SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Enabling Secure Mobility to gain a
competitive edge
The use of mobile Apps to engage with customers continues to increase rapidly in sheer volume. Forward-looking
companies embrace mobile strategies to realize digital transformation and reap the benefits from the apps they
deploy. These apps often integrate new, mobile-specific data and authorization types that require back-end
support. This paper exposes today’s mobile identity and security needs and details the holistic solution available
to capitalize on the mobility opportunity.
Authors: Denis Joannides & Alex Bausch Q1 2015 - Version 1.0
Business
Whitepaper
T +31(0)30 711 6845 | E info@onegini.com | www.onegini.com
The growing use of smart mobile devices accessing
personal services has a big effect on authentication
and identity assurance. As the smartphone
has become the “remote control” to the cloud,
proving your identity has become imperative.
Traditional password and 2-Factor solutions are
often inconvenient for smartphones, not secure
and difficult to scale to mass consumer services.
Meanwhile, businesses are adopting mobile
strategies in order to fuel strategic business
initiatives that increase revenues, open new
markets, lower expenses and enhance market
share.
Onegini strongly believes that the high penetration
of smartphones and other smart devices, combined
with the need for personalized online services will
boost the need for a robust, integrated and easy to
use secure authentication solution.
Consumers expect more ways to engage with
your business, in particular through mobile
Apps. Consumers don’t just expect a seamless
experience; they also want the ability to leverage
new technology in their everyday lives. Mobile
engagement tools have become a basic necessity
for doing business, and are tied directly to
the bottom line. A secure mobile identity
and authentication solution is a fundamental
requirement. Businesses and organizations cannot
properly take advantage of mobile and cloud
without a scalable strategy on mobile identity.
Without it, they have no way to identify and engage
with their customers in a meaningful way.
Internet scale, ease of use, secure and modular
Onegini developed the Mobile Security Platform
for enterprises who need to serve millions of end
users 24/7 where authentication and transactions
require “non-stop” attention. The Onegini platform
protects enterprise resources against abuse, helps
meet compliancy obligations and at the same time
brings ease of use to the end-user. It unites mobile
authentication, Mobile Single Sign-on, end-to-
end security (API protection) and monitoring &
reporting tools in one solution.
Onegini delivers an easy to use solution including
all the security standards and monitoring tools
so your mobile Apps can access your enterprise
data. Mobile App developers can focus on the
functionality and do not have to trouble themselves
about security. You can now meet the highest
security and compliancy standards as they are
all taken care of by the Onegini Mobile Security
Platform.
The Onegini Mobile Security Platform was designed
for top insurance and financials institutions who
require the highest standards of security.
Mobile Apps connecting your customer to the
Enterprise have great potential. Beyond simple
marketing, organizations increasingly take
advantage of transaction type Apps for increased
revenue and lowered cost. With this in mind it is
imperative for any business to engage with their
customers in a secure and efficient way. This is
essential because these methods of engagement
directly drive revenue and impact brand value.
1
END USER
SECURITY
CONTROL
COMPLIANCE
SHORT TIME-TO-MARKET
ENGAGE WITH THE END USER
CONVENIENCE
EASE OF USE
CONNECT ALL DEVICES
FLEXIBILITY
ITBUSINESS
T +31(0)30 711 6845 | E info@onegini.com | www.onegini.com
To connect your customers to relevant services in
a secure way, organizations require client-focused
identity management. The Onegini platform
was specifically developed for this and delivers
capabilities such as:
		 ■	 A common identity for different backends
		 ■	 A flexible easy to use & repeatable process
		 ■	 A platform that is device agnostic
		 ■	 A platform designed to handle the masses 	
		 ■	 Support for all authentication standards
Because the Onegini platform was designed for
customers - built for flexibility, scale, and the
internet of things - it can interact with healthcare
wearables, connected cars, set-top boxes, e-citizen
portals, home security systems, medical devices,
and whatever ‘yet-to-be-invented’ “thing”
customers will be using in the years ahead.
Consumers, top line revenue and agility
Most Identity and Access Management (IAM)
solutions are used to manage access for employees
to systems behind the firewall. Nowadays, more
dynamic cloud solutions are required that not only
serve employees, but also partners and customers.
At its core, the Onegini Platform uses identity
to break down organizational silos and create a
single, company-wide view of the customer. It
uses data to build customer profiles that help
organizations engage with their customers
effectively. Understanding WHO these customers
are leads organizations to provide improved
services, making for loyal customers. Businesses
have the opportunity to build new revenue-driving
initiatives that capitalize on this new customer
data.
The Onegini platform allows businesses to rapidly
identity-enable new cloud, mobile, and IoT services
in order to offer a richer, seamless customer
experience across applications, devices, and
internet-connected ‘things.’
2
T +31(0)30 711 6845 | E info@onegini.com | www.onegini.com
Because the Onegini Platform is designed as a
customer-facing driver of business value, it must
cater to speed and developer ease-of-use to match
the pace of customer demands. The Onegini
SDK allows developers to enable cloud services
and accompanying mobile Apps with Identity
Management tooling in days rather than months.
Businesses that can quickly establish an engaging
customer experience at any time, from any place,
device, or thing, will satisfy their current customers
and rapidly attract new ones. Organizations cannot
properly take advantage of cloud, mobility, IoT
or any other online initiative without identity.
Businesses must manage and protect every user in
order to engage with them. Therefore, identity is a
fundamental requirement.
		 ■	 Reduce the time to market for your App
		 ■	 Manage Identity, Security, Data, Apps and 	
			 devices from one common platform
		 ■	 Easy enrollment of your customer base
		 ■	 Highest security standards including 		
			 2-Factor Authentication
		 ■	 Meet compliancy rules & regelations
One Mobile Identity Platform
Traditionally IAM-systems were built on different
point solutions, that are complex and cumbersome
to build and maintain, taking years to deploy
and integrate. The Onegini platform delivers an
overarching Identity solution, which is easily and
quickly deployed. The Onegini Platform requires
a unified identity model. The core tenant is that
identity should be exposed in a single, repeatable
way that makes it easy to roll out new services.
The goal behind this principle is to provide new
services quickly, taking years down to months,
and months down to weeks. The Onegini platform
gives you a common identity platform with a
single, repeatable API for developers to implement
identity services. For developers it is an easy
process and it ensures reliability.
The Onegini platform delivers functions such
as monitoring, audit trails to be compliant,
management dashboards, and behavior analysis to
guarantee end-to-end security. Onegini supports
different combinations of authentication to address
different security needs. Authentication factors are
based on:
		 1)	 Something you know
		 2)	 Something you have
		 3)	 Something you are
		 4)	 Where you are
Built on industry standards and proven
technology
Both the telecom and security industry are rapidly
evolving, introducing new technology standards
at a rapid pace. As a result, both proprietary-
and standards-based mobile security solutions
have been introduced that focus on technology
areas that cover both mobile authentication and
authorization. Organizations that are involved
in standardization include the GSMA, the FIDO
Alliance, The Organization for the Advancement of
Structured Information Standards (OASIS) and The
OpenID Foundation.
Onegini is member of the FIDO alliance and
supports the GSMA Mobile Connect initiative. FIDO
standards have been integrated into the Mobile
Security Platform, which provides browser-based
or in-App, 2-Factor Authentication. Onegini takes
mature security standards and improves the user
experience, while creating a solution customized to
the e-business needs of an organization.
3

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020
Allied Market Research
 
IAG_Business Empowerment by Innonation-Lean-Digital IT alignment
IAG_Business Empowerment by Innonation-Lean-Digital IT alignmentIAG_Business Empowerment by Innonation-Lean-Digital IT alignment
IAG_Business Empowerment by Innonation-Lean-Digital IT alignment
Xenophon Liapakis
 

Was ist angesagt? (19)

Fitness Flyers
Fitness FlyersFitness Flyers
Fitness Flyers
 
Fitness Flyer - Mobiloitte
Fitness Flyer - MobiloitteFitness Flyer - Mobiloitte
Fitness Flyer - Mobiloitte
 
Neosurance: the first Virtual Insurance Agent which sells micro policies.
Neosurance: the first Virtual Insurance Agent which sells micro policies.  Neosurance: the first Virtual Insurance Agent which sells micro policies.
Neosurance: the first Virtual Insurance Agent which sells micro policies.
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Ibeacon
IbeaconIbeacon
Ibeacon
 
2018 trends to watch out for in mobile app development
2018 trends to watch out for in mobile app development2018 trends to watch out for in mobile app development
2018 trends to watch out for in mobile app development
 
A Mobile First Future
A Mobile First FutureA Mobile First Future
A Mobile First Future
 
Uniqa insurance case study
Uniqa insurance case studyUniqa insurance case study
Uniqa insurance case study
 
Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020Mobile Security Market forecast 2014 - 2020
Mobile Security Market forecast 2014 - 2020
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 
The mobile-enabled consumer
The mobile-enabled consumerThe mobile-enabled consumer
The mobile-enabled consumer
 
IAG_Business Empowerment by Innonation-Lean-Digital IT alignment
IAG_Business Empowerment by Innonation-Lean-Digital IT alignmentIAG_Business Empowerment by Innonation-Lean-Digital IT alignment
IAG_Business Empowerment by Innonation-Lean-Digital IT alignment
 
Integrated killer applications for connected insurance
Integrated killer applications for connected insurance Integrated killer applications for connected insurance
Integrated killer applications for connected insurance
 
From cure to care: the disruptive opportunity of connected health insurance
From cure to care: the disruptive opportunity of connected health insuranceFrom cure to care: the disruptive opportunity of connected health insurance
From cure to care: the disruptive opportunity of connected health insurance
 
TDI Startup Insurtech Award - Company presentation DIG
TDI Startup Insurtech Award - Company presentation DIGTDI Startup Insurtech Award - Company presentation DIG
TDI Startup Insurtech Award - Company presentation DIG
 
CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...CA Technologies Predictions for Identity Management in 2015 – The Application...
CA Technologies Predictions for Identity Management in 2015 – The Application...
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes Mobile
 
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and TrendsMWC 2015 - A Recap of the Key Announcements, Highlights and Trends
MWC 2015 - A Recap of the Key Announcements, Highlights and Trends
 
Bajaj Allianz Innovation Award Presentation
Bajaj Allianz Innovation Award PresentationBajaj Allianz Innovation Award Presentation
Bajaj Allianz Innovation Award Presentation
 

Andere mochten auch

Bitcoin for Journalists Hacks/Hackers Berlin
Bitcoin for Journalists Hacks/Hackers BerlinBitcoin for Journalists Hacks/Hackers Berlin
Bitcoin for Journalists Hacks/Hackers Berlin
plucsok
 
Creativity crash course connect&combine
Creativity crash course   connect&combineCreativity crash course   connect&combine
Creativity crash course connect&combine
Ananitamara
 
how_graphs_eat_the_world
how_graphs_eat_the_worldhow_graphs_eat_the_world
how_graphs_eat_the_world
Ora Weinstein
 
Container terminal operation[1]
Container terminal operation[1]Container terminal operation[1]
Container terminal operation[1]
Tomer Shanni
 
Container terminal operation[1]
Container terminal operation[1]Container terminal operation[1]
Container terminal operation[1]
Tomer Shanni
 
COP21_WeatherDisastersReport_2015_FINAL
COP21_WeatherDisastersReport_2015_FINALCOP21_WeatherDisastersReport_2015_FINAL
COP21_WeatherDisastersReport_2015_FINAL
Sherie Amor
 
StrategicPlanthrough2018
StrategicPlanthrough2018StrategicPlanthrough2018
StrategicPlanthrough2018
Sherie Amor
 
Are you paying attention - Kong Puey Yoon
Are you paying attention - Kong Puey YoonAre you paying attention - Kong Puey Yoon
Are you paying attention - Kong Puey Yoon
pueyyoon
 
Haiti-Roadmap-English_0
Haiti-Roadmap-English_0Haiti-Roadmap-English_0
Haiti-Roadmap-English_0
Sherie Amor
 
Software libero nei sistemi embedded
Software libero nei sistemi embeddedSoftware libero nei sistemi embedded
Software libero nei sistemi embedded
Daniele Costarella
 
News Paper Production
News Paper ProductionNews Paper Production
News Paper Production
Krish SJ
 

Andere mochten auch (20)

19(1)(a)
19(1)(a)19(1)(a)
19(1)(a)
 
Carlyn's Bucket List
Carlyn's Bucket ListCarlyn's Bucket List
Carlyn's Bucket List
 
Bitcoin for Journalists Hacks/Hackers Berlin
Bitcoin for Journalists Hacks/Hackers BerlinBitcoin for Journalists Hacks/Hackers Berlin
Bitcoin for Journalists Hacks/Hackers Berlin
 
نظم عقيدة العوام
نظم عقيدة العوامنظم عقيدة العوام
نظم عقيدة العوام
 
2014 Minneapolis/St. Paul Business Journal Editorial Calendar
2014 Minneapolis/St. Paul Business Journal Editorial Calendar2014 Minneapolis/St. Paul Business Journal Editorial Calendar
2014 Minneapolis/St. Paul Business Journal Editorial Calendar
 
Creativity crash course connect&combine
Creativity crash course   connect&combineCreativity crash course   connect&combine
Creativity crash course connect&combine
 
Presentation seo-boost-sldshr-sm
Presentation seo-boost-sldshr-smPresentation seo-boost-sldshr-sm
Presentation seo-boost-sldshr-sm
 
how_graphs_eat_the_world
how_graphs_eat_the_worldhow_graphs_eat_the_world
how_graphs_eat_the_world
 
Container terminal operation[1]
Container terminal operation[1]Container terminal operation[1]
Container terminal operation[1]
 
Container terminal operation[1]
Container terminal operation[1]Container terminal operation[1]
Container terminal operation[1]
 
w_dzon05
w_dzon05w_dzon05
w_dzon05
 
COP21_WeatherDisastersReport_2015_FINAL
COP21_WeatherDisastersReport_2015_FINALCOP21_WeatherDisastersReport_2015_FINAL
COP21_WeatherDisastersReport_2015_FINAL
 
StrategicPlanthrough2018
StrategicPlanthrough2018StrategicPlanthrough2018
StrategicPlanthrough2018
 
Are you paying attention - Kong Puey Yoon
Are you paying attention - Kong Puey YoonAre you paying attention - Kong Puey Yoon
Are you paying attention - Kong Puey Yoon
 
Bread
BreadBread
Bread
 
Haiti-Roadmap-English_0
Haiti-Roadmap-English_0Haiti-Roadmap-English_0
Haiti-Roadmap-English_0
 
Development of a Wireless Sensors Network powered by Energy Harvesting techni...
Development of a Wireless Sensors Network powered by Energy Harvesting techni...Development of a Wireless Sensors Network powered by Energy Harvesting techni...
Development of a Wireless Sensors Network powered by Energy Harvesting techni...
 
Software libero nei sistemi embedded
Software libero nei sistemi embeddedSoftware libero nei sistemi embedded
Software libero nei sistemi embedded
 
News Paper Production
News Paper ProductionNews Paper Production
News Paper Production
 
Colombia
ColombiaColombia
Colombia
 

Ähnlich wie Business Whitepaper 2015 V1.0

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
Warba Insurance Co Kuwait
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
Dan Smith
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
Dalia Reda
 

Ähnlich wie Business Whitepaper 2015 V1.0 (20)

Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Mobile application development company
Mobile application development companyMobile application development company
Mobile application development company
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Staying Ahead of Online Threats How PayWithRING Protects Users from Fraud and...
Staying Ahead of Online Threats How PayWithRING Protects Users from Fraud and...Staying Ahead of Online Threats How PayWithRING Protects Users from Fraud and...
Staying Ahead of Online Threats How PayWithRING Protects Users from Fraud and...
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015
 

Business Whitepaper 2015 V1.0

  • 1. Enabling Secure Mobility to gain a competitive edge The use of mobile Apps to engage with customers continues to increase rapidly in sheer volume. Forward-looking companies embrace mobile strategies to realize digital transformation and reap the benefits from the apps they deploy. These apps often integrate new, mobile-specific data and authorization types that require back-end support. This paper exposes today’s mobile identity and security needs and details the holistic solution available to capitalize on the mobility opportunity. Authors: Denis Joannides & Alex Bausch Q1 2015 - Version 1.0 Business Whitepaper
  • 2. T +31(0)30 711 6845 | E info@onegini.com | www.onegini.com The growing use of smart mobile devices accessing personal services has a big effect on authentication and identity assurance. As the smartphone has become the “remote control” to the cloud, proving your identity has become imperative. Traditional password and 2-Factor solutions are often inconvenient for smartphones, not secure and difficult to scale to mass consumer services. Meanwhile, businesses are adopting mobile strategies in order to fuel strategic business initiatives that increase revenues, open new markets, lower expenses and enhance market share. Onegini strongly believes that the high penetration of smartphones and other smart devices, combined with the need for personalized online services will boost the need for a robust, integrated and easy to use secure authentication solution. Consumers expect more ways to engage with your business, in particular through mobile Apps. Consumers don’t just expect a seamless experience; they also want the ability to leverage new technology in their everyday lives. Mobile engagement tools have become a basic necessity for doing business, and are tied directly to the bottom line. A secure mobile identity and authentication solution is a fundamental requirement. Businesses and organizations cannot properly take advantage of mobile and cloud without a scalable strategy on mobile identity. Without it, they have no way to identify and engage with their customers in a meaningful way. Internet scale, ease of use, secure and modular Onegini developed the Mobile Security Platform for enterprises who need to serve millions of end users 24/7 where authentication and transactions require “non-stop” attention. The Onegini platform protects enterprise resources against abuse, helps meet compliancy obligations and at the same time brings ease of use to the end-user. It unites mobile authentication, Mobile Single Sign-on, end-to- end security (API protection) and monitoring & reporting tools in one solution. Onegini delivers an easy to use solution including all the security standards and monitoring tools so your mobile Apps can access your enterprise data. Mobile App developers can focus on the functionality and do not have to trouble themselves about security. You can now meet the highest security and compliancy standards as they are all taken care of by the Onegini Mobile Security Platform. The Onegini Mobile Security Platform was designed for top insurance and financials institutions who require the highest standards of security. Mobile Apps connecting your customer to the Enterprise have great potential. Beyond simple marketing, organizations increasingly take advantage of transaction type Apps for increased revenue and lowered cost. With this in mind it is imperative for any business to engage with their customers in a secure and efficient way. This is essential because these methods of engagement directly drive revenue and impact brand value. 1 END USER SECURITY CONTROL COMPLIANCE SHORT TIME-TO-MARKET ENGAGE WITH THE END USER CONVENIENCE EASE OF USE CONNECT ALL DEVICES FLEXIBILITY ITBUSINESS
  • 3. T +31(0)30 711 6845 | E info@onegini.com | www.onegini.com To connect your customers to relevant services in a secure way, organizations require client-focused identity management. The Onegini platform was specifically developed for this and delivers capabilities such as: ■ A common identity for different backends ■ A flexible easy to use & repeatable process ■ A platform that is device agnostic ■ A platform designed to handle the masses ■ Support for all authentication standards Because the Onegini platform was designed for customers - built for flexibility, scale, and the internet of things - it can interact with healthcare wearables, connected cars, set-top boxes, e-citizen portals, home security systems, medical devices, and whatever ‘yet-to-be-invented’ “thing” customers will be using in the years ahead. Consumers, top line revenue and agility Most Identity and Access Management (IAM) solutions are used to manage access for employees to systems behind the firewall. Nowadays, more dynamic cloud solutions are required that not only serve employees, but also partners and customers. At its core, the Onegini Platform uses identity to break down organizational silos and create a single, company-wide view of the customer. It uses data to build customer profiles that help organizations engage with their customers effectively. Understanding WHO these customers are leads organizations to provide improved services, making for loyal customers. Businesses have the opportunity to build new revenue-driving initiatives that capitalize on this new customer data. The Onegini platform allows businesses to rapidly identity-enable new cloud, mobile, and IoT services in order to offer a richer, seamless customer experience across applications, devices, and internet-connected ‘things.’ 2
  • 4. T +31(0)30 711 6845 | E info@onegini.com | www.onegini.com Because the Onegini Platform is designed as a customer-facing driver of business value, it must cater to speed and developer ease-of-use to match the pace of customer demands. The Onegini SDK allows developers to enable cloud services and accompanying mobile Apps with Identity Management tooling in days rather than months. Businesses that can quickly establish an engaging customer experience at any time, from any place, device, or thing, will satisfy their current customers and rapidly attract new ones. Organizations cannot properly take advantage of cloud, mobility, IoT or any other online initiative without identity. Businesses must manage and protect every user in order to engage with them. Therefore, identity is a fundamental requirement. ■ Reduce the time to market for your App ■ Manage Identity, Security, Data, Apps and devices from one common platform ■ Easy enrollment of your customer base ■ Highest security standards including 2-Factor Authentication ■ Meet compliancy rules & regelations One Mobile Identity Platform Traditionally IAM-systems were built on different point solutions, that are complex and cumbersome to build and maintain, taking years to deploy and integrate. The Onegini platform delivers an overarching Identity solution, which is easily and quickly deployed. The Onegini Platform requires a unified identity model. The core tenant is that identity should be exposed in a single, repeatable way that makes it easy to roll out new services. The goal behind this principle is to provide new services quickly, taking years down to months, and months down to weeks. The Onegini platform gives you a common identity platform with a single, repeatable API for developers to implement identity services. For developers it is an easy process and it ensures reliability. The Onegini platform delivers functions such as monitoring, audit trails to be compliant, management dashboards, and behavior analysis to guarantee end-to-end security. Onegini supports different combinations of authentication to address different security needs. Authentication factors are based on: 1) Something you know 2) Something you have 3) Something you are 4) Where you are Built on industry standards and proven technology Both the telecom and security industry are rapidly evolving, introducing new technology standards at a rapid pace. As a result, both proprietary- and standards-based mobile security solutions have been introduced that focus on technology areas that cover both mobile authentication and authorization. Organizations that are involved in standardization include the GSMA, the FIDO Alliance, The Organization for the Advancement of Structured Information Standards (OASIS) and The OpenID Foundation. Onegini is member of the FIDO alliance and supports the GSMA Mobile Connect initiative. FIDO standards have been integrated into the Mobile Security Platform, which provides browser-based or in-App, 2-Factor Authentication. Onegini takes mature security standards and improves the user experience, while creating a solution customized to the e-business needs of an organization. 3