Social Network Privacy, Security and Identity:One
-
Upload
inflection-point-global -
Category
Data & Analytics
-
view
324 -
download
1
description
Transcript of Social Network Privacy, Security and Identity:One
![Page 2: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/2.jpg)
What’s on your customers’ minds?
![Page 3: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/3.jpg)
Risks:• Increased occurrence rate of identity theft• Social Engineering/Phishing• SPAM• Hacked accounts
Risks:• Cyber bullying• Sexual Predators• Reputation damaging posts and photos• Lost privacy over sharing of location data
3
A Typical Online Family
![Page 4: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/4.jpg)
• Over half of adolescents have been bullied online.1
• 20% of children on social networks have been approached by a stranger in a sexual nature.2
• Malicious Facebook “apps” are designed to lure children to give access to their personal data, making them more exposed to identity theft and privacy invasion.
41. i-Safe America Foundation – Cyber bullying statistics.2. Crimes Against Children Research Center.
Growing online threats for children
![Page 5: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/5.jpg)
35% of college admissions officers report finding something on an applicant’s social network page that negatively impacted their admissions chances.*
*Kaplan’s 2012 Prep Test Survey
![Page 6: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/6.jpg)
68% of employers have turned down a job candidate based on negative information found on social network sites.
![Page 7: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/7.jpg)
Personal Data Breaches
![Page 8: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/8.jpg)
LinkedIn users are
106% more likely to be a victim of identity fraud…
and social media users who check-in using GPS are
67% more likely.
![Page 9: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/9.jpg)
One PlatformOne APIOne Partner
Social Network Security
Reputation Management
Internet Privacy
Cyber bullying detection
Identity Theft Prevention
Personal Data Discovery and Control
Identity:One
![Page 10: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/10.jpg)
• Child Social Network Protection– Cyber bullying and sexual predator detection
• Adult Social Network Management– Monitor Reputation, Privacy, Security
• Social Language Analysis– Proprietary Social Network Threat Detection– Language analysis designed for social media
The Identity:One Platform
![Page 11: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/11.jpg)
• Consolidated view of all social activity– Photos, Posts, Tweets– See privacy settings on a per-post level
• Reputation Management – See how you look to others– Alerting to potential privacy infringements
• Identity Protection– Prevent Identity Leakage and Theft– Locate Personally Identifiable Information
Customer Benefits
![Page 12: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/12.jpg)
Alert and Action• Notify and alert users of
potential threats• Remove social activity and
photos
Analyze• Scan social network
profiles and activities for potential threats.
Monitor• Ongoing Monitoring
of Social Networks.
How it Works
![Page 13: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/13.jpg)
Privacy & Profile Alerts
Privacy AlertsPhone # Exposed
Email Address Exposed
Address Exposed
Date of Birth Exposed
Employer & Length of Employment Exposed
Current Position Exposed
IM Account Exposed
Hometown Found
Location data found in social content items
Privacy Settings of Posts and Photos
Content Related AlertsAlcohol & Drug RelatedProfanity and Vulgarity
SPAM
Bullying and Threats
Grooming (actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation for sexual activity with the child, or exploitation.)
Sexual in NatureHarm or other AbuseBigotry-RacismWeapons
![Page 14: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/14.jpg)
End User Actions
Remove Photos, Posts, CommentsBlock UsersUnfollowExpert Tips and Resources
![Page 15: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/15.jpg)
Developer Friendly
Rapid development• build and launch products in 6-8 weeks.
Create your own user experience• choose what features and alerts to integrate
![Page 16: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/16.jpg)
Build YourOwn Apps
Core Platform
Privacy & Security
Monitoring
The Identity:One Platform
Social Network Authentication Data Normalization Content Filtering
Alerts Customer Analytics
API for Partner Application Development
Behavioral Analysis
Identity Risk Analysis
Lead Acquisition & Customer
InsightCustom
![Page 17: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/17.jpg)
Improve Customer Experience
Increase Customer Acquisition & Retention
![Page 18: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/18.jpg)
• Social data is living and breathing– Send periodic summary emails recapping information that
you’ve monitored on their behalf:“Hi Mary, just wanted to let you know that last month we scanned over 1,200 posts and comments in your social networks. Great news, we detected no threats. Also, we know that you’re a busy professional and mom, so we thought you might enjoy these quick tips on...”
• Become a Trusted Advisor– Use their social profile information to create targeted and value
added advice and insight to your customers.
Create Meaningful Customer Experiences
![Page 19: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/19.jpg)
Use Social to get customers into your sales funnel
![Page 20: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/20.jpg)
• Provide website visitors a free social identity risk assessment.
• Social Authentication can increase web sign-ups by up to 90%1
• Build Trust. Build Your Sales Funnel.
Connect with more customers and prospects
1: Source, Gigya.com
![Page 21: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/21.jpg)
• Demonstrate Immediate Value to Customer– Low Cost to You, High Value to Customer = AWESOME
• Personalized Awareness of a Person’s Risk for ID theft. – Give them a reason to take the next step.
• Create Your Own Variations– Customize your assessment or Freemium offer to best position
your existing product offer.– I.E. – if you know they’re a parent of a young teen, position
Cyber Bullying prevention.
Identity Risk Assessment [Freemium]
![Page 22: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/22.jpg)
Sample Dashboards and Reports
![Page 23: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/23.jpg)
Easy and simple sign-up process
![Page 24: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/24.jpg)
Sample Alert Dashboard
![Page 25: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/25.jpg)
Cross Platform Alerting and Analysis
![Page 26: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/26.jpg)
Personal and Financial Information Discovery
A zoomed-in version
![Page 27: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/27.jpg)
Sample User Experience
![Page 28: Social Network Privacy, Security and Identity:One](https://reader033.fdocuments.net/reader033/viewer/2022060117/5586197dd8b42a88428b4ac7/html5/thumbnails/28.jpg)
Thank you