Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 5 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Enabling B2C Solutions with Identity and Access Management

by The Gurus
October 20, 2020
in This Week's Gurus
Share on FacebookShare on Twitter

In the delivery of IT services to large customer (B2C) communities the challenges for identifying users, securing their access and managing the ongoing digital relationship that a customer has with the business are continually evolving.

Market drivers today mean that Identity and Access Management (IAM) solutions need to fulfill more than their traditional role of establishing security controls and meeting compliance obligations alone. New IAM solutions must satisfy a broad range of delivery criteria and support the business in driving more value from the customer relationship.  For example a common set of success criteria for an IAM solution in a B2C context may now require that it satisfy the following wider set of business-oriented goals
1.      Improve the customer experience.
Simplify the journey that a customer undertakes when interacting with digital services. Provide access to multiple services through a single consistent identity and interactive experience

2.      Enable revenue growth and enhance business agility.
Support business goals to return more value from online services by enabling the delivery of intelligent and personalised user content. Also support the competitive goals of the organisation by enabling the rapid rollout of new and improved services to wider audiences.

3.      Improve operational efficiency and enable consolidation.
Support the assimilation of disparate service operations under a single centralised service. Reduce workloads for support and operational teams by providing improved and more secure administrative functions alongside customer self-care facilities

4.      Build for the future.
Provide a flexible foundation for the delivery of additional customer services and related IAM functions in the future. Avoid service delivery lock-in and promote best-of-breed framework based technology models that can adapt and grow as requirements and markets evolve without the need for significant infrastructure upheaval or customer impact. Provide a platform that is fully scalable for anticipated future demand.
Additionally B2C service providers need to recognise and react to other key forces that are shaping IT delivery processes today.
These include the increasing adoption of cloud-based services and Software-as-a-Service (SaaS) delivery models, the rise and rise of social media services (recognising their increasing influence on the commercial world), and the use of advanced mobile computing for application and service access. While each of these areas is fundamentally impacting how IAM solutions for B2C are implemented each also provides unique opportunities for service providers to lean on IAM to realise more business value from the digital experiences they provide.
In reacting to these challenges IAM vendors and systems integrators must carefully evaluate how their solutions are designed and deployed within any B2C environment. The most successful approaches today are built around three core areas of focus – these being:

Business process integration – Ensuring that identity and access are aligned to business processes and that it can adapt as business requirements change
User experience management – Ensuring that a first class user experience is delivered for all system touch points. Actively promoting the use of new identity and access services to drive new business value
Technical integration 
- Building the informa
tion flows between directories, databases, applications, and systems (both onsite and cloud-based) that ensure identity and access controls can be enforced across a heterogeneous estate.
Through adopting these principles solution providers may exploit a set of best-practice IAM user journeys for common B2C scenarios. Examples of the type of functions that an optimised IAM service for B2C would provide are shown in the table below:

B2C IAM Function Example
User migration Migrate details of existing customers from legacy systems to new service platforms, while providing a seamless integration and customer experience at login time.
User registration Register new online customers through the provision of clear, efficient, and simply orchestrated user journeys.
User authentication Verify the identity of a user through mechanisms that are commensurate with the risk that is associated for the transaction being executed.
User self-care Provide services to allow users to reset their personal password. 
 Allow forgotten user IDs to be retrieved through completion of the security Q&A process and a link to a previously registered details.
 Also allow authenticated users to update their personal account details.
User administration Provide central identity administration interfaces and support a single view of the customer.
User experience management Provide an interface that shows content that is branded and personalised in a manner that is appropriate for the user accessing the system. Support for different national languages and brand variations as required.
Identity and Access Intelligence Integrate user identity/tracking services with existing enterprise services for Business Intelligence. Provide identity and access insight that supports the business in making better decisions regarding the provision of future services.

At Pirean we are continually working with our customers on innovations that ensure that business objectives for B2C can be better enabled through the solutions we deliver. You can find out more about our approach to enabling B2C solutions with IAM through our recent IBM Redguide publication . The guide describes our solution approach to IAM for B2C, built on the Pirean Access: One framework and provides a detailed view to help the reader to: learn how Identity and Access Management solutions can help organizations deliver better services to more customers; ynderstand approaches for optimising the user experience and integrating with business and technical processes; gain insight into real world Identity and Access Management solutions for B2C.

Colin Miles is CTO of Pirean

FacebookTweetLinkedIn
ShareTweet
Previous Post

Cut Microsoft admin rights to mitigate 92% of threats, study shows

Next Post

AlienVault expands OTX partners

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information