SlideShare a Scribd company logo
IAM for the Digital Customer 
Identity Relationship 
Management
2 
Unleashing Business 
Value with Identity 
FORGEROCK.COM 
Eve Maler 
VP Innovation & Emerging Technology 
@xmlgrrl 
#IRMSummit 
November 4, 2014
The business pillars of identity 
relationship management 
CONSUMERS & THINGS over employees 
ADAPTABLE over predictable 
REVENUE over operating expense 
VELOCITY over process and tools
The technical pillars of identity 
relationship management 
INTERNET SCALE over enterprise scale 
DYNAMIC over static intelligence 
BORDERLESS over perimeter 
MODULAR over monolithic
Companies are straining 
against a view of IAM as a 
tactical IT concern
6 
IRM deserves its special 
moniker because it operates at 
special scale 
3,000,000 
2,500,000 
2,000,000 
1,500,000 
1,000,000 
500,000 
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 
6 
Partner Employee Consumer 
0 
101 – 
1,000 
1,001 – 
10,000 
500,001 – 
5,000,000 
Base: 111 B2C and B2B2C Executives
7 
Putting these numbers into perspective 
FORGEROCK.COM
8 
Companies are dubious about 
the IRM preparedness of 
existing IAM solutions 
Does your budget for building out 
external-facing, customer and 
partner identity and access 
management include investment in 
8 
Considering the IAM technology 
solutions you use internally 
now, how prepared are these 
solutions for use in external 
deployment scenarios? 
Not at all 
prepared, 8% 
Not very 
prepared, 22% 
Somewhat 
prepared, 36% 
Very prepared, 
34% 
Base: 111 B2C and B2B2C Executives 
66% feel 
less than 
“very 
prepared” 
new IAM software? 
Yes, 88% 
N/A 5% Don’t know, 
No, 5% 
2% 
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
IRM priorities are increasing 
the pressure on IAM projects
10 
The definition of success is 
shifting 
Have you been asked to measure the 
revenue impact of your customer-facing 
10 
IT projects? 
Yes, 
83% 
No, 9% 
Don’t 
know, 
8% 
Base: 86 [Those who work on customer-facing IAM projects] 
Base: 111 B2C and B2B2C Executives 
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
11 
Metrics are moving from input to 
output and from internal to 
business-focused 
What types of success metrics govern your 
IAM-related projects today? 
1) On-time and on-budget 
2) Regulatory compliance (e.g., 
PCI, HIPAA, EU Data Protection 
Directive, etc.) 
3) Fraud detection/prevention 
rates 
4) Drive increased revenue 
5) Drive customer intelligence 
What types of success metrics do you anticipate 
will govern your IAM-related projects three years 
from now? 
1) On-time and on-budget 
2) Fraud detection/prevention 
rates 
3) Drive increased revenue 
4) Regulatory compliance (e.g., 
PCI, HIPAA, EU Data Protection 
Directive, etc.) 
5) Drive customer intelligence 
Base: 111 B2C and B2B2C Executives 
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
12 
IRM requires the right 
architecture 
We’re undergoing a digital transformation. I didn’t 
think IAM was going to be so important for this, but 
now I realize it’s valuable to create a targeted 
architecture and not have to build specialized 
applications each time. The users will be able to 
access the same platform, and their access will be 
controlled by authorization. It’s really an enabler in 
completely transforming the way we do things. People 
expect 24/7 access. 
– Media/advertising 
FORGEROCK.COM
13 
Strategic priorities reflect the 
IRM imperative 
“Please indicate which of the following are, or will be, strategic IAM priorities for your company.” 
28% 
25% 
19% 
21% 
20% 
22% 
25% 
24% 
21% 
31% 
39% 
36% 
32% 
37% 
35% 
27% 
41% 
21% 
48% 
32% 
36% 
43% 
46% 
40% 
33% 
33% 
40% 
Driving business value and revenue by extending IAM to customers 
Consolidating disparate customer IAM systems 
Using IAM to enable and unify customer access to cloud-based services 
Managing IAM for multiple types of network-connected devices owned by customers 
Ensuring IAM systems scale to handle anticipated customer growth 
Consolidating disparate employee IAM systems 
Mitigating operational expenses and security risk by extending IAM to employees 
Using IAM to control and enable employee access to cloud/SaaS services 
Managing IAM for multiple types of network-connected devices owned by employees 
Will be a priority in more than a year Will be a priority in the next year Is a current priority 
Base: 111 B2C and B2B2C Executives 
IAM IRM 
Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
14 
IAM vs. IRM 
control 
enable 
FORGEROCK.COM
15 
IAM vs. IRM 
control 
enable 
roles 
users 
FORGEROCK.COM
16 
IAM vs. IRM 
control 
enable 
roles 
users 
trap accept 
FORGEROCK.COM
17 
Do you share these challenges? 
How do I roll out new services for 
any device or “thing”? 
How do I scale to support hundreds 
of millions of users and devices? 
How do I personalize services and 
reduce risk using real-time context? 
How do I roll out identity services 
in weeks, not months or years? 
FORGEROCK.COM
18 
Our wonderful track 
lineup 
Joni Brennan, Kantara Initiative: Connected Life 
Andrew Johnston, TELUS: I Am Not My Phone 
Thomas Bostrøm Jørgensen, Encap: Demo and 
Analysis of Apple Touch ID for IRM 
Jean-François Rubon, Gemalto: Securing Online 
Services in a Mobile First World 
Robert Lapes, Capgemini: Twelve Diagrams to Save 
Your Identity Bacon 
Stein Myrseth, ForgeRock: Cloud Deployment 
Management with Juju 
Steve Ferris, ForgeRock: Best Practices panel
FORGEROCK.COM 19 
Thanks! 
Questions? 
Enjoy the IRM track! 
Eve Maler 
eve.maler@forgerock.com 
@xmlgrrl 
#IRMSummit

More Related Content

PPTX
Using Identity to Empower the Enterprise: Identity Relationship Management
PPT
Identity Relationship Management: The Community Revolution
PPTX
Identity Live London 2017 | Marko Orenius
PPTX
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
PDF
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
PDF
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
PDF
Trends in IRM: Internet of Things
PPTX
Identity Live Paris 2017 | Marko Orenius, Amer Sports
Using Identity to Empower the Enterprise: Identity Relationship Management
Identity Relationship Management: The Community Revolution
Identity Live London 2017 | Marko Orenius
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
Trends in IRM: Internet of Things
Identity Live Paris 2017 | Marko Orenius, Amer Sports

What's hot (20)

PDF
Winning with GDPR: How to Win Customer Loyalty and Trust
PPTX
Identity Live Sydney 2017 - Tim Sheedy
PPTX
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PDF
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
PPTX
Amer Sports - ForgeRock Identity Live - Dusseldorf
PPTX
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
PDF
Go Beyond PSD2 Compliance with Digital Identity
PPTX
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
PDF
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
PPTX
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
PDF
Identity Live Sydney: Intelligent Authentication
PDF
The Future of Digital IAM
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PDF
Building a Customer Identity and Access Management (CIAM) Solution
PDF
The top 10 strategic technology trends for 2019.
PPTX
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PPTX
apidays LIVE LONDON - How APIs are changing the fintech world by Chirine Ben...
Winning with GDPR: How to Win Customer Loyalty and Trust
Identity Live Sydney 2017 - Tim Sheedy
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Intelligent Authentication (Identity Live Berlin 2018)
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Shift from GDPR readiness to sustained compliance to improve your business an...
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
Amer Sports - ForgeRock Identity Live - Dusseldorf
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Go Beyond PSD2 Compliance with Digital Identity
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Live Sydney: Intelligent Authentication
The Future of Digital IAM
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Building a Customer Identity and Access Management (CIAM) Solution
The top 10 strategic technology trends for 2019.
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
apidays LIVE LONDON - How APIs are changing the fintech world by Chirine Ben...
Ad

Similar to UNLEASHING BUSINESS VALUE WITH IDENTITY (20)

PPTX
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
PDF
Whitepaper: Identity Relationship Management - Happiest Minds
PDF
Signs It's Time to Modernize Your Identity Management Software
PPTX
IRM: Using Identity to Empower CIOs Everywhere
PPTX
Opening Remarks by Mike Ellis
PPTX
ForgeRock Gartner 2016 Security & Risk Management Summit
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PDF
White Paper: DIY vs CIAM
PDF
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
PDF
GoodDogLabs. IAM Services
PPTX
IRMSummit Europe 2014 - Selected Highlights
PDF
Identity Relationship Management: Using Identity to Empower CIOs Everywhere
PDF
IAM to IRM: The Shift to Identity Relationship Management
PPTX
20170912_Identity_and_Access_Management.pptx
PPTX
Building & Running A Successful Identity Program
PDF
Identity Access Management(IAM) - Government Market Report
PDF
Sun Gerenciamento de Identidade com Segurança
PDF
Compliance & Identity access management
PPTX
9.35am robert humphrey
PDF
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Adding Relationship Management to Identity: It's a Must for Customer-Obsessed...
Whitepaper: Identity Relationship Management - Happiest Minds
Signs It's Time to Modernize Your Identity Management Software
IRM: Using Identity to Empower CIOs Everywhere
Opening Remarks by Mike Ellis
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
White Paper: DIY vs CIAM
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
GoodDogLabs. IAM Services
IRMSummit Europe 2014 - Selected Highlights
Identity Relationship Management: Using Identity to Empower CIOs Everywhere
IAM to IRM: The Shift to Identity Relationship Management
20170912_Identity_and_Access_Management.pptx
Building & Running A Successful Identity Program
Identity Access Management(IAM) - Government Market Report
Sun Gerenciamento de Identidade com Segurança
Compliance & Identity access management
9.35am robert humphrey
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Ad

More from ForgeRock (20)

PDF
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
PPTX
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PDF
Identity Live Singapore 2018 Keynote Presentation
PDF
Identity Live Sydney 2018 Keynote Presentation
PDF
Identity Live Singapore: Just Ask 'Em
PDF
Identity Live Singapore: Building Trust & Privacy in a Connected Society
PDF
Identity Live Sydney: Building Trust and Privacy in a Connected Society
PDF
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
PDF
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PDF
Applying Innovative Tools for GDPR Success
PDF
What the Internet of Things Means for Consumer Privacy: Veronica Lara
PDF
Identity Live in Austin Keynote
PDF
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
PDF
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
Opening Keynote (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Applying Innovative Tools for GDPR Success
What the Internet of Things Means for Consumer Privacy: Veronica Lara
Identity Live in Austin Keynote
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch

Recently uploaded (20)

PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
medical staffing services at VALiNTRY
PPTX
Introduction to Artificial Intelligence
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
AI in Product Development-omnex systems
PDF
Nekopoi APK 2025 free lastest update
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
top salesforce developer skills in 2025.pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
L1 - Introduction to python Backend.pptx
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPT
Introduction Database Management System for Course Database
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Operating system designcfffgfgggggggvggggggggg
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
medical staffing services at VALiNTRY
Introduction to Artificial Intelligence
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
AI in Product Development-omnex systems
Nekopoi APK 2025 free lastest update
How to Migrate SBCGlobal Email to Yahoo Easily
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Design an Analysis of Algorithms II-SECS-1021-03
Online Work Permit System for Fast Permit Processing
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
top salesforce developer skills in 2025.pdf
ai tools demonstartion for schools and inter college
L1 - Introduction to python Backend.pptx
2025 Textile ERP Trends: SAP, Odoo & Oracle
Which alternative to Crystal Reports is best for small or large businesses.pdf
Introduction Database Management System for Course Database
Upgrade and Innovation Strategies for SAP ERP Customers
Operating system designcfffgfgggggggvggggggggg

UNLEASHING BUSINESS VALUE WITH IDENTITY

  • 1. IAM for the Digital Customer Identity Relationship Management
  • 2. 2 Unleashing Business Value with Identity FORGEROCK.COM Eve Maler VP Innovation & Emerging Technology @xmlgrrl #IRMSummit November 4, 2014
  • 3. The business pillars of identity relationship management CONSUMERS & THINGS over employees ADAPTABLE over predictable REVENUE over operating expense VELOCITY over process and tools
  • 4. The technical pillars of identity relationship management INTERNET SCALE over enterprise scale DYNAMIC over static intelligence BORDERLESS over perimeter MODULAR over monolithic
  • 5. Companies are straining against a view of IAM as a tactical IT concern
  • 6. 6 IRM deserves its special moniker because it operates at special scale 3,000,000 2,500,000 2,000,000 1,500,000 1,000,000 500,000 Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014 6 Partner Employee Consumer 0 101 – 1,000 1,001 – 10,000 500,001 – 5,000,000 Base: 111 B2C and B2B2C Executives
  • 7. 7 Putting these numbers into perspective FORGEROCK.COM
  • 8. 8 Companies are dubious about the IRM preparedness of existing IAM solutions Does your budget for building out external-facing, customer and partner identity and access management include investment in 8 Considering the IAM technology solutions you use internally now, how prepared are these solutions for use in external deployment scenarios? Not at all prepared, 8% Not very prepared, 22% Somewhat prepared, 36% Very prepared, 34% Base: 111 B2C and B2B2C Executives 66% feel less than “very prepared” new IAM software? Yes, 88% N/A 5% Don’t know, No, 5% 2% Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
  • 9. IRM priorities are increasing the pressure on IAM projects
  • 10. 10 The definition of success is shifting Have you been asked to measure the revenue impact of your customer-facing 10 IT projects? Yes, 83% No, 9% Don’t know, 8% Base: 86 [Those who work on customer-facing IAM projects] Base: 111 B2C and B2B2C Executives Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
  • 11. 11 Metrics are moving from input to output and from internal to business-focused What types of success metrics govern your IAM-related projects today? 1) On-time and on-budget 2) Regulatory compliance (e.g., PCI, HIPAA, EU Data Protection Directive, etc.) 3) Fraud detection/prevention rates 4) Drive increased revenue 5) Drive customer intelligence What types of success metrics do you anticipate will govern your IAM-related projects three years from now? 1) On-time and on-budget 2) Fraud detection/prevention rates 3) Drive increased revenue 4) Regulatory compliance (e.g., PCI, HIPAA, EU Data Protection Directive, etc.) 5) Drive customer intelligence Base: 111 B2C and B2B2C Executives Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
  • 12. 12 IRM requires the right architecture We’re undergoing a digital transformation. I didn’t think IAM was going to be so important for this, but now I realize it’s valuable to create a targeted architecture and not have to build specialized applications each time. The users will be able to access the same platform, and their access will be controlled by authorization. It’s really an enabler in completely transforming the way we do things. People expect 24/7 access. – Media/advertising FORGEROCK.COM
  • 13. 13 Strategic priorities reflect the IRM imperative “Please indicate which of the following are, or will be, strategic IAM priorities for your company.” 28% 25% 19% 21% 20% 22% 25% 24% 21% 31% 39% 36% 32% 37% 35% 27% 41% 21% 48% 32% 36% 43% 46% 40% 33% 33% 40% Driving business value and revenue by extending IAM to customers Consolidating disparate customer IAM systems Using IAM to enable and unify customer access to cloud-based services Managing IAM for multiple types of network-connected devices owned by customers Ensuring IAM systems scale to handle anticipated customer growth Consolidating disparate employee IAM systems Mitigating operational expenses and security risk by extending IAM to employees Using IAM to control and enable employee access to cloud/SaaS services Managing IAM for multiple types of network-connected devices owned by employees Will be a priority in more than a year Will be a priority in the next year Is a current priority Base: 111 B2C and B2B2C Executives IAM IRM Source: A commissioned study conducted by Forrester Consulting on behalf of ForgeRock, April, 2014
  • 14. 14 IAM vs. IRM control enable FORGEROCK.COM
  • 15. 15 IAM vs. IRM control enable roles users FORGEROCK.COM
  • 16. 16 IAM vs. IRM control enable roles users trap accept FORGEROCK.COM
  • 17. 17 Do you share these challenges? How do I roll out new services for any device or “thing”? How do I scale to support hundreds of millions of users and devices? How do I personalize services and reduce risk using real-time context? How do I roll out identity services in weeks, not months or years? FORGEROCK.COM
  • 18. 18 Our wonderful track lineup Joni Brennan, Kantara Initiative: Connected Life Andrew Johnston, TELUS: I Am Not My Phone Thomas Bostrøm Jørgensen, Encap: Demo and Analysis of Apple Touch ID for IRM Jean-François Rubon, Gemalto: Securing Online Services in a Mobile First World Robert Lapes, Capgemini: Twelve Diagrams to Save Your Identity Bacon Stein Myrseth, ForgeRock: Cloud Deployment Management with Juju Steve Ferris, ForgeRock: Best Practices panel
  • 19. FORGEROCK.COM 19 Thanks! Questions? Enjoy the IRM track! Eve Maler eve.maler@forgerock.com @xmlgrrl #IRMSummit

Editor's Notes

  • #2: MODERATOR For reference: Eve’s delivery of roughly this same talk on June 6, 2014: https://www.youtube.com/watch?v=0svAuEFHv_E
  • #3: MODERATOR: Introduce Eve
  • #4: EVE Image source: https://www.flickr.com/photos/hindrik/8233160444 Model for managing a company’s interactions with current and future customers and “things” using identity as an enabler of mission critical value. Focused on unleashing new business opportunities that drive next generation consumer-facing services and top line revenue. This shift in business emphasis has a direct technical impact on how we think about identity and access management. As a result, CIOs need to take into account the following business-focused pillars when choosing an IRM solution:
  • #5: EVE Image source: https://www.flickr.com/photos/hindrik/8233160444 This shift in business emphasis has a direct technical impact on how we think about identity and access management. As a result, CIOs need to take into account the following business-focused pillars when choosing an IRM solution:
  • #6: EVE Image source: https://www.flickr.com/photos/10288834@N08/8336358017/ | PROVISIONAL USE – WAITING FOR PERMISSION
  • #7: MARK
  • #8: EVE Image sources: http://www.businessinsider.com/10000-attend-the-walkers-internet-cat-video-film-festival-2012-8, http://www.nbc12.com/story/25518433/1000-people-pay-respects-at-ur-memorial-for-air-balloon-crash-victims, http://en.wikipedia.org/wiki/List_of_countries_by_population
  • #9: MARK
  • #10: EVE Image source: https://www.flickr.com/photos/cinetics/8701248037 | BY 2.0
  • #11: MARK – digitization in support of increasing top-line revenue
  • #12: MARK
  • #13: EVE
  • #14: MARK+EVE (for commentary) Eve sez: Justifies IRM as a whole new category with different goals, use cases, and objectives – while it might use some of the same technology, it has a different business purpose and metrics
  • #15: EVE What do you have to do to manage employees and partners vs. customers and consumers? What do you have to be prepared to scale? How do you have to treat mobile devices? Image sources: http://www.flickr.com/photos/seabamirum/2850890725/, https://www.flickr.com/photos/darwinbell/443924168, Image source: http://blog.marketo.com/2013/10/the-whole-customer-why-you-need-a-360-degree-view.html, https://www.flickr.com/photos/darwinbell/443924168, https://www.flickr.com/photos/april-mo/12852089995, https://www.flickr.com/photos/coloneljohnbritt/11899674974 As more and more people, devices, and “things” are assigned identities across networks, IRM services that are  simple, flexible, scalable and  designed to quickly verify identities and access privileges, become imperative for any business to safely and efficiently engage with their customers. Today’s solutions must link devices–laptops, phones, touchpads, cars–and new mobile and social apps to a single security platform that works all the time, everywhere, on premises or off in the cloud. This is the standard that customers, citizens, and students expect, and CIOs and their businesses, (as well as governments and universities), must identify vendors that can provide it because these methods of consumer engagement directly drive revenue. Customers might deposit checks from their phone, order a service through a cloud app, or make a purchase from a laptop that recognizes their identity, and shares the right information with the vendor. As consumers look for and expect more ways to engage with businesses, companies are making the shift from the closed, protective world of IAM to the open, evolving, and confidently secure IRM universe. This is because identity and access management tools are a necessity for managing trust relationships with parties inside and outside of a company – relationships that are now tied directly to the business’ top line.
  • #16: EVE What do you have to do to manage employees and partners vs. customers and consumers? What do you have to be prepared to scale? How do you have to treat mobile devices? Image sources: http://www.flickr.com/photos/seabamirum/2850890725/, https://www.flickr.com/photos/darwinbell/443924168, Image source: http://blog.marketo.com/2013/10/the-whole-customer-why-you-need-a-360-degree-view.html, https://www.flickr.com/photos/darwinbell/443924168, https://www.flickr.com/photos/april-mo/12852089995, https://www.flickr.com/photos/coloneljohnbritt/11899674974 As more and more people, devices, and “things” are assigned identities across networks, IRM services that are  simple, flexible, scalable and  designed to quickly verify identities and access privileges, become imperative for any business to safely and efficiently engage with their customers. Today’s solutions must link devices–laptops, phones, touchpads, cars–and new mobile and social apps to a single security platform that works all the time, everywhere, on premises or off in the cloud. This is the standard that customers, citizens, and students expect, and CIOs and their businesses, (as well as governments and universities), must identify vendors that can provide it because these methods of consumer engagement directly drive revenue. Customers might deposit checks from their phone, order a service through a cloud app, or make a purchase from a laptop that recognizes their identity, and shares the right information with the vendor. As consumers look for and expect more ways to engage with businesses, companies are making the shift from the closed, protective world of IAM to the open, evolving, and confidently secure IRM universe. This is because identity and access management tools are a necessity for managing trust relationships with parties inside and outside of a company – relationships that are now tied directly to the business’ top line.
  • #17: EVE What do you have to do to manage employees and partners vs. customers and consumers? What do you have to be prepared to scale? How do you have to treat mobile devices? Image sources: http://www.flickr.com/photos/seabamirum/2850890725/, https://www.flickr.com/photos/darwinbell/443924168, Image source: http://blog.marketo.com/2013/10/the-whole-customer-why-you-need-a-360-degree-view.html, https://www.flickr.com/photos/darwinbell/443924168, https://www.flickr.com/photos/april-mo/12852089995, https://www.flickr.com/photos/coloneljohnbritt/11899674974 As more and more people, devices, and “things” are assigned identities across networks, IRM services that are  simple, flexible, scalable and  designed to quickly verify identities and access privileges, become imperative for any business to safely and efficiently engage with their customers. Today’s solutions must link devices–laptops, phones, touchpads, cars–and new mobile and social apps to a single security platform that works all the time, everywhere, on premises or off in the cloud. This is the standard that customers, citizens, and students expect, and CIOs and their businesses, (as well as governments and universities), must identify vendors that can provide it because these methods of consumer engagement directly drive revenue. Customers might deposit checks from their phone, order a service through a cloud app, or make a purchase from a laptop that recognizes their identity, and shares the right information with the vendor. As consumers look for and expect more ways to engage with businesses, companies are making the shift from the closed, protective world of IAM to the open, evolving, and confidently secure IRM universe. This is because identity and access management tools are a necessity for managing trust relationships with parties inside and outside of a company – relationships that are now tied directly to the business’ top line.
  • #18: Image sources: https://www.flickr.com/photos/bilal-kamoon/6835060992, https://www.flickr.com/photos/cicciopizzettaro/4297936934, https://www.flickr.com/photos/horiavarlan/4290549806, https://www.flickr.com/photos/80417459@N00/2471314610