RSS feed Get our RSS feed

News by Topic

digital identity

Results 1 - 25 of 49Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Aug 02, 2017
Beyond a customer’s digital profile is their real-world identity. Knowing this information and how it fits into the full customer journey is critical. Along with in-store purchase data, you can also gain insight into their brick-and-mortar buying habits, like the time of day they’re most likely to shop, the average time spent in a store, the frequency of their visits or the categories of products for which they shopped.
Tags : digital marketing, personalised content, customer nurturing, cross channel analytics, adobe, in-store interactions
     Adobe
By: Adobe     Published Date: Feb 08, 2016
Digital Marketing’s Creative Promise, a new Adobe white paper, shows you the link between creativity and profits. Learn how to make your brand’s creativity shine and business revenue soar.
Tags : adobe, marketing, creative, digital, profit, brand identity, roi, emerging marketing
     Adobe
By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 25, 2019
Heutzutage zählen die Identität der Kunden und die damit verbundenen persönlichen Daten zu den wichtigsten und wertvollsten Ressourcen jedes Unternehmens. Die Verwaltung dieser digitalen Identitäten (von der ersten Registrierung und Anmeldung bis zu den späteren Phasen der Kundenbeziehung) und die Verwertung der dazugehörigen Daten sind komplexe Aufgaben, die häufig als CIAM (Customer Identity and Access Management) bezeichnet werden. Wenn Unternehmen ein System zur Erfassung, Verwaltung und Nutzung von Daten zu digitalen Identitäten und Kunden implementieren, haben sie grundsätzlich zwei Möglichkeiten: Sie können ein eigenes Produkt entwickeln oder eine dedizierte Lösung von einem auf CIAM spezialisierten Anbieter kaufen. In diesem Whitepaper finden Sie eine detaillierte Analyse der CIAM-Implementierungsoptionen, darunter Folgendes: ? die wichtigsten Voraussetzungen für ein erfolgreiches CIAM-System für Unternehmen ? Vor- und Nachteile verschiedener Varianten der CIAM-Implementierun
Tags : 
     Akamai Technologies
By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss
     ArcSight
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
     DigitalPersona UK
By: Entrust Datacard     Published Date: May 13, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services provide digital certificate and identity management solutions that bring together all certificate services, tools and security under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud.
Tags : entrust, digital certificates, cloud services, identity management, security
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.
Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?
Tags : mobile, digital identity, platform, geographies, verticals, cultures, secure, desktop pc
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication
     Entrust Datacard
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Jun 14, 2017
Document signing certificates enable organizations to digitally sign Adobe, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered.
Tags : 
     Entrust Datacard
By: Esker     Published Date: Jul 09, 2019
Digital transformation of P2P processes doesn’t just mean using the latest technology to check boxes or implementing automation for automation’s sake. Rather, it is a philosophy that drives action and brings new levels of speed and efficiency to businesses that choose to embrace it.This 2019 Levvel Research report is equipped with valuable insights and powerful statistics about the digital transformation of P2P cycles and will guide you through topics including: Current P2P practices & where they fall short The evolving state of procurement and AP culture, identity & technology Features & benefits of P2P software solutions
Tags : 
     Esker
By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
     Experian
By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : revenue generator, digital growth, identity management, customer-focused
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : irm, management, time-to-market, forgerock, revenue generator
     ForgeRock
By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : ibm, blockchain, electronics
     IBM
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics