Striving for a New High Water Mark in U.S. Data Privacy Policy: Part 2

In a continuation of my first post around privacy and the rising tide of global data regulation, I explore why “leaning in to consent” is the best way for U.S. companies to ensure smooth sailing with their customers amid the murky waters of data policy innovation.

emaler Wed, 09/05/2018 - 15:45

Humans, Bots, & Trust: Leveraging Threat Intelligence

Threat intelligence gives your security team the ability to balance trust and risk to achieve harmony between customer choice, usability, and data security. Check out how to get it done in the latest video in our Intelligent Authentication series:

 

Read More »

How Telcos Can Reinvent in a 5G World

Before jumping into the exciting identity provider opportunities now facing telecom companies, let's briefly discuss the concept of a "Digital Native." My guess is that by now, everyone is familiar with the concept: someone born and raised amongst the widespread use of digital technology. By contrast then, the rest of us (pre-dating 1985-ish) are ‘Digital Immigrants’, destined to struggle in this new digital world order.

Read More »

The IoT Opportunity: DBS Bank

In this Hot Topics episode, Chief Innovation Officer at DBS Bank, Neal Cross, discusses the IoT opportunity his company is pursuing: utilizing IoT products to improve relationships with their clients.

rhumphrey Wed, 08/22/2018 - 16:00

Learn the Next Generation Skills for Digital Identity

Do you want to learn the skills required for the next generation of digital identity? If so, ForgeRock University has just refreshed its entire curriculum - starting with a series of core concepts classes that teach you all the new features of the ForgeRock Identity Platform. The curriculum then progresses to a new series of ‘deep dive’ classes; the first two will be on Agents and Advanced IDM connector configuration. The curriculum then progresses on to the advanced developer classes for ForgeRock Access Management and ForgeRock Identity Gateway.

Read More »

Striving for a New High Water Mark in U.S. Data Privacy Policy: Part 1

In this two-part series, I look at the deluge of personal data, the rising tide of global regulation and where the U.S. must drop its proverbial data policy anchor to build long-term customer trust.

Read More »

Device Context is Key to Productivity

People are constantly on the move; changing networks, devices, time zones, even several times per day. Mobility shouldn't keep us from being productive, right?

Read More »

User-Managed Access in Action

Historically, saving for retirement was fairly straightforward for the average worker: he or she would probably only work for a small number of employers during their careers and could usually keep track of their pensions without too much confusion.

NCaley Thu, 08/16/2018 - 02:47

Login Freedom: The Advantage of Giving Users Choice

How many headaches have you endured due to a forgotten password? Me? Too many to count. At the end of a busy week I just want to kick back and watch a movie online -- problem is I’ve been logged out and can’t remember my password. A one-time password sent to my mobile phone may suffice but will still require me to type using my phone and remote control. If I could choose, I would use Face ID or Touch ID authentication methods which already exist on my mobile device.

Read More »

eSIMs: The KYC Challenge & Self-Service Identity

In many countries around the world there is a regulatory requirement to capture and authenticate name and address data for every mobile phone subscription; be it contract or pay-as-you-go [PAYG], with or without a new device included in the deal (e.g. SIM only). Typically, this ‘Know Your Customer’ [KYC] regulation needs a document check of a valid government issued form of Photo Identification; Passport, Driving Licence, or ID Card for example.

Read More »

There are no upcoming events.