UNLEASHING BUSINESS VALUE WITH IDENTITY

19
IAM for the Digital Customer Identity Relationship Management

description

EVE MALER, VP Innovation & Emerging Technology, ForgeRock, at the European IRM Summit 2014.

Transcript of UNLEASHING BUSINESS VALUE WITH IDENTITY

Page 1: UNLEASHING BUSINESS VALUE WITH IDENTITY

IAM for the Digital Customer

Identity Relationship Management

Page 2: UNLEASHING BUSINESS VALUE WITH IDENTITY

2

Unleashing Business Value with Identity

FORGEROCK.COM

Eve MalerVP Innovation & Emerging Technology @xmlgrrl#IRMSummit

November 4, 2014

Page 3: UNLEASHING BUSINESS VALUE WITH IDENTITY

The business pillars of identity relationship management

CONSUMERS & THINGS over employees

ADAPTABLE over predictable

REVENUE over operating expense

VELOCITY over process and tools

Page 4: UNLEASHING BUSINESS VALUE WITH IDENTITY

The technical pillars of identity relationship management

INTERNET SCALE over enterprise scale

DYNAMIC over static intelligence

BORDERLESS over perimeter

MODULAR over monolithic

Page 5: UNLEASHING BUSINESS VALUE WITH IDENTITY

Companies are straining against a view of IAM as a

tactical IT concern

Page 6: UNLEASHING BUSINESS VALUE WITH IDENTITY

6

IRM deserves its special moniker because it operates at special scale

Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014

6

Partner Employee Consumer0

500,000

1,000,000

1,500,000

2,000,000

2,500,000

3,000,000

101 – 1,000

1,001 – 10,000

500,001 – 5,000,000

Base: 111 B2C and B2B2C Executives

Page 7: UNLEASHING BUSINESS VALUE WITH IDENTITY

7

Putting these numbers into perspective

FORGEROCK.COM

Page 8: UNLEASHING BUSINESS VALUE WITH IDENTITY

8

Companies are dubious about the IRM preparedness of existing IAM solutions

8

Considering the IAM technology solutions you use internally now, how prepared are these solutions for use in external

deployment scenarios?Not at all prepared;

8%

Not very prepared;

22%

Some-what

prepared; 36%

Very prepared;

34%

Base: 111 B2C and B2B2C Executives

66% feel less than “very prepared”

Yes; 88%

No; 5%

N/A 5%

Don’t know; 2%

Does your budget for building out external-facing, customer and

partner identity and access management include investment in

new IAM software?

Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014

Page 9: UNLEASHING BUSINESS VALUE WITH IDENTITY

IRM priorities are increasingthe pressure on IAM projects

Page 10: UNLEASHING BUSINESS VALUE WITH IDENTITY

10

The definition of success is shifting

10

Have you been asked to measure the revenue impact of your customer-facing

IT projects?

Yes; 83%

No; 9%

Don’t know; 8%

Base: 86 [Those who work on customer-facing IAM projects]

Base: 111 B2C and B2B2C Executives

Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014

Page 11: UNLEASHING BUSINESS VALUE WITH IDENTITY

11

Metrics are moving from input to output and from internal to business-focused

Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014

What types of success metrics govern your IAM-related projects today?

5) Drive customer intelligence

4) Drive increased revenue

3) Fraud detection/prevention rates

2) Regulatory compliance (e.g., PCI, HIPAA, EU Data Protection Direc-

tive, etc.)

1) On-time and on-budget

What types of success metrics do you anticipate will govern your IAM-related projects three years

from now?

5) Drive customer intelligence

4) Regulatory compliance (e.g., PCI, HIPAA, EU Data Protection Direc-

tive, etc.)

3) Drive increased revenue

2) Fraud detection/prevention rates

1) On-time and on-budget

Base: 111 B2C and B2B2C Executives

Page 12: UNLEASHING BUSINESS VALUE WITH IDENTITY

12

IRM requires the right architecture

We’re undergoing a digital transformation. I didn’t think IAM was going to be so important for this, but now I realize it’s valuable to create a targeted architecture and not have to build specialized applications each time. The users will be able to access the same platform, and their access will be controlled by authorization. It’s really an enabler in completely transforming the way we do things. People expect 24/7 access.

– Media/advertising

FORGEROCK.COM

Page 13: UNLEASHING BUSINESS VALUE WITH IDENTITY

13

Strategic priorities reflect the IRM imperative

“Please indicate which of the following are, or will be, strategic IAM priorities for your company.”

Managing IAM for multiple types of network-connected devices owned by employees

Using IAM to control and enable employee access to cloud/SaaS services

Mitigating operational expenses and security risk by extending IAM to employees

Consolidating disparate employee IAM systems

Ensuring IAM systems scale to handle anticipated customer growth

Managing IAM for multiple types of network-connected devices owned by customers

Using IAM to enable and unify customer access to cloud-based services

Consolidating disparate customer IAM systems

Driving business value and revenue by extending IAM to customers

21%

24%

25%

22%

20%

21%

19%

25%

28%

35%

37%

32%

36%

27%

31%

41%

39%

21%

33%

33%

40%

40%

46%

43%

36%

32%

48%

Will be a priority in more than a year Will be a priority in the next year Is a current priority

Base: 111 B2C and B2B2C Executives

IAM

IRM

Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014

Page 14: UNLEASHING BUSINESS VALUE WITH IDENTITY

14

IAM vs. IRM

control

enable

FORGEROCK.COM

Page 15: UNLEASHING BUSINESS VALUE WITH IDENTITY

15

IAM vs. IRM

control

enable

roles users

FORGEROCK.COM

Page 16: UNLEASHING BUSINESS VALUE WITH IDENTITY

16

IAM vs. IRM

control

enable

roles userstrap accept

FORGEROCK.COM

Page 17: UNLEASHING BUSINESS VALUE WITH IDENTITY

17

Do you share these challenges?

How do I roll out new services for any device or “thing”?

How do I scale to support hundreds of millions of users and devices?

How do I personalize services and reduce risk using real-time context?

How do I roll out identity services in weeks, not months or years?

FORGEROCK.COM

Page 18: UNLEASHING BUSINESS VALUE WITH IDENTITY

18

Our wonderful tracklineup

Joni Brennan, Kantara Initiative: Connected Life

Andrew Johnston, TELUS: I Am Not My Phone

Thomas Bostrøm Jørgensen, Encap: Demo andAnalysis of Apple Touch ID for IRM

Jean-François Rubon, Gemalto: Securing OnlineServices in a Mobile First World

Robert Lapes, Capgemini: Twelve Diagrams to SaveYour Identity Bacon

Stein Myrseth, ForgeRock: Cloud DeploymentManagement with Juju

Steve Ferris, ForgeRock: Best Practices panel

Page 19: UNLEASHING BUSINESS VALUE WITH IDENTITY

19FORGEROCK.COM

Eve Maler [email protected] @xmlgrrl#IRMSummit

Thanks!Questions?Enjoy the IRM track!