2015 Identity Summit - Tale of Two Views: B2C vs. B2E

Post on 14-Apr-2017

1.185 views 0 download

Transcript of 2015 Identity Summit - Tale of Two Views: B2C vs. B2E

TALE OF TWO VIEWS: B2C VS. B2ENovember 2015

Copyright © 2015 Accenture. All rights reserved. 2

The New Normal…

Copyright © 2015 Accenture All rights reserved. 3

P

P R

C E M R I

M P O R O S E V

O R N S N O L A

B O T O E C A C

I D E N T I T YL U X A I A I A

E C T L S L O W

T U I E N A

I A S D A R

V L E L E

E D

Digital business revolves around IdentityIntelligently sharing employee & customer identity data are promoted as ways to unlock more valuable services

Copyright © 2015 Accenture All rights reserved. 4

P

P R

C E M R I

M P O R O S E V

O R N S N O L A

B O T O E C A C

I D E N T I T YL U X A I A I A

E C T L S L O W

T U I E N A

I A S D A R

V L E L E

E D

Digital business revolves around IdentityIntelligently sharing employee & customer identity data are promoted as ways to unlock more valuable services

Identity enabled services are in demandBoth B2E and B2C seek to harness capabilities enabled by the consumerisation of identity

Copyright © 2015 Accenture. All rights reserved. 5

MarketTrends

Social

Digital Workplace

Social Identity

Mobile

BYOD Consumer Apps

Personalisation

Millennials Cross Sell

Contextual

Location Specific

Time Specific

Punching Above Your WeightIdentity management is expected to deliver more sophistication in a shorter timeframe

(1) Scale(2) Speed(3) SophisticationClients across industry are seeking more outputs from the investments being made

B2C demands elastic services that can rapidly expand to internet scale$

Copyright © 2015 Accenture. All rights reserved. 6

B2E demands SSO for Cloud adoption, integration with existing IAM, quickly catching up

on mobile enablement

MarketTrends

7Copyright © 2015 Accenture. All rights reserved.

Many Boards now identify identity management threats as a top risk to the business

Security must keep pace with technology innovation to protect and enable the business from Cyber Threats

B2E

• Orphaned accounts• Privileged users• Unmanaged service accounts

• Entitlement creep• Toxic pairs

B2C

• Scammers• Phishing• Bots• Identity theft• Rogue apps• Fraud

A Tangled WebMarketTrends

Identity Monitoring

Security Analytics

Intelligent Controls

B2E + B2C ConvergenceCustomer is king, whether the customer is the Employee or the Consumer

Copyright © 2015 Accenture. All rights reserved. 8

Employee Consumer

Primacy of the Customer

MarketTrends

Thank you, any questions?

Floris van den DoolManaging Director, Accenture

Information Security Services Europe, Africa and Latin America

floris.van.den.dool@accenture.com

Copyright © 2015 Accenture. All rights reserved. 9