2015 identity summit - tale of two views: b2c vs. b2e
TRANSCRIPT
TALE OF TWO VIEWS: B2C VS. B2ENovember 2015
Copyright © 2015 Accenture. All rights reserved. 2
The New Normal…
Copyright © 2015 Accenture All rights reserved. 3
P
P R
C E M R I
M P O R O S E V
O R N S N O L A
B O T O E C A C
I D E N T I T YL U X A I A I A
E C T L S L O W
T U I E N A
I A S D A R
V L E L E
E D
Digital business revolves around IdentityIntelligently sharing employee & customer identity data are promoted as ways to unlock more valuable services
Copyright © 2015 Accenture All rights reserved. 4
P
P R
C E M R I
M P O R O S E V
O R N S N O L A
B O T O E C A C
I D E N T I T YL U X A I A I A
E C T L S L O W
T U I E N A
I A S D A R
V L E L E
E D
Digital business revolves around IdentityIntelligently sharing employee & customer identity data are promoted as ways to unlock more valuable services
Identity enabled services are in demandBoth B2E and B2C seek to harness capabilities enabled by the consumerisation of identity
Copyright © 2015 Accenture. All rights reserved. 5
MarketTrends
Social
Digital Workplace
Social Identity
Mobile
BYOD Consumer Apps
Personalisation
Millennials Cross Sell
Contextual
Location Specific
Time Specific
Punching Above Your WeightIdentity management is expected to deliver more sophistication in a shorter timeframe
(1) Scale(2) Speed(3) SophisticationClients across industry are seeking more outputs from the investments being made
B2C demands elastic services that can rapidly expand to internet scale$
Copyright © 2015 Accenture. All rights reserved. 6
B2E demands SSO for Cloud adoption, integration with existing IAM, quickly catching up
on mobile enablement
MarketTrends
7Copyright © 2015 Accenture. All rights reserved.
Many Boards now identify identity management threats as a top risk to the business
Security must keep pace with technology innovation to protect and enable the business from Cyber Threats
B2E
• Orphaned accounts• Privileged users• Unmanaged service accounts
• Entitlement creep• Toxic pairs
B2C
• Scammers• Phishing• Bots• Identity theft• Rogue apps• Fraud
A Tangled WebMarketTrends
Identity Monitoring
Security Analytics
Intelligent Controls
B2E + B2C ConvergenceCustomer is king, whether the customer is the Employee or the Consumer
Copyright © 2015 Accenture. All rights reserved. 8
Employee Consumer
Primacy of the Customer
MarketTrends
Thank you, any questions?
Floris van den DoolManaging Director, Accenture
Information Security Services Europe, Africa and Latin America
Copyright © 2015 Accenture. All rights reserved. 9