ensuring security and privacycrc.gov.mn/file/newfile/tmw21558...

23
ENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Upload: others

Post on 09-Jun-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

ENSURING SECURITY AND PRIVACYData Permissions are the Key to Data Monetization

Page 2: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

The Answer Slide…

1/29/2014 2

Data

Discovery

Data

Analysis

Data

Analytics

Data

Mining

Data

Science

VERTICAWarehouse

DB

Analytics

DBBig Data

HADOOP HDFS

MR HBase HIVE PIGIMPALA

ETL

ELT

Ratings, Score, Weights Mining DB

Structured

Unstructured

Load Files

Web Logs

Marketing

Mobile

Campaign

CRM

OLAP

ENGINE/DB

REPORTING

Web LogsWeb Logs

Web LogsOps Logs

Log Management

Web LogsNOSQL

High Read/Write

SQOOPTransactional (ACID)

SQL SQL

SQL SQL

High Speed User

Profile Data Store

Web Logs

Applications

Identity Broker

• Unifies Common User Profile

• Authentication/Authorization

• Attribute Filtering/Mapping

• Policy Enforcement

Middle Tier

Service Layer

Real-Time

Bi-Directional

Data Sync

Profile/Privacy

Reports

Dashboards

Data

Sources

Cache

Big Data

Layer

Transactional

Data Layer

Application

Service Layer

Page 3: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

IT Mega Trends

Broadband EverywhereNumber of Internet Connected devices capable of generating data about you are growing

linearly

Web 2.0Number of “sticky” services

accessing data from your devices are growing

geometrically

Smart TransactionsWith NFC/Smart Wallet

technologies, the number of services accessing data from your

devices grows geometrically as new services become available

Sensor ProliferationThe number of ambient

systems capable of generating data about you are growing

geometrically

Big DataThe capability of real-time analytics based on tracking

data from multiple sources is growing exponentially

1/29/2014 3

Page 4: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

IT Mega Trends

Broadband EverywhereNumber of Internet Connected devices capable of generating data about you are growing

linearly

Web 2.0Number of “sticky” services

accessing data from your devices are growing

geometrically

Smart TransactionsWith NFC/Smart Wallet

technologies, the number of services accessing data from your

devices grows geometrically as new services become available

Sensor ProliferationThe number of ambient

systems capable of generating data about you are growing

geometrically

Big DataThe capability of real-time analytics based on tracking

data from multiple sources is growing exponentially

Customer Identity EraCustomer knowledge is drawn

from everywhere, created centrally, and shared across the

entire enterprise

1/29/2014 4

Page 5: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

The New Customer Identity Mega Trend

1/29/2014

Acquire, Engage,

Monetize

Earned

Identity

Data is the

CurrencyConsumer

Identity

Customer knowledge is drawn from everywhere, created

centrally, and shared across the entire enterprise, so all

stakeholders can act upon it and measure the results.-Jody Sarno, Forrester

Page 6: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Why Customer Identity?

6

Fortune 1000

Employees

62 million IDs

$4B market

Facebook

Users

1 billion IDs

Mobile

Subscribers

6.8 billion IDs

Citizens

7.0 billion

Consumer

Identity

100+ billion IDs

The amount of data about a

customer is growing

exponentially, far faster than the

number of customers.-Shoaff’s Law of Identity Data

1/29/2014

Page 7: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Customer Identity Data is Valuable

1/29/2014 7

• Increased Engagement through

Personalization

– Grow ARPU

• Enhanced Cross-sell and Up-sell

– Remove registration barriers

• Higher Ad Revenue through

consented and confirmed data

– Permission to use data that is

validated correct by the customer

• Data products sold to partners

– Real-time access to proofed,

consented and validated data

“Increasing the control

that individuals have over

the manner in which their

personal data is collected,

managed and shared will

spur a host of new

services and

applications…”

“Individuals will benefit to

an even greater degree, as

the consumer value will

be more than twice as

large: €670 billion by

2020.”

Page 8: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

The Value Growth of Customer Data

1/29/2014 8

A

n

o

n

y

m

o

u

s

D

a

t

a

A

n

o

n

y

m

o

u

s

D

a

t

a

S

o

c

i

a

l

D

a

t

a

S

o

c

i

a

l

D

a

t

a

C

u

s

t

o

m

e

r

I

n

f

l

u

e

n

c

C

u

s

t

o

m

e

r

I

n

f

l

u

e

n

c

Page 9: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

What You Need to Recognize this Value

1/29/2014 9

Identity Etiquette Identity Architecture

Page 10: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

What is Identity Etiquette?

Identity Etiquette is a way to create deeper, more meaningful

customer relationships.

What it Requires:

�Comprehensive internal policies

�Thoughtful management of how customer data is collected and secured

�Responsible use of customer data

It means offering customers transparency, choice and control.

1/29/2014 10

Page 11: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Top 5 Ways to Show Identity Etiquette

1/29/2014 11

Ask what you can shareAsk what you can share

Give customers value for their dataGive customers value for their data

Promise to keep customer data safe – and do soPromise to keep customer data safe – and do so

Allow customers to update data

or revoke the right to use it

Allow customers to update data

or revoke the right to use it

Be upfront about who you share data with or sell toBe upfront about who you share data with or sell to

Page 12: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Customer Identity Architecture: What’s Missing?

1/29/2014 12

CRM / CXCRM / CX

Big DataBig Data

IAMIAM

MDMMDM

Support,

Service,

Customer

Experience

Golden

Record,

Back-Office

Analysis,

& Archive,

Mining &

Monetization

Authentication

& Authorization

Page 13: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Customer Identity Hub: The Missing Piece

1/29/2014 13

CRM / CXCRM / CX

Big DataBig Data

IAMIAM

MDMMDM

Support,

Service,

Customer

Experience

Golden

Record,

Back-Office

Analysis,

& Archive,

Mining &

Monetization

Authentication

& Authorization

Customer

Identity Hub• Common Profile

• Common Identity

Functions

Customer

Identity Hub• Common Profile

• Common Identity

Functions

Page 14: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Customer Identity Hub

1/29/2014 14

Common Identity Credentials

Common Authentication System

Common Customer Profile

Social & Proofed Data in Customer Profile

Customer Consent to use Profile Data

0.07 0.13

23.53

39.89

05

1015202530354045

€ Value of Data

Value of

Data

Page 15: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Customer Identity Lifecycle

1/29/2014

Create End-of-Life

Augment

ValidateLeverage

Consumer Consumer

Profile

• Manual Self Registration

• Automated Creation

• 3rd Party or Social Login

• Account Recovery• Manual Self Validation

• Identity Proofing & Assurance

• Identity Linking• Policy & Consent Enforcement

• Identity Provider

• Authentication

• Delegated Authorization

• Profile Usage Reporting & Audit

• Manual Self Deletion

• Automated Deletion

• End-of-Life Policy Enforcement

• Profile Archival

• Manual Self Update

• Automated Update

• Analytics Driven Inferred Attributes

• Profile Unification

• Multi-Persona

• User Consent Capture

15

Making It Easy for Organizations

to Develop & Deliver Services

Leveraging Identity Data

Page 16: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved1/29/2014 16

Name Phone Income

Alice 555-1111 40,000

Bob 555-2222 50,000

Dan 555-4444 70,000

Name Age History

Alice 24 Clothes

Bob 34 Wine

Carol 44 Books

Dan 54 Music

Ed 64 Electronics

Name A P I H

Alice 24 ~ ~ Cl…

Bob 34 ~ ~ Wi…

Carol 44 ~ ~ Bo…

Dan 54 ~ ~ Mu…

Ed 64 ~ ~ El…

Name A P I H

Alice

Bob

Carol

Dan

Ed

Consumer’s Consent

Corporate Policy Rules

Regulatory Rules

User’s or System’s Authorization

1. Unified Profile 2. Filtered Data View

3. Result Sent to Client

Choice, Policy, Unification, Authorization

Page 17: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Big Data Architecture – Leveraging Enterprise data

1/29/2014 17

Data

Discovery

Data

Analysis

Data

Analytics

Data

Mining

Data

Science

VERTICAWarehouse

DB

Analytics

DBBig Data

HADOOP HDFS

MR HBase HIVE PIGIMPALA

ETL

ELT

Ratings, Score, Weights Mining DB

Structured

Unstructured

Load Files

Web Logs

Marketing

Mobile

Campaign

CRM

OLAP

ENGINE/DB

REPORTING

Web LogsWeb Logs

Web LogsOps Logs

Log Management

Web LogsNOSQL

High Read/Write

SQOOPTransactional (ACID)

SQL SQL

SQL SQL

High Speed User

Profile Data Store

Web Logs

Applications

Identity Broker

• Unifies Common User Profile

• Authentication/Authorization

• Attribute Filtering/Mapping

• Policy Enforcement

Middle Tier

Service Layer

Real-Time

Bi-Directional

Data Sync

Profile/Privacy

Reports

Dashboards

Data

Sources

Cache

Big Data

Layer

Transactional

Data Layer

Application

Service Layer

Page 18: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Data Caching Service unlocks value of Enterprise data

1/29/2014

Slow, inflexible legacy silos High-speed, read/write-thru data cacheEnterprise data is fragmented across multiple

application-specific silos and unable to meet real-time

demands

Enterprise data is consolidated into a single high-

speed caching service that can be reused across

applications

Firewall

33rd-party

Services

Network & IT

ApplicationsApp

a

App

Dat

a

RDBMSLDAP

Web

ServicesOther

RDBMS

Protocol Layer (REST, SOAP, LDAP)

Integration Layer

OA&M Security

Policy Layer

Key/Value Data Store

LDAPWeb

ServicesOther

Firewall

33rd-party

ServicesNetwork & IT

Applications

App

Data

18

Page 19: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Subscriber Data Caching Service Architecture

1/29/2014

RDBMSData Sources

Read/Write-Through

Data Cache

Protocol Layer (REST, SOAP, LDAP)

Integration Layer

OA&M Security

Policy Layer

Key/Value Data Store

LDAPWeb

Services

Web

ServicesOther

Firewall

3rd party

Services

3rd-party

ServicesApplication Tier

Network &

Applications

Network &

IT

Applications

Data

App

Data

19

Page 20: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Data Layer

Making “Big Data” Actionable in Real Time

1/29/2014

AnalyticsAnalytics

HadoopHadoopNetworkNetwork

NetworkNetwork

NetworkNetwork

BIBI

QoSQoS Anonymized

Data

Anonymized

Data

Network

Shaping

Network

Shaping

Predictive

Analysis

Predictive

Analysis

BIG DATA ACTIONABLE DATA

UnboundID Real-time

Enterprise Data Store

AnalyticsAnalytics

BillingBilling CRMCRM

PCRFPCRF

Loyalty

App

Loyalty

AppPersonalized

Services

Personalized

ServicesTargeted

Offers

Targeted

Offers

Transparency,

Choice, and

Control of PII

Instant Delivery

20

Page 21: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Business Benefits

•Faster application time to market

•Reduced cost and integration time

•Monetize subscriber intelligence

• Increase innovation possibilities

•Data currency & consistency

•Data re-use

•Flexibility to add/remove sources

1/29/2014 21

Page 22: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

Copyright 2014. UnboundID Confidential — All Rights Reserved

Questions?

1/29/2014 22

Page 23: ENSURING SECURITY AND PRIVACYcrc.gov.mn/file/newfile/TMW21558 M_Stawinski,_S_Shoaff_final.pdfENSURING SECURITY AND PRIVACY Data Permissions are the Key to Data Monetization

UnboundID is a leading platform provider for identity data enabling companies to

dynamically manage, protect, and share real-time customer identity data across cloud,

mobile and social applications. Our solutions help companies provide cross-organizational

visibility into individual customer value, preferences and desires over time while

delivering the assurance that companies and their customers need to share and manage

identity data in secure and open environments. Ultimately, UnboundID helps companies

maximize average revenue per customer by responding to changing identities over their

lifetime.

For more information, see www.unboundid.com.