SlideShare a Scribd company logo
Responsible CIAM:
Architecting High Security
and Flexibility in Consumer
Engagements
Steve Brasen
Research Director
Enterprise Management Associates
Bob Bentley
Director of Product Marketing
WSO2
Watch the On-Demand Webinar
• Responsible CIAM On-Demand Webinar:
https://info.enterprisemanagement.com/responsible-ciam-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
| @ema_research
Featured Speakers
© 2021 Enterprise ManagementAssociates, Inc. 3
Bob Bentley
Director of Product Marketing
WSO2
Steve Brasen
Research Director
EMA
Steve career at EMA follows 20+ years of “in-the-
trenches” experience in IT systems support,
engineering, and management for high-technology,
telecommunications, and financial
institutions. Steve's primary focus area at EMA is on
endpoint management topics, including enterprise
mobile management, client lifecycle management,
desktop virtualization, and workspace management.
| @ema_research
Bob is Director of IAM Product Marketing at WSO2.
What he finds most rewarding professionally is
communicating sometimes complex technology
concepts to customers in ways that clearly reveal
their value and benefit. With more than 20 years of
experience in identity, access and security
management, he has led product marketing and
product management teams at leading
organizations such as Duo Security, Imperva, NetIQ
and Micro Focus.
Responsible CIAM:
Architecting High Security
and Flexibility in Consumer
Engagements
Steve Brasen
Research Director
Enterprise Management Associates
Bob Bentley
Director of Product Marketing
WSO2
| @ema_research
Understanding CIAM
© 2022 Enterprise ManagementAssociates, Inc. 5
Consumer digital
experiences are
essential for driving
business profitability
and achieving
organizational success.
| @ema_research
| @ema_research
Understanding CIAM
© 2022 Enterprise ManagementAssociates, Inc. 6
| @ema_research
Percent of respondents
indicating the online
services currently
supported by their
organization’s adopted
CIAM platform
Modern Businesses Support a Variety of Online Digital Engagements
| @ema_research
Understanding CIAM
© 2022 Enterprise ManagementAssociates, Inc. 7
Consumer Identity and
Access Management
governs the complete
authentication and
access process for
consumers of business IT
services
| @ema_research
| @ema_research
CIAM Priorities
© 2022 Enterprise ManagementAssociates, Inc. 8
Business are challenged to simultaneously achieve security and enable
positive user experiences
Security
Requirements
• Protect business assets
• Secure private
customer information
• Prevent account
misuse or fraud
• Achieve regulatory
compliance
User Experience
Goals
• Entice new consumers
• Retain existing
consumers
• Improve sales
conversion rates
• Increase site
traffic
| @ema_research
CIAM Security Challenges
© 2022 Enterprise ManagementAssociates, Inc. 9
| @ema_research
Percent of respondents indicating CIAM-relatedsecurity breach
events that occurred in their organization in the preceding year
| @ema_research
CIAM Security Challenges
© 2022 Enterprise ManagementAssociates, Inc. 10
| @ema_research
Percent of respondents
from organizations that
had experienceda
breach event indicating
consequences that
occurred due to the
incident
| @ema_research
CIAM Administration Challenges
© 2022 Enterprise ManagementAssociates, Inc. 11
| @ema_research
Percent of respondents
indicating how
challenging specific
CIAM issues are for their
organization to
administer
| @ema_research
Responsible CIAM
© 2022 Enterprise ManagementAssociates, Inc. 12
Responsible CIAM Solutions
simultaneously delivers high
security AND positive user
experiences without adding
unnecessary management
complexities or costs
| @ema_research
Architecting a Responsible
CIAM Solution
© 2022 Enterprise ManagementAssociates, Inc. 13
CIAM implementations
should be built from the
ground up to
strategically achieve
quantifiable ROI.
| @ema_research
Determine and
document
organizational
goals
Step 1: Planning
Step 1: Planning
Right-size requirements
to meet organizational
needs
• Identify exactly what you
need and no more
• Define requirementsfor
addressing both current
and future needs
Step 1: Planning
Selecting an appropriate
CIAM architecture
• Public Cloud
• On-premises
• Private Cloud
• Hybrid
Step 2: Design
Orchestrate positive
consumer experiences
• Simplify registrations
• Progressive profiling
• Enable low-frictionaccess
| @ema_research
Low-Friction Interactions Drive Online Business Success
© 2022 Enterprise ManagementAssociates, Inc. 18
| @ema_research
Average percentage
increase of key online
performance indicators
since adopting a CIAM
solution
All organizations adopting low friction CIAM technologies achieve
significant improvements to online business performance
Average percentage increase of key online performance indicators since adopting low-
friction authentication technologies
24.77%
19.82%
18.78%
16.42%
16.11%
| @ema_research
Improving Sales Conversion Rates
© 2022 Enterprise ManagementAssociates, Inc. 19
| @ema_research
Average sales conversion
rates reported by
respondents from
organizations adopting
CIAM solutions supporting
specificfeatures
Step 2: Design
Achieve Security and
Compliance Goals
• Monitorconsumer activities to
identify anomalousbehaviors
• Detect any breaches or policy
violations
• Manage consumer privacy
and consent
Step 3: Implement
Identify solutions with the
flexibility to meet your
identified requirements
and feature sets
• Avoid complex
customizations
• Simplified solutions will
include the tools you need
to easily orchestrate a
custom journey
Step 3: Implement
Unify management of
identity services
• Directly integrate with-third
party resources, such as CRMs
and marketing tools
• Leverage APIs to create
custom integrations
• Support industry standards
| @ema_research
Industry Standards
© 2022 Enterprise ManagementAssociates, Inc. 23
| @ema_research
Percent of surveyed
companies indicating
the primary reasons
they adopted their
current CIAM platform
The support for industry standards was most frequently identified as
the primary motivator for adopting a CIAM platform
| @ema_research
Conclusions
© 2022 Enterprise ManagementAssociates, Inc. 24
• The foundations of a responsible
CIAM platform are laid prior to
implementation
• Adopted solutions shouldadapt
to meet existing and future
requirements
• High security can be achieved
without compromising consumer
experiences
• It is essential to partner with a
vendor that will adapt a CIAM
solution to meet your organization’s
unique requirements
Responsible Consumer Identity and Access Management (CIAM): Architecting High Security and Flexibility in Consumer Engagements
26
WSO2 in brief
Founded in 2005 Global Presence Profitable, Rapid Growth
100+ Partners Investors Fueling Growth
1000+ Employees
1200+ Customers
Creating the Digital Customer Experience
● Modernizing the digital customer journey
● Providing an engaging, personalized customer experience
● Converting prospects into customers faster
● Staying ahead of competitors
● Strengthening brand image
Aspirations
● Lack of CIAM expertise and best practices guidance
● Awareness of available options and their respective
strengths/limitations - technical and commercial
● Ensuring long-term success beyond the initial project
● Minimizing the project risks, known and unknown
Challenges
27
WSO2 CIAM
Platform
CIAM without Compromise
A world-class, developer-focused
CIAM solution
● Simplifiesyour organization’s
delivery of a unique, compelling
customer experience vision
● Minimizesthe risks that can
impede the success of your CX
program
● Ideal for wherever you are on your
CX journey
28
You don’t have to compromise
Implementing effective security
without compromising user
experience
Create your unique, compelling
customer experience without
complicated development
Deployment choices that fit
organizations’ unique and
evolving needs
Scale up effectively and
affordably, all the way to
consumer/citizen levels
Security vs. Convenience Fully Realizing Your Vision
Deployment Flexibility Scaling and Economics
29
Platform Capabilities
30
Single-sign-onandfederation Fine-grainedaccess control
Identitybridging Self-service
Strongand adaptive
authentication
Privacy, consent and
compliance management
Account managementand
identityprovisioning
Identityanalytics, reporting
and dashboarding
API security
Business system
integrations
Extensible product
architecture
SaaS, Private ID Cloud, or on-
prem/hybriddeployment
WSO2 Advantage
Best-in-classB2B CIAM
capabilities
Core CIAM Building Blocks
Proven success across all major use cases
B2C
Empowering visionary
digital customer
experiences
B2B
B2B2C/B2B2E
Secure access for partners
and 3rd-party organizations
G2C
Digital identities for secure
citizen access to
government
API Security
Protecting externaland
internal connections
B2E
Access management for
internal employees
31
Great companies worldwide rely on WSO2
Over 1 Billion
Identities managed
275+
Direct customers
1000+
OEM-driven deployments
Finance
Healthcare
Government
Retail
Technology
Telco
Education
Automotive
Hospitality
32
33
Industry Recognizes WSO2 Leadership
Overall Leader in KuppingerCole’sLeadership
Compass: CIAM Platforms,2020
Strong Performerin the ForresterWaveTM:
CustomerIdentity and Access Management,Q4 2020
$4.51 million
Total benefits over 3 years
332% ROI
Measured over 3 years
12 weeks
Faster time to market
60% increase
Developer productivity
“Identity Server enabled these organizations
to consolidate their customer identity and
access management capabilities while
keeping costs consistent despite growth,
save developer time, and accelerate
offerings to market --- all while fostering a
frictionless customer experience.”
– Forrester Consulting
WSO2 Identity Server
Total Economic Impact
34
35
Unified identity and SSO across
partner portals for 13 million patrons
Confidential Information
Our legacy implementation was not secure, scalable, extensible, reusable, and flexible. We
wanted to move away fromP2P integrations to an API-centric approach which makes it
easy to decouple, scale, evolve and go to market faster.
– Meena Mani, VP Software Development, Seminole Hard Rock Support Services
WSO2 Products Identity Server | Enterprise Integrator | API Manager
WSO2delivereda 360° viewof all patronswith real-timeanalytics, enabling
Seminole todeliver exceptional customerservice
B2C
The WSO2 CIAM Advantage
Securitythat’snearlyinvisible until needed– helping you
achieve lowerabandonment rates and drive higher revenue.
Security peace of mind without
sacrificing ease-of-use
Our platform was made for developers, by developers.We
deliver the tools, resourcesand communityto give your dev
team a headstart and a clear path.
Realize your full CX vision without
complicated development
Your CIAM’s deployment options need to work for you, not
against you. Choose how you want it–asIDaaS/SaaS, open
source software, or private cloud managedservice.
Deploy how and where you need
We don’t penalize our customers’growthwith rising prices.
WSO2remains affordable as you grow, all the way up to
consumer/citizenscale.
Scale your customers, not your costs
Next Steps
● Complimentary white paper
● Learn more about WSO2 CIAM solutions:
wso2.com/solutions/customer-identity-and-access-management
37

More Related Content

PDF
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
PDF
Consumer Identity and Access Management (CIAM)
PDF
[WSO2 Summit EMEA 2020] CIAM and Securing the Integrated API Supply Chain
PDF
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
PDF
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
PPTX
Consumer Identity World EU - Five pillars of consumer IAM
PDF
Customer Identity and Access Management.pdf
PPTX
Customer vs. IAM: Understanding CIAM's Role in Accelerating Business Growth.pptx
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
Consumer Identity and Access Management (CIAM)
[WSO2 Summit EMEA 2020] CIAM and Securing the Integrated API Supply Chain
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
Consumer Identity World EU - Five pillars of consumer IAM
Customer Identity and Access Management.pdf
Customer vs. IAM: Understanding CIAM's Role in Accelerating Business Growth.pptx

Similar to Responsible Consumer Identity and Access Management (CIAM): Architecting High Security and Flexibility in Consumer Engagements (20)

PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
[WSO2 Summit Americas 2020] CIAM and Securing the Integrated API Supply Chain
PDF
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
PDF
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
PPTX
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
PDF
White Paper: DIY vs CIAM
PDF
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
PDF
Customer Identity and Access Management1.pdf
PDF
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0 [ANZ]
PDF
_Understanding Customer Identity & Access Management- Bahaa Abdul Hussein.pdf
PPTX
Identity and Access Management in the Era of Digital Transformation
PDF
Understanding Customer Identity & Access Management - Bahaa Abdul Hadi.pdf
PDF
Understanding Customer Identity & Access Management - Bahaa Abdul Hadi.pdf
PDF
Building a Robust Cloud CIAM Framework: A Detailed Checklist
PDF
Essential Identity Checklist for CIAM in the Cloud By LoginRadius
PDF
Strategizing CIAM in the Cloud: A Comprehensive Identity Checklist
PDF
Essential CIAM Strategies for Cloud-Based Identity Management
PDF
LoginRadius Checklist for Cloud-Based CIAM Strategy Success
PDF
Cloud CIAM Strategy: An Essential Identity Checklist
PPTX
20170912_Identity_and_Access_Management.pptx
Emerging Managed Services Opportunities in Identity and Access Management
[WSO2 Summit Americas 2020] CIAM and Securing the Integrated API Supply Chain
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Bridging the Gap between Marketing & IT with Customer Identity &...
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
White Paper: DIY vs CIAM
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
Customer Identity and Access Management1.pdf
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0 [ANZ]
_Understanding Customer Identity & Access Management- Bahaa Abdul Hussein.pdf
Identity and Access Management in the Era of Digital Transformation
Understanding Customer Identity & Access Management - Bahaa Abdul Hadi.pdf
Understanding Customer Identity & Access Management - Bahaa Abdul Hadi.pdf
Building a Robust Cloud CIAM Framework: A Detailed Checklist
Essential Identity Checklist for CIAM in the Cloud By LoginRadius
Strategizing CIAM in the Cloud: A Comprehensive Identity Checklist
Essential CIAM Strategies for Cloud-Based Identity Management
LoginRadius Checklist for Cloud-Based CIAM Strategy Success
Cloud CIAM Strategy: An Essential Identity Checklist
20170912_Identity_and_Access_Management.pptx
Ad

More from Enterprise Management Associates (20)

PDF
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
PDF
Enterprise Strategies for Hybrid, Multi-Cloud Networks
PDF
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
PDF
The AI Advantage: How IT Leaders are Redefining Operations in 2025
PDF
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
PDF
Network Observability: Managing Performance Across Hybrid Networks
PDF
Zero Trust Networking: How Network Teams Support Cybersecurity
PDF
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
PDF
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
PDF
Applying Generative AI to IT Operations Research
PPTX
Network as a Service: Understanding the Cloud Consumption Model in Networking
PDF
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
PDF
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
PDF
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
PDF
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
PDF
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
PDF
EMA AIOps Radar: A Guide to Investing in Innovation
PDF
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
PDF
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
The AI Advantage: How IT Leaders are Redefining Operations in 2025
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Network Observability: Managing Performance Across Hybrid Networks
Zero Trust Networking: How Network Teams Support Cybersecurity
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
Applying Generative AI to IT Operations Research
Network as a Service: Understanding the Cloud Consumption Model in Networking
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
EMA AIOps Radar: A Guide to Investing in Innovation
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
Ad

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
Programs and apps: productivity, graphics, security and other tools

Responsible Consumer Identity and Access Management (CIAM): Architecting High Security and Flexibility in Consumer Engagements

  • 1. Responsible CIAM: Architecting High Security and Flexibility in Consumer Engagements Steve Brasen Research Director Enterprise Management Associates Bob Bentley Director of Product Marketing WSO2
  • 2. Watch the On-Demand Webinar • Responsible CIAM On-Demand Webinar: https://info.enterprisemanagement.com/responsible-ciam-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. | @ema_research Featured Speakers © 2021 Enterprise ManagementAssociates, Inc. 3 Bob Bentley Director of Product Marketing WSO2 Steve Brasen Research Director EMA Steve career at EMA follows 20+ years of “in-the- trenches” experience in IT systems support, engineering, and management for high-technology, telecommunications, and financial institutions. Steve's primary focus area at EMA is on endpoint management topics, including enterprise mobile management, client lifecycle management, desktop virtualization, and workspace management. | @ema_research Bob is Director of IAM Product Marketing at WSO2. What he finds most rewarding professionally is communicating sometimes complex technology concepts to customers in ways that clearly reveal their value and benefit. With more than 20 years of experience in identity, access and security management, he has led product marketing and product management teams at leading organizations such as Duo Security, Imperva, NetIQ and Micro Focus.
  • 4. Responsible CIAM: Architecting High Security and Flexibility in Consumer Engagements Steve Brasen Research Director Enterprise Management Associates Bob Bentley Director of Product Marketing WSO2
  • 5. | @ema_research Understanding CIAM © 2022 Enterprise ManagementAssociates, Inc. 5 Consumer digital experiences are essential for driving business profitability and achieving organizational success. | @ema_research
  • 6. | @ema_research Understanding CIAM © 2022 Enterprise ManagementAssociates, Inc. 6 | @ema_research Percent of respondents indicating the online services currently supported by their organization’s adopted CIAM platform Modern Businesses Support a Variety of Online Digital Engagements
  • 7. | @ema_research Understanding CIAM © 2022 Enterprise ManagementAssociates, Inc. 7 Consumer Identity and Access Management governs the complete authentication and access process for consumers of business IT services | @ema_research
  • 8. | @ema_research CIAM Priorities © 2022 Enterprise ManagementAssociates, Inc. 8 Business are challenged to simultaneously achieve security and enable positive user experiences Security Requirements • Protect business assets • Secure private customer information • Prevent account misuse or fraud • Achieve regulatory compliance User Experience Goals • Entice new consumers • Retain existing consumers • Improve sales conversion rates • Increase site traffic
  • 9. | @ema_research CIAM Security Challenges © 2022 Enterprise ManagementAssociates, Inc. 9 | @ema_research Percent of respondents indicating CIAM-relatedsecurity breach events that occurred in their organization in the preceding year
  • 10. | @ema_research CIAM Security Challenges © 2022 Enterprise ManagementAssociates, Inc. 10 | @ema_research Percent of respondents from organizations that had experienceda breach event indicating consequences that occurred due to the incident
  • 11. | @ema_research CIAM Administration Challenges © 2022 Enterprise ManagementAssociates, Inc. 11 | @ema_research Percent of respondents indicating how challenging specific CIAM issues are for their organization to administer
  • 12. | @ema_research Responsible CIAM © 2022 Enterprise ManagementAssociates, Inc. 12 Responsible CIAM Solutions simultaneously delivers high security AND positive user experiences without adding unnecessary management complexities or costs
  • 13. | @ema_research Architecting a Responsible CIAM Solution © 2022 Enterprise ManagementAssociates, Inc. 13 CIAM implementations should be built from the ground up to strategically achieve quantifiable ROI. | @ema_research
  • 15. Step 1: Planning Right-size requirements to meet organizational needs • Identify exactly what you need and no more • Define requirementsfor addressing both current and future needs
  • 16. Step 1: Planning Selecting an appropriate CIAM architecture • Public Cloud • On-premises • Private Cloud • Hybrid
  • 17. Step 2: Design Orchestrate positive consumer experiences • Simplify registrations • Progressive profiling • Enable low-frictionaccess
  • 18. | @ema_research Low-Friction Interactions Drive Online Business Success © 2022 Enterprise ManagementAssociates, Inc. 18 | @ema_research Average percentage increase of key online performance indicators since adopting a CIAM solution All organizations adopting low friction CIAM technologies achieve significant improvements to online business performance Average percentage increase of key online performance indicators since adopting low- friction authentication technologies 24.77% 19.82% 18.78% 16.42% 16.11%
  • 19. | @ema_research Improving Sales Conversion Rates © 2022 Enterprise ManagementAssociates, Inc. 19 | @ema_research Average sales conversion rates reported by respondents from organizations adopting CIAM solutions supporting specificfeatures
  • 20. Step 2: Design Achieve Security and Compliance Goals • Monitorconsumer activities to identify anomalousbehaviors • Detect any breaches or policy violations • Manage consumer privacy and consent
  • 21. Step 3: Implement Identify solutions with the flexibility to meet your identified requirements and feature sets • Avoid complex customizations • Simplified solutions will include the tools you need to easily orchestrate a custom journey
  • 22. Step 3: Implement Unify management of identity services • Directly integrate with-third party resources, such as CRMs and marketing tools • Leverage APIs to create custom integrations • Support industry standards
  • 23. | @ema_research Industry Standards © 2022 Enterprise ManagementAssociates, Inc. 23 | @ema_research Percent of surveyed companies indicating the primary reasons they adopted their current CIAM platform The support for industry standards was most frequently identified as the primary motivator for adopting a CIAM platform
  • 24. | @ema_research Conclusions © 2022 Enterprise ManagementAssociates, Inc. 24 • The foundations of a responsible CIAM platform are laid prior to implementation • Adopted solutions shouldadapt to meet existing and future requirements • High security can be achieved without compromising consumer experiences • It is essential to partner with a vendor that will adapt a CIAM solution to meet your organization’s unique requirements
  • 26. 26 WSO2 in brief Founded in 2005 Global Presence Profitable, Rapid Growth 100+ Partners Investors Fueling Growth 1000+ Employees 1200+ Customers
  • 27. Creating the Digital Customer Experience ● Modernizing the digital customer journey ● Providing an engaging, personalized customer experience ● Converting prospects into customers faster ● Staying ahead of competitors ● Strengthening brand image Aspirations ● Lack of CIAM expertise and best practices guidance ● Awareness of available options and their respective strengths/limitations - technical and commercial ● Ensuring long-term success beyond the initial project ● Minimizing the project risks, known and unknown Challenges 27
  • 28. WSO2 CIAM Platform CIAM without Compromise A world-class, developer-focused CIAM solution ● Simplifiesyour organization’s delivery of a unique, compelling customer experience vision ● Minimizesthe risks that can impede the success of your CX program ● Ideal for wherever you are on your CX journey 28
  • 29. You don’t have to compromise Implementing effective security without compromising user experience Create your unique, compelling customer experience without complicated development Deployment choices that fit organizations’ unique and evolving needs Scale up effectively and affordably, all the way to consumer/citizen levels Security vs. Convenience Fully Realizing Your Vision Deployment Flexibility Scaling and Economics 29
  • 30. Platform Capabilities 30 Single-sign-onandfederation Fine-grainedaccess control Identitybridging Self-service Strongand adaptive authentication Privacy, consent and compliance management Account managementand identityprovisioning Identityanalytics, reporting and dashboarding API security Business system integrations Extensible product architecture SaaS, Private ID Cloud, or on- prem/hybriddeployment WSO2 Advantage Best-in-classB2B CIAM capabilities Core CIAM Building Blocks
  • 31. Proven success across all major use cases B2C Empowering visionary digital customer experiences B2B B2B2C/B2B2E Secure access for partners and 3rd-party organizations G2C Digital identities for secure citizen access to government API Security Protecting externaland internal connections B2E Access management for internal employees 31
  • 32. Great companies worldwide rely on WSO2 Over 1 Billion Identities managed 275+ Direct customers 1000+ OEM-driven deployments Finance Healthcare Government Retail Technology Telco Education Automotive Hospitality 32
  • 33. 33 Industry Recognizes WSO2 Leadership Overall Leader in KuppingerCole’sLeadership Compass: CIAM Platforms,2020 Strong Performerin the ForresterWaveTM: CustomerIdentity and Access Management,Q4 2020
  • 34. $4.51 million Total benefits over 3 years 332% ROI Measured over 3 years 12 weeks Faster time to market 60% increase Developer productivity “Identity Server enabled these organizations to consolidate their customer identity and access management capabilities while keeping costs consistent despite growth, save developer time, and accelerate offerings to market --- all while fostering a frictionless customer experience.” – Forrester Consulting WSO2 Identity Server Total Economic Impact 34
  • 35. 35 Unified identity and SSO across partner portals for 13 million patrons Confidential Information Our legacy implementation was not secure, scalable, extensible, reusable, and flexible. We wanted to move away fromP2P integrations to an API-centric approach which makes it easy to decouple, scale, evolve and go to market faster. – Meena Mani, VP Software Development, Seminole Hard Rock Support Services WSO2 Products Identity Server | Enterprise Integrator | API Manager WSO2delivereda 360° viewof all patronswith real-timeanalytics, enabling Seminole todeliver exceptional customerservice B2C
  • 36. The WSO2 CIAM Advantage Securitythat’snearlyinvisible until needed– helping you achieve lowerabandonment rates and drive higher revenue. Security peace of mind without sacrificing ease-of-use Our platform was made for developers, by developers.We deliver the tools, resourcesand communityto give your dev team a headstart and a clear path. Realize your full CX vision without complicated development Your CIAM’s deployment options need to work for you, not against you. Choose how you want it–asIDaaS/SaaS, open source software, or private cloud managedservice. Deploy how and where you need We don’t penalize our customers’growthwith rising prices. WSO2remains affordable as you grow, all the way up to consumer/citizenscale. Scale your customers, not your costs
  • 37. Next Steps ● Complimentary white paper ● Learn more about WSO2 CIAM solutions: wso2.com/solutions/customer-identity-and-access-management 37