted in TechCrunch, “Chief Information Officers who are
able to implement web-scale IT infrastructure via an enterprise cloud platform and push their
IT infrastructure to the speed of modern business will become Chief Innovation Officers.”2
Successful enterprise digital transformations often begin with a well-planned and executed
approach to managing customer identities. While legacy IAM might seem like a natural starting
point for meeting this challenge, customer identity and access management (CIAM) has
significantly different requirements and outcomes when compared to employee-facing IAM.
“The consequences of a customer-led,
digital-centric market are becoming clearer
and starker.”3
“More than one-third
of businesses will
restructure to shift to
customer-obsessed
operations.”
“Business heads will
see doubled attrition
rates as CEOs dig
in and appoint
leaders with both
digital and customer
competencies.”
“In 2017, the basic fabric
of trust is at stake as
CEOs grapple with
how to defend against
escalating, dynamic
security and privacy risk.”
1 Forrester, 2017 Predictions: Dynamics That Will Shape The Future In The Age Of The Customer
2 TechCrunch, How Chief Information Officers Become Chief Innovation Officers, Jai Das
3 Forrester, 2017 Predictions: Dynamics That Will Shape The Future In The Age Of The Customer
3
So, what are the big challenges when
managing customer identities?
User
Experience
Legacy IAM systems are designed primarily around security for good reason, but to
create the personalized and engaging user experiences today’s customers demand, you
must not only store customer information in a centralized and secure manner, but also
ensure that this data is available for use in real-time across the entire business.
Scale For the largest enterprises, the digital identities of employees, partners and vendors are
measured in hundreds of thousands, but customers of those same companies are often
measured in hundreds of millions. To deliver a user experience that keeps your brand
competitive there must be no compromise in performance at any time for any layer in
your stack, regardless of the volume, variety, or velocity of incoming data streams.
Data
Structure
The vast majority of customer-generated information is unstructured, and doesn’t
play well with traditional hierarchical databases and directories. To optimize your
omni-channel marketing, sales, and service initiatives, you must be capable of making a
wide variety of customer data from many sources actionable for your business.
Integrations Authentication integrations with business applications like Google and Workday often
provided by IAM systems are entirely different from those needed to support customer-
facing interactions and activities. If you’re building out your own solution or piecing
one together from other third-party services, each technology that you adopt for
business initiatives means custom coding and expensive connectors. Besides exorbitant
development costs, this process can also significantly slow your time to market.
Security Web and mobile APIs have become the backbone of digital business. This is a reality
that legacy IAM still grapples with when trying to manage consumer data, since it was
primarily designed for employee and vendor access. To deliver an impactful yet secure
customer experience, standards like SAML, OpenID Connect and OAuth should be used
to secure high volume API transactions, on both client and server sides. Personal data
should be encrypted and passwords hashed, and advanced methods should available
for authenticating customers. Finally, strong rules and permissions-based access control
and audit logging are vital to ensuring that your IT organization maintains granular
administrative control of your system.
Privacy and
Compliance
With employee-facing IAM, since the business effectively owns all the information being
managed, so privacy is mostly about securing data from breaches. However, new, more
stringent data protection regulations such as the European Union’s GDPR mean that
managing consumer data privacy, consent and control is no longer a “nice-to-have”
for customer-facing global businesses. Also, integrating vital social network login
functionality means keeping up with ever-changing third-party privacy policies. Manually
managing these tasks not only eats up significant IT bandwidth but incurs undue risk
for your business.
4
We have seen companies approach these challenges
in three different ways:
The “Homegrown” Approach
(Build something yourself to consolidate disparate data silos.)
This approach is usually chosen to maximize security and control, but can severely
limit the scope of the resulting system and comes with a number of pitfalls that grow over
time. Considerable resources are required to retrofit legacy, brick-and-mortar identity
management systems for handling customer data, and then additional technologies must
be connected to help monetize it. The end-result is often an inflexible system with limited
capabilities that is difficult and expensive to maintain.
Also, this approach may leave companies beholden to the system’s original, in-house
developers, who may have relatively little knowledge of CIAM principles, likely never
created proper documentation and may take their knowledge with them when they
leave the organization. Integrating new technologies with a homegrown system requires
additional custom coding and pricy connectors, with the burden of ongoing maintenance
and compliance resting solely on the IT organization, creating continuous cost and risk.
The “Frankenstein” Approach
(Stitch together existing IAM systems.)
In this approach, companies may leverage an existing enterprise data warehouse
(EDW) or CRM system’s IAM capabilities to unify their data, or deploy an off-the-shelf
IAM solution to do the job. This may offer a significant reduction in labor costs, and will often
result in a better-performing system than the homegrown approach. However, high service-
to-license ratios mean savings on labor are more than offset by perpetual product license
and maintenance fee structures that are designed for a relatively small numbers of business
users, rather than millions of customers.
If most or all of a system is comprised of on-premises as opposed to SaaS solutions, then
upgrades must occur manually, at considerable expense. Also affecting cost of ownership
is the fact that custom connectors will be required to add new technologies for marketing,
sales and services initiatives.
5
The “Buy it, Don’t Build it” Approach
(Implement a specialized, cloud-based system that is built to manage customer identities.)
Increasingly, businesses adapting to the digital marketplace are opting to hand
off CIAM functionality to a provider who specializes in managing customer identities.
Best-of-breed cloud CIAM platforms are built with a focus on user experience, scalability,
flexible implementation, and API-based security. These solutions consistently deliver
the best bang-for-buck CIAM outcomes, with drastically reduced labor, licensing and
maintenance costs.
A specialized CIAM platform can get you to market in a fraction of the time of custom
deployments and offers superior flexibility for adjusting to new market trends and
technologies, allowing you to offload maintenance as well as compliance and security risks.
The Bottom Line: What You Pay and What You Get
When adding up the costs of building and maintaining a custom CIAM solution, going with
a specialized provider starts to make a lot of sense. Here’s a simple example of how these
two approaches stack up for total cost of ownership.
6
INFRASTRUCTURE
15 new servers
LICENSING
Perpetual, based on
processors or cores
SUPPORT  MAINTANANCE
25% of licensing cost
DEPLOYMENT
16-24 person-weeks
CUSTOMER EXPERIENCE
4 person-weeks
BACK-END
APPLICATION INTEGRATION
20 person-weeks
INFRASTRUCTURE
None – cloud-based
LICENSING
Users or logins per year
SUPPORT  MAINTANANCE
Included in service
DEPLOYMENT
4-6 person-weeks
CUSTOMER EXPERIENCE
OOTB Customizations
BACK-END
APPLICATION INTEGRATION
Pre-built with fee per application
CIAMIAM
COSTDRIVERS
$
COSTDRIVERS
$
IAM Versus CIAM: An Example
(Assuming 1 Million Customers and Five Integrations)
CIAM is much less expensive to implement for large-scale systems than DIY solutions, with
a streamlined implementation that gets you to market in a fraction of the time. Add the factor
of outcome — a better performing, more scalable, flexible and secure system — and it’s
easy to see why enterprises are turning to specialized CIAM providers to manage consumer
identities and drive superior customer experiences.
© 2017 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other
trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available
to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable).
Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at
http://www.gigya.com/privacy-policy/.
Gigya_White_Paper_Gigya_DIY_v_CIAM_201704
The Leader in Customer
Identity Management
About Gigya
Gigya’s Customer Identity Management Platform helps companies
build better customer relationships by turning unknown site visitors
into known, loyal and engaged customers. With Gigya’s technology,
businesses increase registrations and identify customers across
devices, consolidate data into rich customer profiles, and provide
better service, products and experiences by integrating data into
marketing and service applications.
Gigya’s platform was designed from the ground up for social
identities, mobile devices, consumer privacy and modern marketing.
Gigya provides developers with the APIs they need to easily build
and maintain secure and scalable registration, authentication, profile
management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes,
and ASOS rely on Gigya to build identity-driven relationships and to
provide scalable, secure Customer Identity Management.
To learn how Gigya can help your business manage customer
identities, visit gigya.com, or call us at 650.353.7230.

More Related Content

What's hot

Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
Hexnode
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Enterprise Management Associates
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Contract Management In the Cloud
Contract Management In the CloudContract Management In the Cloud
Contract Management In the CloudVivastream
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
OracleIDM
 
Case : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the CloudCase : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the Cloud
Aya Wan Idris
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloud
SalesBabuCRM
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
Hitachi ID Systems, Inc.
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsChris Farwell
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
ijtsrd
 
Big Data Customer Experience Analytics -- The Next Big Opportunity for You
Big Data Customer Experience Analytics -- The Next Big Opportunity for You Big Data Customer Experience Analytics -- The Next Big Opportunity for You
Big Data Customer Experience Analytics -- The Next Big Opportunity for You
Dr.Dinesh Chandrasekar PhD(hc)
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS Solution
Daniel Connor
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
happiestmindstech
 
Partena 2010.02.10
Partena 2010.02.10Partena 2010.02.10
Partena 2010.02.10
lucdelanglez
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
Richard Harvey
 
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppSalesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
BMC Software
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 

What's hot (20)

Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Contract Management In the Cloud
Contract Management In the CloudContract Management In the Cloud
Contract Management In the Cloud
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Case : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the CloudCase : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the Cloud
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloud
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 Years
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Big Data Customer Experience Analytics -- The Next Big Opportunity for You
Big Data Customer Experience Analytics -- The Next Big Opportunity for You Big Data Customer Experience Analytics -- The Next Big Opportunity for You
Big Data Customer Experience Analytics -- The Next Big Opportunity for You
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS Solution
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Partena 2010.02.10
Partena 2010.02.10Partena 2010.02.10
Partena 2010.02.10
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
 
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppSalesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 

Similar to White Paper: DIY vs CIAM

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
Gigya
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
Happiest Minds Technologies
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
Consumption-based public cloud (CBPC) model
Consumption-based public cloud (CBPC) modelConsumption-based public cloud (CBPC) model
Consumption-based public cloud (CBPC) model
Werner Feld
 
On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...Stanton Jones
 
Should business move to cloud
Should business move to cloudShould business move to cloud
Should business move to cloud
Shashwat Shankar
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
Tatiana Grisham
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
Gigya
 
Top 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For BusinessTop 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For Business
Albiorix Technology
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
NIIT Technologies
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organization
Somayeh Jabbari
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC
 
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Justrassity996
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf
learntransformation0
 
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
BerryHughes
 
Cloud
CloudCloud
Cloudain84
 
Case4 customer relationship management heads to the cloud
Case4 customer relationship management heads to the  cloud Case4 customer relationship management heads to the  cloud
Case4 customer relationship management heads to the cloud
dyadelm
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
Happiest Minds Technologies
 
Technology Solutions for Manufacturing
Technology Solutions for ManufacturingTechnology Solutions for Manufacturing
Technology Solutions for Manufacturing
Insight
 

Similar to White Paper: DIY vs CIAM (20)

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
Consumption-based public cloud (CBPC) model
Consumption-based public cloud (CBPC) modelConsumption-based public cloud (CBPC) model
Consumption-based public cloud (CBPC) model
 
On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...On-premises, consumption-based private cloud creates opportunity for enterpri...
On-premises, consumption-based private cloud creates opportunity for enterpri...
 
Should business move to cloud
Should business move to cloudShould business move to cloud
Should business move to cloud
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
Top 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For BusinessTop 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For Business
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organization
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf
 
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
 
Cloud
CloudCloud
Cloud
 
Case4 customer relationship management heads to the cloud
Case4 customer relationship management heads to the  cloud Case4 customer relationship management heads to the  cloud
Case4 customer relationship management heads to the cloud
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 
Technology Solutions for Manufacturing
Technology Solutions for ManufacturingTechnology Solutions for Manufacturing
Technology Solutions for Manufacturing
 

More from Gigya

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Gigya
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
Gigya
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
Gigya
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
Gigya
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
Gigya
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
Gigya
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
Gigya
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
Gigya
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
Gigya
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
Gigya
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
Gigya
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
Gigya
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
Gigya
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
Gigya
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
Gigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
Gigya
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
Gigya
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
Gigya
 

More from Gigya (20)

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

White Paper: DIY vs CIAM

  • 1. Don’t Let your Corporate Strategy be Hostage to your IT Strategy
  • 2. 2 Don’t Let your Corporate Strategy be Hostage to your IT Strategy In Forrester’s recent report, “2017 Predictions: Dynamics That Will Shape The Future In The Age Of The Customer”1 there are some startling strategic planning assumptions. Among them: Digital innovation is being demanded by every business unit wanting to capitalize on an increasingly mobile customer base that expects dynamic and personalized experiences across an expanding range of touchpoints. This reality has recently transformed IT’s role to that of the main driver of new growth initiatives, prompting a shift in perspective and strategy for CIOs. As Sapphire Ventures managing director Jai Das recently noted in TechCrunch, “Chief Information Officers who are able to implement web-scale IT infrastructure via an enterprise cloud platform and push their IT infrastructure to the speed of modern business will become Chief Innovation Officers.”2 Successful enterprise digital transformations often begin with a well-planned and executed approach to managing customer identities. While legacy IAM might seem like a natural starting point for meeting this challenge, customer identity and access management (CIAM) has significantly different requirements and outcomes when compared to employee-facing IAM. “The consequences of a customer-led, digital-centric market are becoming clearer and starker.”3 “More than one-third of businesses will restructure to shift to customer-obsessed operations.” “Business heads will see doubled attrition rates as CEOs dig in and appoint leaders with both digital and customer competencies.” “In 2017, the basic fabric of trust is at stake as CEOs grapple with how to defend against escalating, dynamic security and privacy risk.” 1 Forrester, 2017 Predictions: Dynamics That Will Shape The Future In The Age Of The Customer 2 TechCrunch, How Chief Information Officers Become Chief Innovation Officers, Jai Das 3 Forrester, 2017 Predictions: Dynamics That Will Shape The Future In The Age Of The Customer
  • 3. 3 So, what are the big challenges when managing customer identities? User Experience Legacy IAM systems are designed primarily around security for good reason, but to create the personalized and engaging user experiences today’s customers demand, you must not only store customer information in a centralized and secure manner, but also ensure that this data is available for use in real-time across the entire business. Scale For the largest enterprises, the digital identities of employees, partners and vendors are measured in hundreds of thousands, but customers of those same companies are often measured in hundreds of millions. To deliver a user experience that keeps your brand competitive there must be no compromise in performance at any time for any layer in your stack, regardless of the volume, variety, or velocity of incoming data streams. Data Structure The vast majority of customer-generated information is unstructured, and doesn’t play well with traditional hierarchical databases and directories. To optimize your omni-channel marketing, sales, and service initiatives, you must be capable of making a wide variety of customer data from many sources actionable for your business. Integrations Authentication integrations with business applications like Google and Workday often provided by IAM systems are entirely different from those needed to support customer- facing interactions and activities. If you’re building out your own solution or piecing one together from other third-party services, each technology that you adopt for business initiatives means custom coding and expensive connectors. Besides exorbitant development costs, this process can also significantly slow your time to market. Security Web and mobile APIs have become the backbone of digital business. This is a reality that legacy IAM still grapples with when trying to manage consumer data, since it was primarily designed for employee and vendor access. To deliver an impactful yet secure customer experience, standards like SAML, OpenID Connect and OAuth should be used to secure high volume API transactions, on both client and server sides. Personal data should be encrypted and passwords hashed, and advanced methods should available for authenticating customers. Finally, strong rules and permissions-based access control and audit logging are vital to ensuring that your IT organization maintains granular administrative control of your system. Privacy and Compliance With employee-facing IAM, since the business effectively owns all the information being managed, so privacy is mostly about securing data from breaches. However, new, more stringent data protection regulations such as the European Union’s GDPR mean that managing consumer data privacy, consent and control is no longer a “nice-to-have” for customer-facing global businesses. Also, integrating vital social network login functionality means keeping up with ever-changing third-party privacy policies. Manually managing these tasks not only eats up significant IT bandwidth but incurs undue risk for your business.
  • 4. 4 We have seen companies approach these challenges in three different ways: The “Homegrown” Approach (Build something yourself to consolidate disparate data silos.) This approach is usually chosen to maximize security and control, but can severely limit the scope of the resulting system and comes with a number of pitfalls that grow over time. Considerable resources are required to retrofit legacy, brick-and-mortar identity management systems for handling customer data, and then additional technologies must be connected to help monetize it. The end-result is often an inflexible system with limited capabilities that is difficult and expensive to maintain. Also, this approach may leave companies beholden to the system’s original, in-house developers, who may have relatively little knowledge of CIAM principles, likely never created proper documentation and may take their knowledge with them when they leave the organization. Integrating new technologies with a homegrown system requires additional custom coding and pricy connectors, with the burden of ongoing maintenance and compliance resting solely on the IT organization, creating continuous cost and risk. The “Frankenstein” Approach (Stitch together existing IAM systems.) In this approach, companies may leverage an existing enterprise data warehouse (EDW) or CRM system’s IAM capabilities to unify their data, or deploy an off-the-shelf IAM solution to do the job. This may offer a significant reduction in labor costs, and will often result in a better-performing system than the homegrown approach. However, high service- to-license ratios mean savings on labor are more than offset by perpetual product license and maintenance fee structures that are designed for a relatively small numbers of business users, rather than millions of customers. If most or all of a system is comprised of on-premises as opposed to SaaS solutions, then upgrades must occur manually, at considerable expense. Also affecting cost of ownership is the fact that custom connectors will be required to add new technologies for marketing, sales and services initiatives.
  • 5. 5 The “Buy it, Don’t Build it” Approach (Implement a specialized, cloud-based system that is built to manage customer identities.) Increasingly, businesses adapting to the digital marketplace are opting to hand off CIAM functionality to a provider who specializes in managing customer identities. Best-of-breed cloud CIAM platforms are built with a focus on user experience, scalability, flexible implementation, and API-based security. These solutions consistently deliver the best bang-for-buck CIAM outcomes, with drastically reduced labor, licensing and maintenance costs. A specialized CIAM platform can get you to market in a fraction of the time of custom deployments and offers superior flexibility for adjusting to new market trends and technologies, allowing you to offload maintenance as well as compliance and security risks. The Bottom Line: What You Pay and What You Get When adding up the costs of building and maintaining a custom CIAM solution, going with a specialized provider starts to make a lot of sense. Here’s a simple example of how these two approaches stack up for total cost of ownership.
  • 6. 6 INFRASTRUCTURE 15 new servers LICENSING Perpetual, based on processors or cores SUPPORT MAINTANANCE 25% of licensing cost DEPLOYMENT 16-24 person-weeks CUSTOMER EXPERIENCE 4 person-weeks BACK-END APPLICATION INTEGRATION 20 person-weeks INFRASTRUCTURE None – cloud-based LICENSING Users or logins per year SUPPORT MAINTANANCE Included in service DEPLOYMENT 4-6 person-weeks CUSTOMER EXPERIENCE OOTB Customizations BACK-END APPLICATION INTEGRATION Pre-built with fee per application CIAMIAM COSTDRIVERS $ COSTDRIVERS $ IAM Versus CIAM: An Example (Assuming 1 Million Customers and Five Integrations) CIAM is much less expensive to implement for large-scale systems than DIY solutions, with a streamlined implementation that gets you to market in a fraction of the time. Add the factor of outcome — a better performing, more scalable, flexible and secure system — and it’s easy to see why enterprises are turning to specialized CIAM providers to manage consumer identities and drive superior customer experiences.
  • 7. © 2017 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/. Gigya_White_Paper_Gigya_DIY_v_CIAM_201704 The Leader in Customer Identity Management About Gigya Gigya’s Customer Identity Management Platform helps companies build better customer relationships by turning unknown site visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya’s platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and ASOS rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. To learn how Gigya can help your business manage customer identities, visit gigya.com, or call us at 650.353.7230.