SlideShare a Scribd company logo
1 of 7
Download to read offline
CustomerIdentityandAccess
Management(CIAM)
usecasesandtechnologyguide
BenefitsofaCIAMtechnology?
1.Deliveraunifiedexperiencethatimprovescustomerconversion
andretention
2.Givesa360(degree)viewofthecustomer.Unifiesdisparatedata
insightstogiveawell-roundedviewofthecustomer
3.Consistentanalyticsandreporting
4.Complieswithregulations,improvesagilityandscalability
5.Drivesactionableinsights,helpsmarketingteamsdevelop
customizedofferings
CommonCIAMtechnologyusecases
1.Deliveraunifiedexperiencethatimprovescustomerconversionandretention
2.Givesa360(degree)viewofthecustomer.Unifiesdisparatedatainsightsto
giveawell-roundedviewofthecustomer
3.Consistentanalyticsandreporting
4.Complieswithregulations,improvesagilityandscalability
5.Drivesactionableinsights,helpsmarketingteamsdevelopcustomizedofferings
Formarketingpurposes
Consumersthesedaysexpecteasy,friction-freeloginprocessacrossallthe
devicestheyareusing.CIAMsystemshelpdeliverthisexperience.Commonuse
casesinclude: Todecreasesabandonmentrates
CommonCIAMtechnologyusecases
1.       Tomanagecustomeridentitiesatscale
2.       Toenablesociallogin
3.       Tosecurecustomerdata
4.       Toreduceexposuretothreat 
5.       Toauthenticateuser 
6.       Tomanageconsentlifecycle
ForIT/securitypurposes
Businessesneedsolutionsthataresimpletouse,compliantwithlocalregulations,
andhighlysecure.CommonCIAMusecasesinclude:
CIAMtechnologymust-havefeatures
1.Userregistrationandonboarding:
Ensuretheregistrationprocessiseasilycompletedbytheuser.
2.Singlesign-on:
Usingasinglesetoflog-incredentialstoaccessmultipleapplications.
3.Progressiveprofiling:
Buildonuserprofileswithtime.
4.Managinguserprofiles:
Managingallcustomercontentinputfrommultiplechannelsinaunifiedcustomerprofileto
createconsistentexperiencesacrosschannels.
5.Detectingfraud:
Allowingrisk/frauddetection,andevaluatingandchoosingtherightsortofauthenticationfor
access.
6.Consentandprivacymanagement:
Compliancewithregulationpertainingtotheuseofuserdata.
7.Multi-channelsupport:
Enablingsupportthroughmultiplechannelstoenhanceuserexperienceonallthosechannels.
8.Authenticatingtheuser:
Multipleuserauthenticationmodelstoenhancecustomertrust.
BuildingblocksofaCIAMtechnologysolution
1.Authentication
2.Privacyandcompliance
3.Performanceandscalability
4.Integrability
5.Analytics
ThankYou

More Related Content

What's hot

Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
Network Intelligence India
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
Maganathin Veeraragaloo
 

What's hot (20)

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 

Similar to Customer identity and access management (ciam)

Devopsdays barcelona
Devopsdays barcelonaDevopsdays barcelona
Devopsdays barcelona
Almudena Vivanco
 
ISO_6
ISO_6ISO_6
ISO_6
PMI2011
 
What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...
What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...
What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...
0122446
 
Arrelic_Overview_2016
Arrelic_Overview_2016Arrelic_Overview_2016
Arrelic_Overview_2016
DEEPAK SAHOO
 

Similar to Customer identity and access management (ciam) (20)

Implementing a Proactive Maintenance Strategy
Implementing a Proactive Maintenance StrategyImplementing a Proactive Maintenance Strategy
Implementing a Proactive Maintenance Strategy
 
Factory
FactoryFactory
Factory
 
Total Quality Management (VV2)
Total Quality Management (VV2)Total Quality Management (VV2)
Total Quality Management (VV2)
 
Devopsdays barcelona
Devopsdays barcelonaDevopsdays barcelona
Devopsdays barcelona
 
Profit Hunters
Profit HuntersProfit Hunters
Profit Hunters
 
CMMI Introduction (staged and continuous)
CMMI  Introduction (staged and continuous)CMMI  Introduction (staged and continuous)
CMMI Introduction (staged and continuous)
 
CMMI staged and continuous
CMMI staged and continuousCMMI staged and continuous
CMMI staged and continuous
 
services marketing manager certification
services marketing manager certificationservices marketing manager certification
services marketing manager certification
 
Exponentially influencing business outcomes with Big Data Analytics
Exponentially influencing business outcomes with Big Data AnalyticsExponentially influencing business outcomes with Big Data Analytics
Exponentially influencing business outcomes with Big Data Analytics
 
The Role of Standard Operating Procedures (SOPs) in Maintenance Management
The Role of Standard Operating Procedures (SOPs) in Maintenance ManagementThe Role of Standard Operating Procedures (SOPs) in Maintenance Management
The Role of Standard Operating Procedures (SOPs) in Maintenance Management
 
ISO_6
ISO_6ISO_6
ISO_6
 
Six Sigma Yellow Belt Training
Six Sigma Yellow Belt TrainingSix Sigma Yellow Belt Training
Six Sigma Yellow Belt Training
 
Advanced Operating Models Research Insights: Marketing
Advanced Operating Models  Research Insights: MarketingAdvanced Operating Models  Research Insights: Marketing
Advanced Operating Models Research Insights: Marketing
 
Six_Sigma.ppt
Six_Sigma.pptSix_Sigma.ppt
Six_Sigma.ppt
 
Six_Sigma.ppt
Six_Sigma.pptSix_Sigma.ppt
Six_Sigma.ppt
 
Six_Sigma.ppt
Six_Sigma.pptSix_Sigma.ppt
Six_Sigma.ppt
 
What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...
What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...
What is Six Sigma? Phases of Six Sigma. Define; Measure; Evaluate / Analyze; ...
 
Amit.ppt
Amit.pptAmit.ppt
Amit.ppt
 
Customer Success 101
Customer Success 101   Customer Success 101
Customer Success 101
 
Arrelic_Overview_2016
Arrelic_Overview_2016Arrelic_Overview_2016
Arrelic_Overview_2016
 

More from Nuvento Systems Pvt Ltd

More from Nuvento Systems Pvt Ltd (20)

Snowflakes to Databricks Migration Guide - Nuvento
Snowflakes to Databricks Migration Guide - NuventoSnowflakes to Databricks Migration Guide - Nuvento
Snowflakes to Databricks Migration Guide - Nuvento
 
Cloud Readiness Assessment | Nuvento
Cloud Readiness Assessment | NuventoCloud Readiness Assessment | Nuvento
Cloud Readiness Assessment | Nuvento
 
Strategies for Successful Application and Data Migration to the Cloud
Strategies for Successful Application and Data Migration to the CloudStrategies for Successful Application and Data Migration to the Cloud
Strategies for Successful Application and Data Migration to the Cloud
 
Trends in Cloud Computing Services | Nuvento USA
Trends in Cloud Computing Services | Nuvento USATrends in Cloud Computing Services | Nuvento USA
Trends in Cloud Computing Services | Nuvento USA
 
Essential Factors for a Successful Azure Migration Journey | Nuvento USA
Essential Factors for a Successful Azure Migration Journey | Nuvento USAEssential Factors for a Successful Azure Migration Journey | Nuvento USA
Essential Factors for a Successful Azure Migration Journey | Nuvento USA
 
Planning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
Planning a Successful Azure Cloud Migration: A Strategic Approach - NuventoPlanning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
Planning a Successful Azure Cloud Migration: A Strategic Approach - Nuvento
 
Azure Security Best Practises for Enterprises
Azure Security Best Practises for EnterprisesAzure Security Best Practises for Enterprises
Azure Security Best Practises for Enterprises
 
Benefits of Switching to AWS
Benefits of Switching to AWSBenefits of Switching to AWS
Benefits of Switching to AWS
 
7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure
 
How to Plan for Cloud Modernization
How to Plan for Cloud ModernizationHow to Plan for Cloud Modernization
How to Plan for Cloud Modernization
 
Roles and responsibilities of a dedicated development team.pdf
Roles and responsibilities of a dedicated development team.pdfRoles and responsibilities of a dedicated development team.pdf
Roles and responsibilities of a dedicated development team.pdf
 
Azure-based hybrid application
Azure-based hybrid applicationAzure-based hybrid application
Azure-based hybrid application
 
Cloud managed services.pdf
Cloud managed services.pdfCloud managed services.pdf
Cloud managed services.pdf
 
Cloud-based student EHR Solution.pdf
Cloud-based student EHR Solution.pdfCloud-based student EHR Solution.pdf
Cloud-based student EHR Solution.pdf
 
Mobile application development case study
Mobile application development case studyMobile application development case study
Mobile application development case study
 
Main characteristics of a great dedicated development team
Main characteristics of a great dedicated development teamMain characteristics of a great dedicated development team
Main characteristics of a great dedicated development team
 
What is a dedicated team model
What is a dedicated team modelWhat is a dedicated team model
What is a dedicated team model
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services
 
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdf
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdfDigital Transformation in Sports & Entertainment Industry Case Study (1).pdf
Digital Transformation in Sports & Entertainment Industry Case Study (1).pdf
 
Multi-specialist hybrid healthcare application case study
Multi-specialist hybrid healthcare application case studyMulti-specialist hybrid healthcare application case study
Multi-specialist hybrid healthcare application case study
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Customer identity and access management (ciam)