SlideShare a Scribd company logo
1 of 13
Are You Being Anti-Social?
David Mount
Technical Director – UK & Ireland
Some Statistics
Approximate Number of UK Social
Media Subscribers

34M

33M
11M
3

© 2012 NetIQ Corporation. All rights reserved.
Average Number of Social Media
Accounts per Internet User

2

4

© 2012 NetIQ Corporation. All rights reserved.
Average Number of Online Accounts,
per Internet User

24

40
5

© 2012 NetIQ Corporation. All rights reserved.
Social Networks will Become Identity
Brokers/Providers
“By end of 2015 30% of all new
retail customer identities will be
based on social network
identities. Today identity is
delivered by the enterprise. If you
look at business partners and
customers, identities may come
from somewhere else. In a
decade or so depending on the
mobility of the social media
environment and our ability to
build an enterprise-class shell
around that identity, they could
become the dominant identity
providers.” - Earl Perkins,
Gartner analyst

6

© 2012 NetIQ Corporation. All rights reserved.
B2C & G2C Challenges
The need for more effective interactions
More effective B2C or G2C interactions
•

•

Self registration – the business avoids requiring form
fill requests, which has a 87% drop rate

•

7

Convenience – customers don’t have to remember
site specific credentials to login

Personalization – customize content based on
identity related information: past purchases;
Facebook, etc.

© 2012 NetIQ Corporation. All rights reserved.
Why shouldn’t we be Anti-Social?


Government/Customer Information Portals
–



Information access needs identity not security

Customer Involvement and feedback
–

Increased customer engagement by not requiring site or vender specific accounts

–

Increase citizen involvement and feedback

–

Data collection

Customer Resource Management


–

Link customers to their Social Identity to provide enhanced support channels



Storefronts
–

–


8

Personalization

No need for customer to fill out a form with information which can already be provided as
a result of a Social Login

Multiple Accounts for a single Identity
© 2012 NetIQ Corporation. All rights reserved.
Case Study – NYC.gov
NYC.gov Lightly Secured Customer
Facing Portal – the questions
“Why do I have to
create another *#@&!
account just to book a
tennis court?”
The Resident

“How do I allow access
from multiple social
logins, directories and
SAML IDPs?”
“How do I provide graded
access for anyone;
minimal identities;
validated identities; and
employees?”

“How do I support
identity without
having to pay for
directory licenses?”
The CIO

The Admin

“How do I personalise
the experience?”
The User Experience
Expert

10

© 2012 NetIQ Corporation. All rights reserved.

“How do I meet our
compliance
requirements?”
The Auditor
Social Federation for NYC.gov

OAuth
Token

11

© 2012 NetIQ Corporation. All rights reserved.

Consumer
Federation
Social Federation for NYC.gov
Secure
Resources

Public
Resources

www.nyc.gov is a site
composed of information
from other
webservices, secure, publi
c, and semi public.
12

© 2012 NetIQ Corporation. All rights reserved.

Social
Access

Secure Identity Enabled
Web Services

Non Identity based
information and services,
optimized for speed

Personalized Web
content, requires only
simple consumer
authentication or
NYC.ID
Learn more about NetIQ’s Social Sign-On
solutions at: bit.ly/SocialAccess

More Related Content

What's hot

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
 

What's hot (20)

GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 

Viewers also liked

Viewers also liked (8)

BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 

Similar to Are You Being Anti-Social

CIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital Relationship
CloudIDSummit
 

Similar to Are You Being Anti-Social (20)

TBLA 2015 - Team Steelions
TBLA 2015 - Team SteelionsTBLA 2015 - Team Steelions
TBLA 2015 - Team Steelions
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
Materi Perlindungan Konsumen.pdf
Materi Perlindungan Konsumen.pdfMateri Perlindungan Konsumen.pdf
Materi Perlindungan Konsumen.pdf
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Single Sign On IDM Value
Single Sign On IDM ValueSingle Sign On IDM Value
Single Sign On IDM Value
 
CIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital Relationship
 
Securter Systems
Securter Systems Securter Systems
Securter Systems
 
Unlock Digital Banking with SAP Bank Analyzer & S4
Unlock Digital Banking with SAP Bank Analyzer & S4Unlock Digital Banking with SAP Bank Analyzer & S4
Unlock Digital Banking with SAP Bank Analyzer & S4
 
Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Digital Insurance Enterprise: The Nest Case Study
Digital Insurance Enterprise: The Nest Case StudyDigital Insurance Enterprise: The Nest Case Study
Digital Insurance Enterprise: The Nest Case Study
 
[WSO2 Summit APAC 2020] Fintech Ecosystems & Consumer Experiences: The Next G...
[WSO2 Summit APAC 2020] Fintech Ecosystems & Consumer Experiences: The Next G...[WSO2 Summit APAC 2020] Fintech Ecosystems & Consumer Experiences: The Next G...
[WSO2 Summit APAC 2020] Fintech Ecosystems & Consumer Experiences: The Next G...
 
3 Reasons why IBDs need a Fintech strategy
3 Reasons why IBDs need a Fintech strategy3 Reasons why IBDs need a Fintech strategy
3 Reasons why IBDs need a Fintech strategy
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
 
Consumer Engagement with Florida Blue and Exceptional Digital Experiences
Consumer Engagement with Florida Blue and Exceptional Digital ExperiencesConsumer Engagement with Florida Blue and Exceptional Digital Experiences
Consumer Engagement with Florida Blue and Exceptional Digital Experiences
 

More from NetIQ

More from NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered Security
 
IT Disaster Recovery
IT Disaster RecoveryIT Disaster Recovery
IT Disaster Recovery
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Are You Being Anti-Social

  • 1. Are You Being Anti-Social? David Mount Technical Director – UK & Ireland
  • 3. Approximate Number of UK Social Media Subscribers 34M 33M 11M 3 © 2012 NetIQ Corporation. All rights reserved.
  • 4. Average Number of Social Media Accounts per Internet User 2 4 © 2012 NetIQ Corporation. All rights reserved.
  • 5. Average Number of Online Accounts, per Internet User 24 40 5 © 2012 NetIQ Corporation. All rights reserved.
  • 6. Social Networks will Become Identity Brokers/Providers “By end of 2015 30% of all new retail customer identities will be based on social network identities. Today identity is delivered by the enterprise. If you look at business partners and customers, identities may come from somewhere else. In a decade or so depending on the mobility of the social media environment and our ability to build an enterprise-class shell around that identity, they could become the dominant identity providers.” - Earl Perkins, Gartner analyst 6 © 2012 NetIQ Corporation. All rights reserved.
  • 7. B2C & G2C Challenges The need for more effective interactions More effective B2C or G2C interactions • • Self registration – the business avoids requiring form fill requests, which has a 87% drop rate • 7 Convenience – customers don’t have to remember site specific credentials to login Personalization – customize content based on identity related information: past purchases; Facebook, etc. © 2012 NetIQ Corporation. All rights reserved.
  • 8. Why shouldn’t we be Anti-Social?  Government/Customer Information Portals –  Information access needs identity not security Customer Involvement and feedback – Increased customer engagement by not requiring site or vender specific accounts – Increase citizen involvement and feedback – Data collection Customer Resource Management  – Link customers to their Social Identity to provide enhanced support channels  Storefronts – –  8 Personalization No need for customer to fill out a form with information which can already be provided as a result of a Social Login Multiple Accounts for a single Identity © 2012 NetIQ Corporation. All rights reserved.
  • 9. Case Study – NYC.gov
  • 10. NYC.gov Lightly Secured Customer Facing Portal – the questions “Why do I have to create another *#@&! account just to book a tennis court?” The Resident “How do I allow access from multiple social logins, directories and SAML IDPs?” “How do I provide graded access for anyone; minimal identities; validated identities; and employees?” “How do I support identity without having to pay for directory licenses?” The CIO The Admin “How do I personalise the experience?” The User Experience Expert 10 © 2012 NetIQ Corporation. All rights reserved. “How do I meet our compliance requirements?” The Auditor
  • 11. Social Federation for NYC.gov OAuth Token 11 © 2012 NetIQ Corporation. All rights reserved. Consumer Federation
  • 12. Social Federation for NYC.gov Secure Resources Public Resources www.nyc.gov is a site composed of information from other webservices, secure, publi c, and semi public. 12 © 2012 NetIQ Corporation. All rights reserved. Social Access Secure Identity Enabled Web Services Non Identity based information and services, optimized for speed Personalized Web content, requires only simple consumer authentication or NYC.ID
  • 13. Learn more about NetIQ’s Social Sign-On solutions at: bit.ly/SocialAccess

Editor's Notes

  1. Business to Consumer and Government to Citizen challengesInteraction ExamplesFacebook – Retrieve a user's friend listShare/Recommend - allow them the opportunity to share or recommend their experience or perspective about your product or servicesParticipate – allow a customer to comment on a piece of content on your websiteYahoo – Full nameEmail addressGenderContact list
  2. Product Requirements -Priority One:Facebook OAuth authentication If already logged into Facebook or Google, SSO is expected Must have reporting on number of unique users per month, quarter, year, with information about their id and type Must Audit failed authentications and retries.... (not sure what that really means for facebookauth)Priority Two:Twitter, Yahoo, OpenID and other Social logins Use OAuth attributes to set roles for policy decisions (Facebook group, address etc.) Sync trust between different social sites