Identity as a Business Enabler

This week, the annual RSA conference will take place at Moscone Center in San Francisco. This event is admittedly one of the largest security conferences in the world and Covisint will have a strong presence. Come visit us at booth #1927.

From Utility to Asset

Security and Identity Management used to be non-exciting, IT-driven methods of securing the perimeter of an organization and protecting the integrity of its resources, assets and data.

Under the combined effects of three major trends — digital business transformation, extended global enterprise and consumerization of IT — identity management is shifting to the core of digital businesses.

Initially a means to manage user identities and manage access to systems or services, it is now used to uniquely profile these users, track their needs and behaviors, and drive efficiency and engagement. No wonder that 68% of enterprises report a budget increase in their IAM investments, according to a CapGemini survey (2016).

Diverse Use Cases

The identity and access management market has traditionally been segmented into 3 types of use cases:

Type Target Users Main Use Case Main Examples
B2E Employees Single sign on into internal and external (cloud, on-prem) apps and systems Workforce SSO
B2C Consumers Access various internet resources and websites with existing consumer profiles or consistent username/password combinations Social Login
B2B Business Partners
Enterprise Users
Access third-party systems and share trusted information using a single set of credentials Identity Federation
Identity Brokerage

Their lines are increasingly getting blurrier and the Covisint Identity platform supports these main scenarios, with a unique optimization for the “outside in” B2B use cases, such as:

  • Third-party access to apps
  • External access to SaaS data
  • Industry exchanges
  • Consortia & alliances
  • Joint-ventures
  • Franchisors

As more business is done digitally and with more parties inside and outside, leading organizations should consider 5 key factors when reviewing IDaaS (identity as a Service) solutions:

  1. Ability to securely share information with a large network of external organizations
  2. Built-in support for external organization constructs and managing access at different levels (user, organization, application)
  3. Cross-organization delegated administration supporting n-level organizational hierarchy
  4. Out of the box support for integration, from cloud to enterprise WAM and legacy applications
  5. Ease of use and easy of support from a truly cloud-native vendor

Watch Andras Cser VP & Principal Analyst at Forrester Research and I discuss the new opportunities that Identity Management can unlock for digital businesses.