Brought to you by
INTERNAL VS. EXTERNAL IAM:
Strategies to Develop an End-to-End
Customer Data Management
Framework
GIGYA.COM | 2
Long ago, companies recognized the importance of effectively managing employee identities, data and
permissions to help streamline company processes and protect valuable business assets.
Over the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has
created the need for businesses to develop an external identity access management (IAM) strategy to
keep up with the flood of identity data being created as consumers connect across channels.
54 percent of companies have difficulty managing and integrating data from today’s
many varied sources, while 50 percent are concerned about consistent data quality
(DestinationCRM).
The Rise of External IAM
GIGYA.COM |
IAM vs CIAM
Unprepared for and unfamiliar with the challenges of external identity management, many businesses
have attempted to scale internal IAM solutions for external identity management purposes.
But successfully capturing, protecting and leveraging customer identity data requires a whole new set
of tools and technologies built for the customer identity access management (CIAM) era.
We’ve broken down the key differences between traditional IAM and cIAM and the steps you can take
to optimize your external strategy into 3 buckets:
Scalability & Security
Data Collection & Aggregation
Privacy & Compliance
3
SCALABILITY & SECURITY
GIGYA.COM |
100 x 100,000
5
BOTTOM LINE:
External IAM software must be highly scalable with the ability to effectively store
and manage millions of consumer identities at once.
The #1 reason why businesses attempting to leverage internal IAM solutions for external purposes fail is
simple: sheer scale. While companies typically manage tens, hundreds, or at most thousands of employee
identities, the number of customer identities can range well into the billions.
GIGYA.COM | 6
When it comes to employee identity and data created within internal applications, ownership indisputably
belongs to the business. However, customer identities created across sites and applications ultimately
belong to consumers.
But while brands must gain permission to capture and collect consumer identity data, once a customer is
on a business’ property and her information is stored in its database, that business is responsible for
protecting her. This gives way to a whole other management issue: security.
Account Ownership
GIGYA.COM | 7
11% of US adults admit to having abandoned an online purchase
because the site asked for too much information (Forrester).
Protecting identity from an internal standpoint is somewhat straightforward, as your business has the power to
enforce certain protocol to help safeguard business and employee information. But customers are consistently
creating new identities and reusing usernames and passwords across millions of unknown properties.
While requiring users to fill in CAPTCHA, select 3 security questions and verify the last 4 digits of their social
security numbers is one way to help guarantee security on your site, it’s certainly not the most practical.
Usability vs. Security
Businesses must put the proper framework in place to provide customers with a positive, seamless user
experience, while still maintaining security standards from both a data collection and storage perspective.
GIGYA.COM | 8
On average, Gigya Social Login clients increase registration
conversion rates by 32.3%, with clients like Forbes gaining
as much as a 90% increase.
Implementing social login across your web properties is one strategy for
bridging the gap between usability and security. Social login gives
consumers the ability to verify their identities with the click of a button using
their existing social media accounts, increasing registration conversion rates
by as much as 90%.
Social Login as a Solution
Social login also shifts the burden of identity protection, data security and sign-
in support to major networks like Facebook and Google. These social identity
providers boast state-of-the-art security systems with features like multi-factor
authentication, remote logout and unauthorized activity detection.
GIGYA.COM | 9
To improve company security and employee convenience, many
businesses leverage single sign-on (SSO), which allows
employees to move seamlessly across internal applications by
tying all activity to a single, known username and password. As
web-based services and applications multiply, SSO is gaining
momentum across customer-facing properties as well.
Internal federation is typically delivered as an on-premise solution
for internal enterprise applications using SAML standard. In
contrast, external IAM solutions must bundle together internal and
external applications and properties, which often requires a
variation of SSO standards including OAuth, OpenID and SAML.
When it comes to CIAM, it’s important to adopt software that gives
you the flexibility to choose the SSO standard that meets your
business’ user experience and security needs.
Federating Identity
DATA COLLECTION & AGGREGATION
GIGYA.COM | 11
As a general rule, company
and employee data is treated
as a liability, with internal IAM
solutions primarily seeking to
secure this information. While
external identity must also be
protected, consumer data has
quickly become every
business’ biggest asset - and
there is a LOT of it.
Over 2.5 exabytes of data are
created every single day
(HBR), and more than 90% of
this “big data” is unstructured
(BusinessInsider).
Identity Data = Pure Gold
TODAY’S DATA GOLDMINE
GIGYA.COM | 12
Internal data is traditionally structured and
controlled, with your business defining the
necessary fixed fields and models. But with
such a huge volume of data and number of
sources, capturing and storing external,
unstructured data in an accurate and
organized manner can be a nightmare.
What happens when a new social network
arrives on the scene? Or customers begin
sharing new types of content? Unstructured
data sources and points like these require
major database updates that cost your
business serious development time and
resources.
Big Data, Bigger Challenge
WHERE DOES BIG DATA COME FROM?
(IBM)
GIGYA.COM | 13
Businesses cite the inability to automate
structured and unstructured data quickly
and effectively among their biggest
challenges, with 60% noting that big data
projects typically take at least 18 months to
complete (Kapow Software).
CIAM calls for a dynamic database with the
ability to effectively normalize data from
disparate sources in real-time. This database
must have the power to reconcile both
structured and unstructured data without the
need to preconfigure database fields.
Data Normalization
GIGYA.COM | 14
With data pouring in across digital, mobile and social channels, it can often get caught in disparate silos
across the organization. This, of course, results in a completely disjointed and disorganized view of your
customer base and individual consumer identities.
A recent Aberdeen study found that 4 in 10 companies say that data remains “siloed” and inaccessible for
analysis. Ultimately, less than ¼ of the information that companies control is even available for extracting
insights (WSJ).
Data Here, There, and Everywhere
GIGYA.COM | 15
While capturing customer identity via solutions like social
login is the first step to unifying individual customer actions
and behaviors across channels, this data is virtually
useless if it is not aggregated into a single repository of
truth.
Ensure that your master database has the ability to directly
integrate and bidirectionally synch with existing business
systems and third-party marketing platforms.
This means selecting a solution equipped to handle and
automatically index any type of data thrown your way,
including social, transactional, behavioral, and much more.
Break Down Data Silos
GIGYA.COM | 16
Establishing a “single repository of truth” is the foundation of an effective CIAM strategy. Of equal importance
is ensuring that this repository is structured in a way that empowers business leaders across the organization
to take action on the goldmine of data housed inside.
Data In, Data Out
93% of executives believe their organization is losing an average of 14% of annual
revenue without the ability to act on the customer data they collect (Oracle).
GIGYA.COM | 17
Improve business agility with a database that seamlessly connects to a corresponding web-based dashboard,
and gives business leaders an actionable view of end-user data based on roles and permissions.
This allows non-technical decision makers to run complex queries based on any number of indexed attributes,
build custom audience segments with no code required, and save and export key reports.
By providing those on the frontlines of your business with the ability to extract and harness the economic value
of customer identity, you save valuable IT time and resources while improving the timeliness and efficacy of
business-wide operations.
Turning Data into Action
PRIVACY & COMPLIANCE
GIGYA.COM |
Privacy, Please
While internal data privacy is managed centrally and based primarily on policies put into place by the
business itself, external data privacy is much messier.
When it comes to managing customer identities and data, your business must adhere to the privacy
policies created by countless lawmakers and third-party identity providers. This list of regulations is
exhaustive and constantly evolving, with current policies including:
Electronic Communications Policy Act
European Union Directive
Fair Credit Reporting Act
Federal Trade Commission Act
Payment Card Industry Data Security Standard
19
GIGYA.COM |
Keeping Up with Compliance
Gartner predicts that by the end of 2015, 50% of new
retail customer identities will be based on consumers’
social network profiles, compared to just 5% in 2013.
Social login is quickly becoming the preferred method of
authentication for customers, which means a big
challenge for IT execs trying to keep up with ever-
changing social network data privacy policies.
As you begin to incorporate registration systems and
social login across your external facing sites and apps,
make sure that you choose a provider that can take on
the burden of managing these privacy updates. Look for
solutions that provide automatic, real-time API updates to
reflect policy and account changes, such as auto-
deletion of non-basic account information when
application permissions are revoked.
20
GIGYA.COM | 21
As we mentioned earlier, CIAM also raises the issue of data ownership. Internal identities are created by the
business, and when an employee creates data during work hours, on a business-owned device or within a
company application, this data belongs to that business.
However, as a customer moves across the Internet on an owned device leveraging services and applications
for personal use, this data belongs to her, and any business looking to access said data should do so in a
transparent and permission-based manner.
Data Ownership
DID YOU KNOW?
71% of consumers state that they are very concerned about online companies
selling or sharing information about them without their permission (Consumer
Reports).
GIGYA.COM | 22
Be sure that your business’ data collection process is completely transparent. No matter the method you
choose, let customers know upfront that you are looking to access their identities and specific data points.
The Power of Permission
Provide your customers the option to
authorize or opt-out of these requests,
and give them the power to view and
update privacy settings at any time via
straightforward user management
controls.
Building your CIAM process on
transparent data collection practices
ensures that your business is upholding
the highest standards of data governance
and leveraging only the highest quality
data.
ABOUT GIGYA
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning
unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations
and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products
and experiences by integrating data into marketing and service applications.
Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern
marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable
registration, authentication, profile management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven
relationships and to provide scalable, secure Customer Identity Management.
For more details about Gigya, visit www.gigya.com.
© 2014 Gigya Incorporated. All rights reserved.
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the
United States and/or other countries. All other trademarks are the property of their respective owners.
Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients
and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client
granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its
clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.
To learn how Gigya can help provide you with the tools and technology needed to develop a successful
CIAM strategy, visit gigya.com or call us at 888.660.1469.

More Related Content

PDF
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
PDF
White Paper: A Marketer's Guide to TV Everywhere
PDF
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
PDF
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
PDF
Data Sheet: IAM vs. CIAM: A Simple Choice
PDF
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
PDF
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
PDF
Internal vs. external identity access management
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: A Marketer's Guide to TV Everywhere
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
Data Sheet: IAM vs. CIAM: A Simple Choice
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
Internal vs. external identity access management

What's hot (19)

PDF
White Paper: The 2015 State of Consumer Privacy & Personalization
PDF
Connect, Collect, Convert
PPTX
Cloud identity access management market
PDF
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
PDF
White Paper: Saml as an SSO Standard for Customer Identity Management
PDF
Data Sheet: Why Your eCommerce Platform Needs CIAM
PDF
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
PDF
Data Sheet: Why Gigya's IDX Marketplace
PPTX
2016 04-26 webinar - consumer-focused identity management
PDF
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
PDF
The Marketer's Guide to Social ROI
PPT
Mid Term Exam
PDF
The Internet of Things: A Prime Opportunity for Merchant Acquirers
PDF
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
PDF
2014 phillyForce keynote
PDF
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
PDF
2019 Digital Trends Financial Services
PDF
2011 120211 Gartner Predictions 253709
PDF
Whitepaper: Identity Relationship Management - Happiest Minds
White Paper: The 2015 State of Consumer Privacy & Personalization
Connect, Collect, Convert
Cloud identity access management market
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
White Paper: Saml as an SSO Standard for Customer Identity Management
Data Sheet: Why Your eCommerce Platform Needs CIAM
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
Data Sheet: Why Gigya's IDX Marketplace
2016 04-26 webinar - consumer-focused identity management
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
The Marketer's Guide to Social ROI
Mid Term Exam
The Internet of Things: A Prime Opportunity for Merchant Acquirers
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
2014 phillyForce keynote
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
2019 Digital Trends Financial Services
2011 120211 Gartner Predictions 253709
Whitepaper: Identity Relationship Management - Happiest Minds
Ad

Viewers also liked (14)

PDF
White Paper: The 2015 State of Consumer Privacy & Personalization
PDF
Inside/Outside - the winchester housing challenge
DOC
Understanding Your Business
PPTX
APIs, Identity, and Analytics To Fuel Digital Business Innovation
PDF
Ahmed Al Barrak - Staff information security practices - a latent threat
PDF
Digital Fuel & Forrester Cloud Computing IT Financial Management
PDF
Ndh group+intacct cloud-financial-management-you-can-count-on
PDF
Access Management for Cloud and Mobile
PPTX
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
PDF
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
PDF
Identity as a Managed Cloud Service
PDF
Paradigmo specialised in Identity & Access Management
PPTX
Privacy & Data Protection
PPTX
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
White Paper: The 2015 State of Consumer Privacy & Personalization
Inside/Outside - the winchester housing challenge
Understanding Your Business
APIs, Identity, and Analytics To Fuel Digital Business Innovation
Ahmed Al Barrak - Staff information security practices - a latent threat
Digital Fuel & Forrester Cloud Computing IT Financial Management
Ndh group+intacct cloud-financial-management-you-can-count-on
Access Management for Cloud and Mobile
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Identity as a Managed Cloud Service
Paradigmo specialised in Identity & Access Management
Privacy & Data Protection
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
Ad

Similar to White Paper: Internal vs. External Identity Access Management (20)

PDF
Building a Robust Cloud CIAM Framework: A Detailed Checklist
PDF
Essential CIAM Strategies for Cloud-Based Identity Management
PDF
Cloud CIAM Strategy: An Essential Identity Checklist
PDF
Essential Identity Checklist for CIAM in the Cloud By LoginRadius
PDF
Strategizing CIAM in the Cloud: A Comprehensive Identity Checklist
PDF
LoginRadius Checklist for Cloud-Based CIAM Strategy Success
PDF
Enhancing Web Scraping Services with Data Analytics and Brand Monitoring.pdf
PDF
LoginRadius Consumer Digital Identity Trends Report
PDF
White Paper: DIY vs CIAM
PDF
Is Your Customer Data Integration in USA Ready for the AI Era .pdf
PDF
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
PDF
LoginRadius Presents the 2024 Consumer Digital Identity Trends
PDF
White Paper - Connect, Collect, Convert
PDF
Big Data is Here for Financial Services White Paper
PDF
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
PDF
Customer IAM vs Employee IAM (Legacy IAM)
PDF
How Insurers Can Tame Data to Drive Innovation
DOCX
Maintain data privacy during software development
PDF
Modernizing Insurance Data to Drive Intelligent Decisions
PDF
AI and Data Privacy in 2025: Global Trends
Building a Robust Cloud CIAM Framework: A Detailed Checklist
Essential CIAM Strategies for Cloud-Based Identity Management
Cloud CIAM Strategy: An Essential Identity Checklist
Essential Identity Checklist for CIAM in the Cloud By LoginRadius
Strategizing CIAM in the Cloud: A Comprehensive Identity Checklist
LoginRadius Checklist for Cloud-Based CIAM Strategy Success
Enhancing Web Scraping Services with Data Analytics and Brand Monitoring.pdf
LoginRadius Consumer Digital Identity Trends Report
White Paper: DIY vs CIAM
Is Your Customer Data Integration in USA Ready for the AI Era .pdf
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
LoginRadius Presents the 2024 Consumer Digital Identity Trends
White Paper - Connect, Collect, Convert
Big Data is Here for Financial Services White Paper
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Customer IAM vs Employee IAM (Legacy IAM)
How Insurers Can Tame Data to Drive Innovation
Maintain data privacy during software development
Modernizing Insurance Data to Drive Intelligent Decisions
AI and Data Privacy in 2025: Global Trends

More from Gigya (20)

PDF
White Paper: Gigya's Information Security and Data Privacy Practices
PDF
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
PDF
Gigya's China Data Center - Data Sheet
PDF
The Chutes and Ladders of Customer Identity
PDF
Data Sheet: Gigya and Global Regulatory Compliance
PDF
White Paper: 2017 Predictions - French
PDF
White Paper: 2017 Predictions - German
PDF
Case study - American Kennel Club
PDF
Data Sheet: Corporate Overview
PDF
Gigya Infographic - Death Of A Password
PDF
GDPR Implications Customer Identity Management - German
PDF
White Paper: Managing consumer data privacy with Gigya (German)
PDF
White Paper: Managing consumer data privacy with Gigya (French)
PDF
Case Study: International CPG Company
PDF
Case Study: Travel and Hospitality Company
PDF
Case Study: Enterprise Media Company
PDF
Case Study: Large Enterprise eCommerce Company
PDF
Gigya Corporate Overview - French Edition
PDF
Managing Consumer Data Privacy
PDF
Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya's China Data Center - Data Sheet
The Chutes and Ladders of Customer Identity
Data Sheet: Gigya and Global Regulatory Compliance
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - German
Case study - American Kennel Club
Data Sheet: Corporate Overview
Gigya Infographic - Death Of A Password
GDPR Implications Customer Identity Management - German
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (French)
Case Study: International CPG Company
Case Study: Travel and Hospitality Company
Case Study: Enterprise Media Company
Case Study: Large Enterprise eCommerce Company
Gigya Corporate Overview - French Edition
Managing Consumer Data Privacy
Information Security and Data Privacy Practices

Recently uploaded (20)

PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Modernising the Digital Integration Hub
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
STKI Israel Market Study 2025 version august
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
The various Industrial Revolutions .pptx
2018-HIPAA-Renewal-Training for executives
Flame analysis and combustion estimation using large language and vision assi...
Modernising the Digital Integration Hub
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Enhancing plagiarism detection using data pre-processing and machine learning...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Final SEM Unit 1 for mit wpu at pune .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
STKI Israel Market Study 2025 version august
The influence of sentiment analysis in enhancing early warning system model f...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Developing a website for English-speaking practice to English as a foreign la...
1 - Historical Antecedents, Social Consideration.pdf
Geologic Time for studying geology for geologist
Improvisation in detection of pomegranate leaf disease using transfer learni...
The various Industrial Revolutions .pptx

White Paper: Internal vs. External Identity Access Management

  • 1. Brought to you by INTERNAL VS. EXTERNAL IAM: Strategies to Develop an End-to-End Customer Data Management Framework
  • 2. GIGYA.COM | 2 Long ago, companies recognized the importance of effectively managing employee identities, data and permissions to help streamline company processes and protect valuable business assets. Over the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has created the need for businesses to develop an external identity access management (IAM) strategy to keep up with the flood of identity data being created as consumers connect across channels. 54 percent of companies have difficulty managing and integrating data from today’s many varied sources, while 50 percent are concerned about consistent data quality (DestinationCRM). The Rise of External IAM
  • 3. GIGYA.COM | IAM vs CIAM Unprepared for and unfamiliar with the challenges of external identity management, many businesses have attempted to scale internal IAM solutions for external identity management purposes. But successfully capturing, protecting and leveraging customer identity data requires a whole new set of tools and technologies built for the customer identity access management (CIAM) era. We’ve broken down the key differences between traditional IAM and cIAM and the steps you can take to optimize your external strategy into 3 buckets: Scalability & Security Data Collection & Aggregation Privacy & Compliance 3
  • 5. GIGYA.COM | 100 x 100,000 5 BOTTOM LINE: External IAM software must be highly scalable with the ability to effectively store and manage millions of consumer identities at once. The #1 reason why businesses attempting to leverage internal IAM solutions for external purposes fail is simple: sheer scale. While companies typically manage tens, hundreds, or at most thousands of employee identities, the number of customer identities can range well into the billions.
  • 6. GIGYA.COM | 6 When it comes to employee identity and data created within internal applications, ownership indisputably belongs to the business. However, customer identities created across sites and applications ultimately belong to consumers. But while brands must gain permission to capture and collect consumer identity data, once a customer is on a business’ property and her information is stored in its database, that business is responsible for protecting her. This gives way to a whole other management issue: security. Account Ownership
  • 7. GIGYA.COM | 7 11% of US adults admit to having abandoned an online purchase because the site asked for too much information (Forrester). Protecting identity from an internal standpoint is somewhat straightforward, as your business has the power to enforce certain protocol to help safeguard business and employee information. But customers are consistently creating new identities and reusing usernames and passwords across millions of unknown properties. While requiring users to fill in CAPTCHA, select 3 security questions and verify the last 4 digits of their social security numbers is one way to help guarantee security on your site, it’s certainly not the most practical. Usability vs. Security Businesses must put the proper framework in place to provide customers with a positive, seamless user experience, while still maintaining security standards from both a data collection and storage perspective.
  • 8. GIGYA.COM | 8 On average, Gigya Social Login clients increase registration conversion rates by 32.3%, with clients like Forbes gaining as much as a 90% increase. Implementing social login across your web properties is one strategy for bridging the gap between usability and security. Social login gives consumers the ability to verify their identities with the click of a button using their existing social media accounts, increasing registration conversion rates by as much as 90%. Social Login as a Solution Social login also shifts the burden of identity protection, data security and sign- in support to major networks like Facebook and Google. These social identity providers boast state-of-the-art security systems with features like multi-factor authentication, remote logout and unauthorized activity detection.
  • 9. GIGYA.COM | 9 To improve company security and employee convenience, many businesses leverage single sign-on (SSO), which allows employees to move seamlessly across internal applications by tying all activity to a single, known username and password. As web-based services and applications multiply, SSO is gaining momentum across customer-facing properties as well. Internal federation is typically delivered as an on-premise solution for internal enterprise applications using SAML standard. In contrast, external IAM solutions must bundle together internal and external applications and properties, which often requires a variation of SSO standards including OAuth, OpenID and SAML. When it comes to CIAM, it’s important to adopt software that gives you the flexibility to choose the SSO standard that meets your business’ user experience and security needs. Federating Identity
  • 10. DATA COLLECTION & AGGREGATION
  • 11. GIGYA.COM | 11 As a general rule, company and employee data is treated as a liability, with internal IAM solutions primarily seeking to secure this information. While external identity must also be protected, consumer data has quickly become every business’ biggest asset - and there is a LOT of it. Over 2.5 exabytes of data are created every single day (HBR), and more than 90% of this “big data” is unstructured (BusinessInsider). Identity Data = Pure Gold TODAY’S DATA GOLDMINE
  • 12. GIGYA.COM | 12 Internal data is traditionally structured and controlled, with your business defining the necessary fixed fields and models. But with such a huge volume of data and number of sources, capturing and storing external, unstructured data in an accurate and organized manner can be a nightmare. What happens when a new social network arrives on the scene? Or customers begin sharing new types of content? Unstructured data sources and points like these require major database updates that cost your business serious development time and resources. Big Data, Bigger Challenge WHERE DOES BIG DATA COME FROM? (IBM)
  • 13. GIGYA.COM | 13 Businesses cite the inability to automate structured and unstructured data quickly and effectively among their biggest challenges, with 60% noting that big data projects typically take at least 18 months to complete (Kapow Software). CIAM calls for a dynamic database with the ability to effectively normalize data from disparate sources in real-time. This database must have the power to reconcile both structured and unstructured data without the need to preconfigure database fields. Data Normalization
  • 14. GIGYA.COM | 14 With data pouring in across digital, mobile and social channels, it can often get caught in disparate silos across the organization. This, of course, results in a completely disjointed and disorganized view of your customer base and individual consumer identities. A recent Aberdeen study found that 4 in 10 companies say that data remains “siloed” and inaccessible for analysis. Ultimately, less than ¼ of the information that companies control is even available for extracting insights (WSJ). Data Here, There, and Everywhere
  • 15. GIGYA.COM | 15 While capturing customer identity via solutions like social login is the first step to unifying individual customer actions and behaviors across channels, this data is virtually useless if it is not aggregated into a single repository of truth. Ensure that your master database has the ability to directly integrate and bidirectionally synch with existing business systems and third-party marketing platforms. This means selecting a solution equipped to handle and automatically index any type of data thrown your way, including social, transactional, behavioral, and much more. Break Down Data Silos
  • 16. GIGYA.COM | 16 Establishing a “single repository of truth” is the foundation of an effective CIAM strategy. Of equal importance is ensuring that this repository is structured in a way that empowers business leaders across the organization to take action on the goldmine of data housed inside. Data In, Data Out 93% of executives believe their organization is losing an average of 14% of annual revenue without the ability to act on the customer data they collect (Oracle).
  • 17. GIGYA.COM | 17 Improve business agility with a database that seamlessly connects to a corresponding web-based dashboard, and gives business leaders an actionable view of end-user data based on roles and permissions. This allows non-technical decision makers to run complex queries based on any number of indexed attributes, build custom audience segments with no code required, and save and export key reports. By providing those on the frontlines of your business with the ability to extract and harness the economic value of customer identity, you save valuable IT time and resources while improving the timeliness and efficacy of business-wide operations. Turning Data into Action
  • 19. GIGYA.COM | Privacy, Please While internal data privacy is managed centrally and based primarily on policies put into place by the business itself, external data privacy is much messier. When it comes to managing customer identities and data, your business must adhere to the privacy policies created by countless lawmakers and third-party identity providers. This list of regulations is exhaustive and constantly evolving, with current policies including: Electronic Communications Policy Act European Union Directive Fair Credit Reporting Act Federal Trade Commission Act Payment Card Industry Data Security Standard 19
  • 20. GIGYA.COM | Keeping Up with Compliance Gartner predicts that by the end of 2015, 50% of new retail customer identities will be based on consumers’ social network profiles, compared to just 5% in 2013. Social login is quickly becoming the preferred method of authentication for customers, which means a big challenge for IT execs trying to keep up with ever- changing social network data privacy policies. As you begin to incorporate registration systems and social login across your external facing sites and apps, make sure that you choose a provider that can take on the burden of managing these privacy updates. Look for solutions that provide automatic, real-time API updates to reflect policy and account changes, such as auto- deletion of non-basic account information when application permissions are revoked. 20
  • 21. GIGYA.COM | 21 As we mentioned earlier, CIAM also raises the issue of data ownership. Internal identities are created by the business, and when an employee creates data during work hours, on a business-owned device or within a company application, this data belongs to that business. However, as a customer moves across the Internet on an owned device leveraging services and applications for personal use, this data belongs to her, and any business looking to access said data should do so in a transparent and permission-based manner. Data Ownership DID YOU KNOW? 71% of consumers state that they are very concerned about online companies selling or sharing information about them without their permission (Consumer Reports).
  • 22. GIGYA.COM | 22 Be sure that your business’ data collection process is completely transparent. No matter the method you choose, let customers know upfront that you are looking to access their identities and specific data points. The Power of Permission Provide your customers the option to authorize or opt-out of these requests, and give them the power to view and update privacy settings at any time via straightforward user management controls. Building your CIAM process on transparent data collection practices ensures that your business is upholding the highest standards of data governance and leveraging only the highest quality data.
  • 23. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. © 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/. To learn how Gigya can help provide you with the tools and technology needed to develop a successful CIAM strategy, visit gigya.com or call us at 888.660.1469.