an imperative for digital transformation...business 2.0: new opportunities, markets, and offerings...

17
Trusted Identities An Imperative for Digital Transformation www.abiresearch.com

Upload: others

Post on 28-May-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Trusted IdentitiesAn Imperative for Digital Transformationwww.abiresearch.com

2TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Business 2.0: New Opportunities, Markets, and Offerings

Modern enterprises are in the midst of a digital revolution, adapting to the demands of Business 2.0. They are looking to

embrace new business opportunities, expand into new markets, and propose new product offerings, as well as be more

agile in responding to existing demands. Their struggle is to remain relevant in a changing and increasingly vulnerable

business environment, all the while providing solutions and services that can disrupt and ensure they stand out amongst

the competition.

This transformation relies on digital technologies to fundamentally change the way products and services are offered. At the

core, this means adjusting business strategies and altering internal processes to become a digital-first enterprise. This digital

change is inexorable and those enterprises that are unable to transform will lose out to those that are innovating.

The challenge is to shift from a legacy enterprise where on-premise rigidity, fixed assets, closed perimeters, and siloed

procedures dominate into a digital one that is distributed, heterogeneous, adaptable, agile, and permeable. This involves

opening up the enterprise to new platforms focused on connectivity and open access, dominated by cloud and mobile. These

new digital premises foster exchange, collaboration, and expansion in unprecedented ways for enterprises.

Inevitably, this new direction exposes previously closed or obscured parts of the enterprise. For this reason, information

security needs to evolve and adapt alongside a digital transformation, and, above all, enable rather than impede.

The maintenance of a trust infrastructure is paramount for business success, in any context. Specifically, within a digital

context, an enterprise’s vulnerability is more visibly exposed. Notably, its intellectual property, personally identifiable information,

financial assets, brand reputation, and convergence with operational technologies, functional safety, and human lives are

all vulnerable. In this changing context, implementing and managing trusted identities comprehensively is crucial: for

people, for processes, and for products.

In an open and dynamic environment, it is vital to maintain trust, without which even the best laid digital plans will

fail. In a legacy enterprise where IT is centralized and scaling is done vertically through monolithic systems,

security was centrally controlled. With the perimeter fading, new distributed endpoints emerging and the

consumerization of IT, there is a significant loss of this control.

Security needs to adapt to these new environments and this requires building it in at the point of

access to information and applications, wherever that point may be. The concept of

trusted identities is central to secure that access, and forms the foundation of a

secure digital business. Beyond that, a digital trust architecture can even open up new

opportunities and markets for enterprises.

TRUSTED IDENTITIES

SECURE

FRICTION-LESS

ENABLING

3TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Insight, Agility, and Trust: The 3 Pillars of Digital Business

To successfully embrace this digital revolution, it is important for enterprises to understand the implications of a digital

transformation, to be able to adapt and to ensure trust.

Insight is the first pillar. Being able to know what to change in order to compete in digital business is of chief importance.

This requires acknowledging changes within a target market and the way client demands are evolving. It is also about

understanding how competitors are positioning themselves and using insight to drive the transformation strategy.

INSIGHT

DIGITAL BUSINESS

AGILITY TRUST

Agility is the second pillar. Knowing how to change and be nimble from an IT perspective is crucial to implementing new

technologies that support business transformation. It means anticipating technology evolution and market changes ahead of

the curve in order to innovate and disrupt.

The final pillar is that of trust, which must be built into the digital business. Identity is key to that trust, and ensures all users,

processes, and products can be authenticated, authorized, and protected without introducing friction and frustration.

These three pillars form the core of digital business and enable enterprises to create new customer experiences and transform

product offerings.

4TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Transforming the User Experience

Tying in a customer experience to a digital platform is no easy task, as it requires making their interaction an equal balance

between physical and digital. The digital aspect has to become an intrinsic part of the transaction, almost indivisible from the

physical experience. Customer retention can then be consolidated through digital engagement. The value of building a digital

presence is in offering seamless access online and physically through a single omni-channel experience both securely, and

without friction.

It is necessary to enable this experience across all possible access points of the business: desktop or mobile (eventually

wearable), and leveraging these with the physical. This requires investment in expanded customer services, which can make

use of targeted advertising, customer profiling, purchase history, location-based information, and social network interactions,

among other options. In addition, such interaction means allowing the customer freedom to create content and personalize

their digital experience, and even sync it with digital experiences from other companies.

This increased client involvement means expanded digital devices and platforms being used, and new data being generated

and collected. Security considerations are consequently expanded and demand a new approach, one which often relies on

trust and identity.

Case Study: StarbucksStarbucks is one such enterprise which has flourished as a result of a successful digital transformation based on these

three pillars, growing both client base and share price. The coffeehouse chain had insight into how mobile and digital

cloud transform their business, to the extent that these tools have radically changed the way people experience coffee.

Starbucks was agile too in the way it deployed these technologies. The first step was offering free Internet access for

clients, and creating a place where people could work as well as socialize. Then the firm leveraged smartphones to en-

able Mobile Pay & Go, cutting down queues for clients and payment processing costs internally. By tying in its loyalty

program with the mobile platform, Starbucks managed to upsell and pitch new products in a more customized fashion

based on buying patterns. Finally, it provided trust for the clients by enabling clients to create identities through its digital

platform. Clients were able to talk about their Starbucks experience through social networks, access premium content

while in-store, and participate in creating new flavors through the My Starbucks Idea website. Starbucks tied these back

to its mobile payments platform, and enabled a digital identity for each client to interact with the firm.

“Starbucks Agenda for Global Growth and Social Impact.” Starbucks Newsroom. May 17, 2016.

5TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

The security challenges in this case study are two-fold. The first is guarding data and privacy against fraud or misuse. With

increased information about customer habits and movements, the ability to preserve privacy and ensure adequate protection

of personal data is critical. The second is one of ensuring secure multi-channel access and proper authentication mechanisms

across devices (mobile and web) and platforms (social networks, payment systems, loyalty programs, content providers).

It is crucial also that security address the issue of seamlessness. Passwords, for example, cause friction and offer poor secu-

rity against modern attacks. New solutions that make secure access as simple as touching or swiping a fingerprint provide a

smoother process, all the while ensuring the identity itself is not compromised.

6TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Transforming Products into Services

Internet connectivity, over-the-air updates, sensor-based monitoring and measurement: are all digital tools that provide added

value to legacy products and their supporting infrastructure. Their manufacturers have built out service-based systems that

can not only connect the company’s products, but potentially third-party products as well. By building a digital-first platform as

the primary offering, a product-based company can transform itself into a service-oriented one.

Digitally transforming a product or experience can provide a wealth of new information, such as product lifespan, customer

habits, and interactions with the environment or third-party products. A connected product can relay back information

on functioning and usage, record and measure new data, and the enterprise can act upon new variables, informing on new

designs or services. Knowing how a product is used in the field can help enterprises create value-added propositions around

that usage.

Of course, this information is only useful if the information gathered is reliable. If the product itself or the communications

channel is hijacked or tampered with, the value of that information is lost. Securing a trust framework is therefore a crucial

component of digital business. Trusted identities enable secure access control and authentication mechanisms to the smart

network and the interacting elements.

Not only does such a transformation reduce the planned obsolescence of a static product through more comprehensive

lifecycle management where services form the core of the offering, but by leveraging trusted identities, products can be

remotely upgraded, securely patched, and continuously managed over the course of commercial use. This is more than just

providing guarantees on the proper functioning of a product, but enabling added value after-market services.

Case Study: American StandardAmerican Standard is a heating and air conditioning manufacturer that is starting to pivot to a service-based model

for the smart home. The first step was connecting the HVAC appliances to a fully automated digital thermostat with

comprehensive controls for the home or business. The second step was connecting those smart thermostats to mobile

devices for the user to control, and to American Standard’s backend for servicing. The true digital transformation comes

with the service-based offering that is the Nexia Home Intelligence. This subscription-based offering allows monitoring

and control not just of HVAC devices, but also of lighting, cameras, and smart locks through either smartphones or a

7TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

web portal. The wireless capabilities are extended to enable a Z-Wave-based connection to more than 200 compatible

wireless home devices. With this new offering, American Standard is expanding from being a simple HVAC manufacturer

to offering much broader smart home management systems and associated services.

“The Move to Digital Transformation.” IDG Enterprise. March 17, 2016.

In this case study, an array of previously static, isolated products is transformed into intelligent devices operating on a smart

network. Their connectivity to the Internet, to smartphones, and to central management systems means that such products

become threat vectors in their own right. The imperative here is that the security mechanisms (such as authentication and

access control) must be deployed in order to protect against external agents. The appliances, their communications to the

network, the central management system, and the users accessing them must be tied together in an underlying security archi-

tecture, where only trusted identities can be legitimately allowed to function.

8TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

The Impact of Digital Business within the Enterprise

Adapting to digital both internally and externally needs to be guided by a

corporate strategy and supported by a plan of action, where security and

a trust framework are incorporated at inception. A digital transformation

strategy must be defined at the top and deployed comprehensively through-

out the enterprise. The ultimate driver must be the decision-making C-level

responsible for ensuring that a secure digital transformation becomes a

strategic imperative underscoring all the company’s goals and objectives.

MARKETING & SALES

SYNC WITH PRODUCT DEVELOPMENT (ALM, DEVOPS)

INTERACTION WITH CUSTOMER SERVICE AND SUCCESS TEAMS

SUPPLY CHAINAT THE HEART OF DIGITAL

Managed ServicesCloud Mobile

BROKER CONTROL OF IT OPERATIONS TO:

IT as a business enabler New tools, more collaboration

Development

Deployment

Operations Application Lifecycle Management ALMAgileDevOps

Development and Operations

Development

Deployment

OperationsDevOps

MARKETINGAND SALES

ALM

SuccessTeams

CustomerService

ACTIONABLE INFORMATION ON PRODUCT DEVELOPMENT + SALES AnalyticsData

IT DEPARTMENT

Action Plan, Success Metrics, Relevant Milestones

DEFINE CORPERATE DIGITAL STRATEGY FOR ALL COMPANY (GOALS + OBJECTIVES)

CXO (C-LEVEL)

9TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Transforming How We Work and Collaborate

Once the vision is in place and an action plan is developed, the strategy can be rolled out to the rest of the enterprise: IT ad-

ministration, product management, research and development, marketing and sales, customer support, and the supply chain.

Naturally, many of these new digital implementations need to provide a comprehensive and seamless experience for those

deploying it; which also must be in accord with the overarching corporate strategy. This is where automation and intelligent

systems play a central role. While each silo can micro-manage their tools and processes, they form a coherent part of the

overall digital architecture, ultimately enabling an intuitive functioning of previously disparate and unconnected divisions.

The corporate strategy should define how a secure digital transformation can be achieved company- wide, and include relevant

milestone and success metrics. Crucially, it needs to redefine the roles of various divisions, as a digital transformation means a

change not just in tools, but also in responsibilities.

IT ADMIN

For the IT administration, it means that they must move away from total management and delegate control of some of the

aspects, retaining the role of IT brokers. BYOD, cloud, and mobile apps have already taken control of some of these opera-

tions from admins and put it in the hands of employees. In a digital-first enterprise, IT sets the overall policy but can delegate

some of the micro-management to other users. Similarly, when employing DevOps, Application Lifecycle Management, or Agile

practices, IT admins will have to broker control of IT operations—including security—to these groups, but it can dictate the

overall IT strategy. Ideally, IT operations become a much more interactive process—essentially a business enabler helping the

business transform by leveraging new tools, and building new ways of servicing partners and customers. Admins will not be

able to retain total control over security, and therefore deploying a flexible trust infrastructure allows them to delegate some

of that security control to new digital security tools.

MARKETING AND SALES

With the advent of continuous lifecycle management, marketing and sales need to be in sync with product development and

management. With smart networks and connected products, they are able to better understand how clients are using products

and services, enabling them to create detailed profiles on each client and in time customize sales efforts for each individual use

case. Cloud apps and mobile tools have been key to unlocking such value for sales, making them more efficient and productive.

With such potential, marketing and sales can help inform the company’s overall strategy. This is especially important as a new

generation of users (i.e. millennials) use technology in radically different ways than the previous generation. Data and analytics

can provide actionable information not just to product development, but also to sales. Both silos can make use of the same

10TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

data streams to optimize the product, fine-tune delivery, and create and upsell new features, and effectively captivate the

customer.

However, these tools allow client insight into ever more confidential and sensitive data. Therefore, the implementation of a

trusted access environment for those making use of that data is necessary. A controlled and authenticated environment in

which sales can function is critical, requiring trusted identity and secure access to support it. Most importantly, security must

be frictionless, otherwise the value of these digital tools is lost completely.

SUPPLY CHAIN

One of the increasingly important elements of digital transformation is the supply chain, and this is where the trust infrastruc-

ture is critical. Enterprises need to keep in mind the ever-growing supply chain that comes with digital expansion, and the very

real threat vectors that they represent. More often than not, the supply chain is the weak link in digital business, and threat

actors have been highly successful in exploiting it.

Third-party service providers are at the heart of collaborative cloud platforms and mobile applications used within the digital

enterprise, and they unfortunately also provide a new point of entry for threats. Contractors and other supply chain players

are intrinsic to the integration of a new product or service offering that embraces the digital-first model. Consequently, trusted

identities and secure access must extend to them, and they need to be included in the overall digital strategy.

11TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Avoiding the Pitfalls

It is crucial to understand that a bottom-up approach cannot drive a successful enterprise-wide digital transformation.

Localized digital initiatives develop within existing siloes that are often impermeable and therefore do not extend naturally to

other domains. Instead, they are more liable to exclude and make operations much more complex, adding uncertainty and

eliminating any potential benefits that could be derived from digital adoption.

This is why most enterprises fail at fully completing a digital transformation. They are unable to concretely implement a

digital-first strategy from the top down and cannot reconcile legacy processes with newer digital enhancements. It is

not simply a matter of replacing legacy with digital. The reality is that both contexts will continue to exist concurrently. Digital

starts with enhancing existing infrastructures, and in time, the aim is to replace some of those legacy functionalities. This

means that in the interim, both need to be addressed equally by a corporate strategy, and they must be able to integrate with

each other.

This rings true also for security measures and the extension of a trust infrastructure. A “hybrid” security model needs to

span legacy enterprise apps and emerging cloud and mobile environments. Benefits ascribed to digital technologies,

such as innovation, cost reduction, and productivity cannot be fulfilled if they are not harmonized securely with the

legacy infrastructure.

12TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Focusing on Security

Critically, traditional security controls are no longer effective for digital business and the omission of adequate safeguards will

thwart any well-planned digital transformation. Next-generation security solutions are important to consider because they take

into consideration cloud and mobile and other emerging digital platforms that legacy platforms do not.

Cybersecurity, legacy, and next generation must be planned for in corporate digital strategies, forming a foundational element

alongside those of agility, business growth, competitiveness, and innovation. This will enable enterprises to accelerate their

digital transformation. As with other elements of change, transforming security to adapt with Business 2.0 means moving be-

yond just defensive and reactive safeguards to offensive and preemptive processes. With good security in place, enterprises

can more aggressively push toward becoming a true disrupter while minimizing the risk to the business. Above all, what is

needed, especially for the new cloud and mobile-centric architectures, is security at the point of use which can be delivered

with trusted identity and authentication for customers, employees, partners, and products.

Ultimately, security needs to be integral, adaptive, and responsive to the new digital ecosystem, but also continue to cater

to the legacy context. There are sunk costs that will not be easily discarded; nor should they. The difficulty is faced in how to

enable simple management of a complex technology in an increasingly heterogeneous environment. A framework of trusted

identities needs to be an intrinsic part of a cybersecurity fabric that is deployed throughout the enterprise, the supply chain,

and the client base.

13TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

What is Digital Trust?

The fundamental requirement, and the foremost security consideration, is trust. And because digital continues to evolve and

change rapidly, this trust exercise will happen frequently. Digital transformation is not just a one-time adaptation; it is a con-

stant evolution. Consequently, trust becomes a crucial concept, and it must start at the top before it can trickle down and take

root in all processes. Enabling digital trust allows enterprises to be bolder in trying to innovate and be first to market, and trying

to attain that leader position.

Unfortunately, the increasing visibility of cyberattacks and large-scale breaches erodes trust in digital, despite the fact that

many such attacks are in fact preventable. Enterprises and clients alike mistrust the ability of employees and organizations

to protect data in the face of growing cyberattacks. This state is compounded by the open nature of a digital transformation,

where many of the digital tools are created by third parties and hosted off-premise, and assets move in and out of the com-

pany’s perimeter, and therefore its control. Attacks coming through the supply chain are rife, and lend to this skepticism.

Despite this, digital technologies need to be trusted somehow in order for them to be used efficiently. This is where the

concept of digital trust emerges.

14TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

Trusted Identity as the Key to Digital Business Success

The foundational pillar of that trust lies in identity; whether that is of an employee, or a subcontractor, of a platform or an

application, of a device or an appliance. Digital trusted identities are the key to a successful digital transformation. Business 2.0

is enabled only by having a digital identity and authentication foundation in place.

Once an identity is trusted, other permissions can flow from it: authorization, access, control, management, etc. Moreover,

enterprises can re-invent processes to better serve customers. Many of the limitations in place today exist because digital

trust cannot be established. For example, limitations on withdrawing money at an ATM requires the customer to go personally

into the bank to withdraw more. Creating a digitally trusted identity can create a more seamless experience for the user, and

enable enterprises to improve productivity and cycle times, reduce costs, and develop a competitive advantage.

In fact, the concept of digital trust is changing the traditional identity and access management (IAM) discipline

into an identity relationship management one. The idea is not just to manage identities securely, but to do so as

efficiently as possible within the context of Business 2.0. The major difference with legacy IAM is that a vast number of

assets are now being included and they are as varied as they are numerous. Integrated, automated, and service-oriented

approaches will add to the difficulty of establishing identity, without forgetting the importance

of addressing both legacy and digital demands into new identity relationship management

systems. With a trusted identity, enterprises can be bold, but without it, they limit the business

potential and the level of innovation through newly introduced risks.

DIGITAL TRUST ARCHITECTURE

ACCESSTOOL

PROCESSESCTA

Analytics

ContentCreation

Data

Sensors

Connectivity

Automated

Interactive

DynamicPRODUCT

Alerting

Measurement

Patching

SERVICESControlUpdate

Management

PEOPLE

Client

Employee 3rd Party

Smart phone

Desktop

Web Cloud

TRUST

AUTHORIZATION

IDENTITY

With a trusted identity, enterprises can be bold, but without it, they limit the business potential and the level of inno-vation through newly introduced risks.

15TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

The feat seems herculean and yet it need not be. Digital trust and the underlying framework can be implemented

reasonably. Digital trust providers can help build that architecture and deploy it enterprise-wide, provisioning users,

streamlining and securing access to devices, apps, and sites. Next generation authentication solutions can help build that trust

into digital transformation, and ensure a frictionless user experience.

Future success, increased revenues, greater market share, and a leading competitive strategy can be achieved by ensuring

that digital trust forms an intrinsic part of an enterprise’s digital transformation strategy.

Entrust Datacard is one such enabler within the trust framework providing solutions help secure the move to cloud,

mobile, and IoT. Serving the world’s most demanding organizations for over two decades, their trusted identity solu-

tions include a comprehensive suite of advanced authentication and identity analytics that leverage mobile and cloud to

address the needs of today’s digital business demands. Most importantly, Entrust Datacard provides that vital cover-

age of both legacy and digital, allowing for comprehensive integration between the two. Whether an enterprise wants to

avail itself of a traditional on-premise deployment, a virtual appliance, or cloud service, Entrust Datacard offers the

ability to build an all-inclusive trust framework. Their goal is to cater to a wide range of use cases, whether internally or

B2X. This means the Entrust Datacard authentication solutions are able to evolve alongside an enterprise’s digital trans-

formation. In addition, Entrust Datacard ensures that the trust architecture can be managed seamlessly, despite the

increasing complexity that may result from digital change.

Fundamentally, Entrust Datacard secures digital identities in an ever-changing corporate environment. This prerequisite is

the foundation of digital trust, upon which visibility and transparency can be established, and from which a successful digital

transformation can be launched.

16TRUSTED IDENTITIES – AN IMPERATIVE FOR DIGITAL TRANSFORMATIONwww.abiresearch.com

www.abiresearch.com

Published January 18, 2017©2017 ABI Research

249 South Street

Oyster Bay, New York 11771 USA

Tel: +1 516-624-2500

www.abiresearch.com

Entrust Datacard, Entrust, the hexagon, and Trusted Identities Secure Transactions are trademarks, registered trademarks and/or service marks of Entrust Datacard Corporation in the United States and/or other countries.

© 2017 ABI Research • abiresearch.com • No part of this document may be reproduced, recorded, photocopied, entered into a spreadsheet or information storage and/or retrieval system of any kind by any means, electronic, mechanical, or otherwise without the expressed written permission of the publisher.

Exceptions: Government data and other data obtained from public sources found in this report are not protected by copyright or intellectual property claims. The owners of this data may or may not be so noted where this data appears.

Electronic intellectual property licenses are available for site use. Please call ABI Research to find out about a site license.