SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Future Proofing Consumer Identity 
Gregg Kreizman 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its af filiates. This publication may not be reproduced or distributed in 
any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on 
gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner di sclaims all warranties as to the accuracy, completeness 
or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research 
organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a 
discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its 
shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these 
firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information 
on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity."
Digital Business 
The creation of new 
business designs by 
blurring the digital and 
physical worlds 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
The Digital Moment 
A Flight Delay…It Could Happen. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 
2
Current State Of This Digital Moment 
* Derived From Extensive Research 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 
3 
Gregg is notified 
that his flight has 
been delayed… 
…repeatedly, even 
after he has taken 
an alternative flight 
on the same 
airline!
Digital Business Changes the Scope of IAM 
IAM manages the 
identities and 
entitlements of people 
and things and the 
relationships between 
them. 
It provides the right 
access for the right 
reasons, enabling the 
right interactions at the 
right time. 
It enables desired digital business outcomes. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 4
S 
S 
Person 
Device 
Service 
Managing identities 
includes D 
the identity 
of things 
By 2020, the Internet 
of Things will redefine 
the concept of "identity 
management" to 
include what people 
own, share, and use. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Welcome to the World of Relationships
Midterm Strategic Planning Assumption 
and Recommendations 
By 2018, 35% of organizations will be delivering on 
strategies to incorporate the Internet of Things into their 
IAM programs. 
Recommendations: 
 Critical infrastructure industries should assess IAM architecture 
changes to accommodate operational technology (OT) endpoints. 
 Goods and services clients need to review their current IAM for the 
scalability that IoT will demand. 10X? 1,000X? 
 IAM vendors and service providers should evaluate how IoT can 
generate new business opportunities. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Strategic Planning Assumption 
Strategic Planning Assumption 
Every User Wants to be Treated Like a 
“Every User Is a Consumer" 
Consumer. 
By YE20, 80% of digital access will be 
shaped by new mobile and cloud (i.e., non- 
PC) architectures, up from 5% today. 
By year-end 2020, 80% of digital access will 
be shaped by new mobile and non-PC 
architectures, up from 5% today. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Midterm Strategic Planning Assumption 
and Recommendations 
By YE18, 60% of digital access will be shaped by new 
mobile and cloud (i.e., non-PC) architectures, up from 
5% today. 
Recommendations: 
 Provide brokers between modern cloud and legacy 
architectures. 
 Minimize user friction by merging enterprise and B2C 
architecture design teams, giving preference to 
consumer-oriented B2C designs. 
 Account for enterprise mobility management and IAM 
requirements collectively in strategies and procurements. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Strategic Planning Assumption 
A Competitive Marketplace for Identities 
By 2020, 60% of all digital identities 
interacting with enterprises will come from 
external identity providers through a 
competitive marketplace, up from <10% 
today. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
You Still Can Be the Dog on The Internet 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 
10
Midterm Strategic Planning Assumption 
and Recommendations 
By 2018, 40 % of all digital identities interacting with 
enterprises will come from external identity providers 
through a competitive marketplace, up from <10% 
today. 
Recommendations: 
 Investigate identity providers that match your level of identity 
assurance and service at the right price. 
 Enable social identity as an option for consumers. Adopt a "Trust 
but Verify" approach via adaptive access. 
 Seek IAM software or services that allow you to be opportunistic — 
Does not lock you into one solution for a long term. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Strategic Planning 
Assumption 
Roles Make Way For Other Attributes 
By 2020, 70% of all businesses will use 
attribute-based access control (ABAC) as the 
dominant mechanism to protect critical 
assets, up from <5% today. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Midterm Strategic Planning Assumption 
and Recommendations 
By 2018, 35% of all businesses will use attribute-based 
access control (ABAC) as the dominant mechanism to 
protect critical assets, up from <5% today. 
Recommendations: 
 Insist on ABAC being present on vendor road maps for your 
critical systems. 
 IAM vendors and service providers should deliver functionality 
arising from the shift from RBAC to ABAC. 
 Encourage ABAC awareness training for developers and 
architects. 
 Target new related application sets for ABAC. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Strategic Planning Assumption 
“Identity Intelligence Finally Gets a Brain" 
By YE20, identity analytics and intelligence 
(IAI) tools will deliver direct business value in 
60% of enterprises, up from <5% today. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 14
Midterm Strategic Planning Assumption 
and Recommendations 
By YE 2018, identity analytics and intelligence (IAI) tools 
will deliver direct business value in 40% of enterprises, 
up from <5% today. 
Recommendations: 
 Require IAM vendors to highlight IAI capabilities on RFIs and RFPs. 
 Expand the audience for IAI by demonstrating its value in specific 
business unit use cases. 
 Consolidate log management and analytics for key security and 
identity applications. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
Adaptive IAM For Consumers 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 
Protected Resources 
Use On-hand 
Data 
Databases 
Lean and 
Adaptive 
IAM 
Use Available 
Authentication 
Data and Context 
Policies 
fast 
Identity Analytics 
Proofing 
View healthcare data 
Transfer funds 
Initiate benefits change 
Minor profile updates 
Initial registration 
Marketing 
Non-sensitive access
Bimodal IAM = Legacy IAM + Adaptive 
IAM 
Honor the Legacy. Embrace the Changing Future. 
100% 
90% 
80% 
70% 
60% 
50% 
40% 
30% 
20% 
10% 
0% 
SSO 
ADAPTIVE IAM 
Speculative, Short-Term 
2014 2016 2018 2020 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 
BYOI 
LEGACY IAM 
Predictable, Reliable, Stable 
Incremental Change 
Fail Fast
Action Plan for IAM Leaders 
Monday morning: 
- Identify items on your legacy IAM road map that should move to 
your adaptive IAM road map. 
Next 3 months: 
- Update your IAM vision to include the bimodal nature of your 
IAM program. 
- Challenge your IAM vendor(s) to include adaptive IAM features 
in their road map. 
Next 12 months: 
- Socialize your bimodal IAM vision to your organization. 
- Create an adaptive IAM team and pilot an adaptive IAM initiative. 
Encourage them to take risks. 
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management marketAllied Market Research
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Toolsijtsrd
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementForgeRock
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyForgeRock
 
Stop treating your customers like your employees
Stop treating your customers like your employeesStop treating your customers like your employees
Stop treating your customers like your employeesIan Glazer
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access ManagementRichard Harvey
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAMWSO2
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...ForgeRock
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Hoang Tri Vo
 

Was ist angesagt? (20)

Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management market
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
 
Stop treating your customers like your employees
Stop treating your customers like your employeesStop treating your customers like your employees
Stop treating your customers like your employees
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
 

Andere mochten auch

The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceGigya
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCloudIDSummit
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityCA API Management
 
Rotary.23.august2016
Rotary.23.august2016Rotary.23.august2016
Rotary.23.august2016Ida Borch
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101CloudIDSummit
 
MP fortsætter fremgangen.
MP fortsætter fremgangen.MP fortsætter fremgangen.
MP fortsætter fremgangen.husetnybo
 
Motiverende samtale - en tilnærming til samtale om endring
Motiverende samtale - en tilnærming til samtale om endringMotiverende samtale - en tilnærming til samtale om endring
Motiverende samtale - en tilnærming til samtale om endringNina Sletteland
 
Varilla de soldadura oxiacetilenica
Varilla de soldadura oxiacetilenicaVarilla de soldadura oxiacetilenica
Varilla de soldadura oxiacetilenicaEmmanuel351
 
K ommunikation i arbetslivet del 5
K ommunikation i arbetslivet del 5K ommunikation i arbetslivet del 5
K ommunikation i arbetslivet del 5jonathansikh
 
Identity systems
Identity systemsIdentity systems
Identity systemsJim Fenton
 
Czym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnegoCzym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnegorafaljurkowlaniec
 
Hvordan Blir Du Et Personligt Brand?
Hvordan Blir Du Et Personligt Brand?Hvordan Blir Du Et Personligt Brand?
Hvordan Blir Du Et Personligt Brand?Ida Borch
 

Andere mochten auch (20)

The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Mobile Persuasion
Mobile PersuasionMobile Persuasion
Mobile Persuasion
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
 
Rotary.23.august2016
Rotary.23.august2016Rotary.23.august2016
Rotary.23.august2016
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
 
MP fortsætter fremgangen.
MP fortsætter fremgangen.MP fortsætter fremgangen.
MP fortsætter fremgangen.
 
Motiverende samtale - en tilnærming til samtale om endring
Motiverende samtale - en tilnærming til samtale om endringMotiverende samtale - en tilnærming til samtale om endring
Motiverende samtale - en tilnærming til samtale om endring
 
moser
mosermoser
moser
 
Varilla de soldadura oxiacetilenica
Varilla de soldadura oxiacetilenicaVarilla de soldadura oxiacetilenica
Varilla de soldadura oxiacetilenica
 
K ommunikation i arbetslivet del 5
K ommunikation i arbetslivet del 5K ommunikation i arbetslivet del 5
K ommunikation i arbetslivet del 5
 
Identity systems
Identity systemsIdentity systems
Identity systems
 
Czym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnegoCzym rozni sie paszport biometryczny od tradycyjnego
Czym rozni sie paszport biometryczny od tradycyjnego
 
Hvordan Blir Du Et Personligt Brand?
Hvordan Blir Du Et Personligt Brand?Hvordan Blir Du Et Personligt Brand?
Hvordan Blir Du Et Personligt Brand?
 

Ähnlich wie FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT

How to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms EffectivelyHow to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms EffectivelyMuleSoft
 
The Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdfThe Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdfAydinAdrianBahar1
 
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...WSO2
 
CIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital LeadershipCIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital LeadershipDerek Mulrey
 
The top 10 strategic technology trends for 2019.
The top 10 strategic technology trends for 2019.The top 10 strategic technology trends for 2019.
The top 10 strategic technology trends for 2019.Paulo Ratinecas
 
How to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital BusinessHow to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital BusinessTeradata
 
The Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun ChandrasekaranThe Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun ChandrasekaranPoh Lee
 
Engaging Your CFO in Business Analytics | Palestrante: Celso Chapinotte
Engaging Your CFO in Business Analytics  | Palestrante: Celso ChapinotteEngaging Your CFO in Business Analytics  | Palestrante: Celso Chapinotte
Engaging Your CFO in Business Analytics | Palestrante: Celso Chapinottesucesuminas
 
JahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene PhiferJahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene PhiferJahia Solutions Group
 
Paul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdfPaul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdfdcphostmaster
 
Annette Zimmermann (Gartner) Intro to the AR+VR Market Opportunity
Annette Zimmermann (Gartner) Intro to the AR+VR Market OpportunityAnnette Zimmermann (Gartner) Intro to the AR+VR Market Opportunity
Annette Zimmermann (Gartner) Intro to the AR+VR Market OpportunityAugmentedWorldExpo
 
Top Trends in Application Architecture That Enable.pdf
Top Trends in Application Architecture That Enable.pdfTop Trends in Application Architecture That Enable.pdf
Top Trends in Application Architecture That Enable.pdfMantoshKumarSingh7
 
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...AugmentedWorldExpo
 
strategic changes in infrastructure services Gartner I&O
strategic changes in infrastructure services Gartner I&Ostrategic changes in infrastructure services Gartner I&O
strategic changes in infrastructure services Gartner I&OMalik BC
 
The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023InData Labs
 
The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)The Digital Insurer
 

Ähnlich wie FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT (20)

How to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms EffectivelyHow to Use Hybrid Integration Platforms Effectively
How to Use Hybrid Integration Platforms Effectively
 
The Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdfThe Top Strategic Technology Trends for 2021.pdf
The Top Strategic Technology Trends for 2021.pdf
 
Nexus of Forces
Nexus of ForcesNexus of Forces
Nexus of Forces
 
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
[WSO2Con EU 2018] The Hybrid Integration Platform: Can You Be in Business Wit...
 
CIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital LeadershipCIO Agenda 2015 - Flipping Into Digital Leadership
CIO Agenda 2015 - Flipping Into Digital Leadership
 
The top 10 strategic technology trends for 2019.
The top 10 strategic technology trends for 2019.The top 10 strategic technology trends for 2019.
The top 10 strategic technology trends for 2019.
 
How to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital BusinessHow to Use Algorithms to Scale Digital Business
How to Use Algorithms to Scale Digital Business
 
The Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun ChandrasekaranThe Revolutionary Impact of the Cloud by Arun Chandrasekaran
The Revolutionary Impact of the Cloud by Arun Chandrasekaran
 
Engaging Your CFO in Business Analytics | Palestrante: Celso Chapinotte
Engaging Your CFO in Business Analytics  | Palestrante: Celso ChapinotteEngaging Your CFO in Business Analytics  | Palestrante: Celso Chapinotte
Engaging Your CFO in Business Analytics | Palestrante: Celso Chapinotte
 
JahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene PhiferJahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
JahiaOne 2015 - Gartner Keynote on UXP by Gene Phifer
 
Paul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdfPaul Martin (Gartner) - Show Me the AI Money.pdf
Paul Martin (Gartner) - Show Me the AI Money.pdf
 
Annette Zimmermann (Gartner) Intro to the AR+VR Market Opportunity
Annette Zimmermann (Gartner) Intro to the AR+VR Market OpportunityAnnette Zimmermann (Gartner) Intro to the AR+VR Market Opportunity
Annette Zimmermann (Gartner) Intro to the AR+VR Market Opportunity
 
Top Trends in Application Architecture That Enable.pdf
Top Trends in Application Architecture That Enable.pdfTop Trends in Application Architecture That Enable.pdf
Top Trends in Application Architecture That Enable.pdf
 
Sofia sv
Sofia svSofia sv
Sofia sv
 
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
Annette Zimmermann (Gartner): Gartner Strategic Predictions: What Will Disrup...
 
gen-ai-planning-workbook.pdf
gen-ai-planning-workbook.pdfgen-ai-planning-workbook.pdf
gen-ai-planning-workbook.pdf
 
The IOT scenario in the digital age
The IOT scenario in the digital ageThe IOT scenario in the digital age
The IOT scenario in the digital age
 
strategic changes in infrastructure services Gartner I&O
strategic changes in infrastructure services Gartner I&Ostrategic changes in infrastructure services Gartner I&O
strategic changes in infrastructure services Gartner I&O
 
The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023The State of Global AI Adoption in 2023
The State of Global AI Adoption in 2023
 
The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)The Digital Insurer Award - FWD (data AI)
The Digital Insurer Award - FWD (data AI)
 

Mehr von ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 

Mehr von ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT

  • 1. Future Proofing Consumer Identity Gregg Kreizman © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its af filiates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner di sclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity."
  • 2. Digital Business The creation of new business designs by blurring the digital and physical worlds © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 3. The Digital Moment A Flight Delay…It Could Happen. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 2
  • 4. Current State Of This Digital Moment * Derived From Extensive Research © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 3 Gregg is notified that his flight has been delayed… …repeatedly, even after he has taken an alternative flight on the same airline!
  • 5. Digital Business Changes the Scope of IAM IAM manages the identities and entitlements of people and things and the relationships between them. It provides the right access for the right reasons, enabling the right interactions at the right time. It enables desired digital business outcomes. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 4
  • 6. S S Person Device Service Managing identities includes D the identity of things By 2020, the Internet of Things will redefine the concept of "identity management" to include what people own, share, and use. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Welcome to the World of Relationships
  • 7. Midterm Strategic Planning Assumption and Recommendations By 2018, 35% of organizations will be delivering on strategies to incorporate the Internet of Things into their IAM programs. Recommendations:  Critical infrastructure industries should assess IAM architecture changes to accommodate operational technology (OT) endpoints.  Goods and services clients need to review their current IAM for the scalability that IoT will demand. 10X? 1,000X?  IAM vendors and service providers should evaluate how IoT can generate new business opportunities. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 8. Strategic Planning Assumption Strategic Planning Assumption Every User Wants to be Treated Like a “Every User Is a Consumer" Consumer. By YE20, 80% of digital access will be shaped by new mobile and cloud (i.e., non- PC) architectures, up from 5% today. By year-end 2020, 80% of digital access will be shaped by new mobile and non-PC architectures, up from 5% today. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 9. Midterm Strategic Planning Assumption and Recommendations By YE18, 60% of digital access will be shaped by new mobile and cloud (i.e., non-PC) architectures, up from 5% today. Recommendations:  Provide brokers between modern cloud and legacy architectures.  Minimize user friction by merging enterprise and B2C architecture design teams, giving preference to consumer-oriented B2C designs.  Account for enterprise mobility management and IAM requirements collectively in strategies and procurements. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 10. Strategic Planning Assumption A Competitive Marketplace for Identities By 2020, 60% of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace, up from <10% today. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 11. You Still Can Be the Dog on The Internet © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 10
  • 12. Midterm Strategic Planning Assumption and Recommendations By 2018, 40 % of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace, up from <10% today. Recommendations:  Investigate identity providers that match your level of identity assurance and service at the right price.  Enable social identity as an option for consumers. Adopt a "Trust but Verify" approach via adaptive access.  Seek IAM software or services that allow you to be opportunistic — Does not lock you into one solution for a long term. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 13. Strategic Planning Assumption Roles Make Way For Other Attributes By 2020, 70% of all businesses will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from <5% today. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 14. Midterm Strategic Planning Assumption and Recommendations By 2018, 35% of all businesses will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from <5% today. Recommendations:  Insist on ABAC being present on vendor road maps for your critical systems.  IAM vendors and service providers should deliver functionality arising from the shift from RBAC to ABAC.  Encourage ABAC awareness training for developers and architects.  Target new related application sets for ABAC. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 15. Strategic Planning Assumption “Identity Intelligence Finally Gets a Brain" By YE20, identity analytics and intelligence (IAI) tools will deliver direct business value in 60% of enterprises, up from <5% today. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. 14
  • 16. Midterm Strategic Planning Assumption and Recommendations By YE 2018, identity analytics and intelligence (IAI) tools will deliver direct business value in 40% of enterprises, up from <5% today. Recommendations:  Require IAM vendors to highlight IAI capabilities on RFIs and RFPs.  Expand the audience for IAI by demonstrating its value in specific business unit use cases.  Consolidate log management and analytics for key security and identity applications. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.
  • 17. Adaptive IAM For Consumers © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Protected Resources Use On-hand Data Databases Lean and Adaptive IAM Use Available Authentication Data and Context Policies fast Identity Analytics Proofing View healthcare data Transfer funds Initiate benefits change Minor profile updates Initial registration Marketing Non-sensitive access
  • 18. Bimodal IAM = Legacy IAM + Adaptive IAM Honor the Legacy. Embrace the Changing Future. 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% SSO ADAPTIVE IAM Speculative, Short-Term 2014 2016 2018 2020 © 2014 Gartner, Inc. and/or its affiliates. All rights reserved. BYOI LEGACY IAM Predictable, Reliable, Stable Incremental Change Fail Fast
  • 19. Action Plan for IAM Leaders Monday morning: - Identify items on your legacy IAM road map that should move to your adaptive IAM road map. Next 3 months: - Update your IAM vision to include the bimodal nature of your IAM program. - Challenge your IAM vendor(s) to include adaptive IAM features in their road map. Next 12 months: - Socialize your bimodal IAM vision to your organization. - Create an adaptive IAM team and pilot an adaptive IAM initiative. Encourage them to take risks. © 2014 Gartner, Inc. and/or its affiliates. All rights reserved.