SlideShare a Scribd company logo
1 of 12
Download to read offline
Digital Identity: Federation, Integration and Deployment of
Trusted Identity Solutions
Ryan Fox : JULY 19, 2014
§  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs
to affinity groups like: Military, Students, Influencers and Professionals
§  Capable of securing offers delivered online, in-store and via mobile
§  Consumer- centric network empowers a consumer to bring their own identity to third
party apps in order to receive personalized offers.
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me
WHO WE ARE
Leaders in Digital Identity Technology
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
AWARD WINNING SOLUTIONS
Our Accomplishments	
  
§  Department of Commerce for a $2.8M grant as one of the five companies in America
with the most advanced digital Identity technology
§  Finalist for 2013 Wall Street Journal Startup of the Year
§  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small
Business in America” in 2013
§  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank
§  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies
§  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 3
ID.me Operates as Digital Identity Bank
Allowing Users to Leverage their Identity Data as Renewable Currency	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 4
•  Interoperable	
  
•  Secure	
  
•  User	
  Controlled	
  
•  Privacy	
  Enhancing	
  
•  Affordable	
  
Driving Adoption of Identity Solutions
	
  
Identity matters to everyone…
BUT - For different reasons…
…and based on context
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
Effective solutions must view their value through multiple lenses
Understanding business challenges is key… 	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6
Security	
  /	
  IT	
   E-­‐commerce	
  
Public	
  Sector	
  
Protect…	
  
Protect…	
  
Enable…	
  
CASE STUDY
Under Armour Military Loyalty Program 	
  
§  Under Armour
integrated ID.me
technology to create an
omni-channel customer
experience
§  Customer verifies
affinity in real-time and
claims discount
directly in cart
§  Under Armour had a
military discount
program in-store but was
unable to provide the
program online because
they couldn’t verify
customer affinity
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7
CHECK OUT INTEGRATION
Under Armour Example	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8
Veteran verifies with ID.me
to receive discount
Member claim is verified
and credential is issued
Veteran sees button
on UnderArmour.com
1 2 3
Identity Alone Will Not Drive Adoption	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 9
•  It’s	
  all	
  about	
  the	
  a>ributes	
  
•  Business	
  value	
  is	
  o@en	
  
driven	
  by	
  the	
  data/a>ributes	
  
associated	
  with	
  an	
  idenCty	
  
•  Network	
  effect	
  allows	
  for	
  the	
  
idenCty	
  to	
  be	
  build	
  out	
  over	
  
Cme	
  –	
  reducing	
  fricCon	
  
associated	
  with	
  user	
  on-­‐
boarding	
  
	
  
IdenCty	
  =	
  Unique	
  
CollecCon	
  of	
  A>ributes	
  
Interoperability and Trust….Kinda	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10
•  Remote	
  idenCty	
  proofing	
  
technologies	
  are	
  very	
  
‘configurable’	
  
•  Protocol	
  usage	
  –	
  mileage	
  may	
  
vary	
  	
  
•  No	
  RP	
  enforcement	
  (e.g.,	
  
single	
  log	
  out)	
  
•  CompensaCng	
  controls	
  associated	
  with	
  Levels	
  of	
  assurance	
  
leave	
  ‘equivalency’	
  up	
  for	
  interpretaCon	
  by	
  each	
  RP	
  
Standards are only the beginning…	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11
•  Underlying	
  protocols	
  are	
  the	
  first,	
  foundaConal	
  step	
  	
  
•  Developer	
  adopCon	
  of	
  the	
  technology	
  is	
  a	
  key	
  barrier	
  
•  Open	
  source	
  soluCons	
  must	
  emerge	
  that	
  provide	
  simple	
  integraCons	
  for	
  
consumpCon	
  of	
  the	
  trusted	
  credenCals	
  –	
  app	
  deployment,	
  gems,	
  etc.	
  will	
  
lower	
  the	
  barrier	
  of	
  entry	
  
Questions…	
  
CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 12

More Related Content

What's hot

The condition of today’s shared insurance leads
The condition of today’s shared insurance leadsThe condition of today’s shared insurance leads
The condition of today’s shared insurance leads
Insurance Leads Guide
 

What's hot (8)

The condition of today’s shared insurance leads
The condition of today’s shared insurance leadsThe condition of today’s shared insurance leads
The condition of today’s shared insurance leads
 
Google wallet Web-Diagram
Google wallet Web-DiagramGoogle wallet Web-Diagram
Google wallet Web-Diagram
 
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
 
Cleartrip
CleartripCleartrip
Cleartrip
 
Product Management Lessons from Google and Makemytrip
Product Management Lessons from Google and MakemytripProduct Management Lessons from Google and Makemytrip
Product Management Lessons from Google and Makemytrip
 
8 tips
8 tips8 tips
8 tips
 
AutoTrader Acquires VinSolutions
AutoTrader Acquires VinSolutionsAutoTrader Acquires VinSolutions
AutoTrader Acquires VinSolutions
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 

Similar to CIS14: Kantara Briefing on ID.me

CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA Research Corporation
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA Research Corporation
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
Alex Robbins
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
Benjamin Wyrick
 
CIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital Relationship
CloudIDSummit
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity Management
Ryan Hogarth
 

Similar to CIS14: Kantara Briefing on ID.me (20)

CIS14: Id.me
CIS14: Id.meCIS14: Id.me
CIS14: Id.me
 
Activating a Community of Brand Evangelists
Activating a Community of Brand EvangelistsActivating a Community of Brand Evangelists
Activating a Community of Brand Evangelists
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
CYVA2PageTrustedAgent_basedAdVentureSynergyFundingSummaryAngelAM20150925
 
Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
Webinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel WorldWebinar Deck: Building Customer Relationships in an Omni-Channel World
Webinar Deck: Building Customer Relationships in an Omni-Channel World
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...The Future of Digital Customer Engagement in Financial Services – What Custom...
The Future of Digital Customer Engagement in Financial Services – What Custom...
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
 
Increase Customer Engagement with Personalization
Increase Customer Engagement with PersonalizationIncrease Customer Engagement with Personalization
Increase Customer Engagement with Personalization
 
Customer Experience Visualize Monetize Optimize Tools cx Analytics
Customer Experience Visualize Monetize Optimize Tools  cx AnalyticsCustomer Experience Visualize Monetize Optimize Tools  cx Analytics
Customer Experience Visualize Monetize Optimize Tools cx Analytics
 
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
 
Liberty Vaults Power Pitch
Liberty Vaults Power PitchLiberty Vaults Power Pitch
Liberty Vaults Power Pitch
 
CIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital Relationship
 
Iamwire Investment Pitch
Iamwire Investment PitchIamwire Investment Pitch
Iamwire Investment Pitch
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docx
 
Top 10 SEO Companies.pdf
Top 10 SEO Companies.pdfTop 10 SEO Companies.pdf
Top 10 SEO Companies.pdf
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
Data Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity ManagementData Sheet- Why Customer Identity Management
Data Sheet- Why Customer Identity Management
 

More from CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

CIS14: Kantara Briefing on ID.me

  • 1. Digital Identity: Federation, Integration and Deployment of Trusted Identity Solutions Ryan Fox : JULY 19, 2014
  • 2. §  Founded by two Army Rangers in 2010 to help brands offer special loyalty programs to affinity groups like: Military, Students, Influencers and Professionals §  Capable of securing offers delivered online, in-store and via mobile §  Consumer- centric network empowers a consumer to bring their own identity to third party apps in order to receive personalized offers. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me WHO WE ARE Leaders in Digital Identity Technology CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2
  • 3. AWARD WINNING SOLUTIONS Our Accomplishments   §  Department of Commerce for a $2.8M grant as one of the five companies in America with the most advanced digital Identity technology §  Finalist for 2013 Wall Street Journal Startup of the Year §  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small Business in America” in 2013 §  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank §  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies §  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 3
  • 4. ID.me Operates as Digital Identity Bank Allowing Users to Leverage their Identity Data as Renewable Currency   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 4 •  Interoperable   •  Secure   •  User  Controlled   •  Privacy  Enhancing   •  Affordable  
  • 5. Driving Adoption of Identity Solutions   Identity matters to everyone… BUT - For different reasons… …and based on context CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5
  • 6. Effective solutions must view their value through multiple lenses Understanding business challenges is key…   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6 Security  /  IT   E-­‐commerce   Public  Sector   Protect…   Protect…   Enable…  
  • 7. CASE STUDY Under Armour Military Loyalty Program   §  Under Armour integrated ID.me technology to create an omni-channel customer experience §  Customer verifies affinity in real-time and claims discount directly in cart §  Under Armour had a military discount program in-store but was unable to provide the program online because they couldn’t verify customer affinity CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 7
  • 8. CHECK OUT INTEGRATION Under Armour Example   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 8 Veteran verifies with ID.me to receive discount Member claim is verified and credential is issued Veteran sees button on UnderArmour.com 1 2 3
  • 9. Identity Alone Will Not Drive Adoption   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 9 •  It’s  all  about  the  a>ributes   •  Business  value  is  o@en   driven  by  the  data/a>ributes   associated  with  an  idenCty   •  Network  effect  allows  for  the   idenCty  to  be  build  out  over   Cme  –  reducing  fricCon   associated  with  user  on-­‐ boarding     IdenCty  =  Unique   CollecCon  of  A>ributes  
  • 10. Interoperability and Trust….Kinda   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10 •  Remote  idenCty  proofing   technologies  are  very   ‘configurable’   •  Protocol  usage  –  mileage  may   vary     •  No  RP  enforcement  (e.g.,   single  log  out)   •  CompensaCng  controls  associated  with  Levels  of  assurance   leave  ‘equivalency’  up  for  interpretaCon  by  each  RP  
  • 11. Standards are only the beginning…   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 11 •  Underlying  protocols  are  the  first,  foundaConal  step     •  Developer  adopCon  of  the  technology  is  a  key  barrier   •  Open  source  soluCons  must  emerge  that  provide  simple  integraCons  for   consumpCon  of  the  trusted  credenCals  –  app  deployment,  gems,  etc.  will   lower  the  barrier  of  entry  
  • 12. Questions…   CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 12