Digital Identity: Federation, Integration and Deployment of Trusted Identity Solutions Ryan Fox : JULY 19, 2014.

Slides:



Advertisements
Similar presentations
Copyright © 2005 – Clickshare Service Corp. All rights reserved. Payment Aggregation & Affinity Management Clickshare for the Media Industry For more information.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Improving the sharing of NICE content via syndication: what the future could hold Andrew Fenton CIO NICE 20 March 2014.
Ruckus Smart Wi-Fi for Retail
The GSMA July 2014 Restricted - Confidential Information
NIELSEN CONSUMER 360 JUNE 2013 EVOLUTION OR REVOLUTION: THE IMPACT OF DIGITAL ON SHOPPERS AND STORES.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Company and Services Overview. Overview of UBL Suite of Services Flexible Pricing Partnering with UBL Ease of Integration Open Discussion.
1. THE TRANSLATION NETWORK Case Studies 2 THE TRANSLATION NETWORK6 Intel OSTC uses Drupal for localization for the Tizen initiative into 6 languages.
Digital ID and Authentication Enabling Services for the Digital Economy IDENTITY NORTH November 20 th, 2012 Dave Nikolejsin Government.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
JENNY CRAIG'S SUCCESS WITH SIEBEL AND ORACLE COMMERCE Eric Matson, IT Director of Enterprise Architecture – October 1, 2014.
InterAct™ Business Overview LexisNexis presentation June 2013 InterAct Proprietary and Confidential.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Esri UC 2015 | Technical Workshop | Land Records Maps and Apps for State and Local Governments Chris Buscaglia Scott Oppmann.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
·
THE MOBILE CHANNEL IN FINANCIAL SERVICES TARIK HUSAIN BUSINESS DEVELOPMENT DIRECTOR ASIAN BANKER SUMMIT APRIL 2011.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Shibboleth: An Introduction
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Amdocs Unified Communications solution FAQs.
Identity Assurance Emory University Security Conference March 26, 2008.
Ecommerce Mobile Apps.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Case Study: Driving Commerce with Custom Data Targeting & Offers.
MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS © 2011 Wolf & Company, P.C. The Future of Technology in Financial Services Matt.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Company Profile. Who are we? Headquartered in Abu Dhabi – UAE, Smart Prestige was founded by a team of talented and achievement oriented professionals.
Consumers’ Association Engaging with Online Consumers Allan Williams Senior Communications Policy Advisor
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
Digital Inclusion & Readiness: Role of Libraries John B. Horrigan, PhD Pew Research Center June 2015.
/RestaurantDotOrg /NationalRestaurantAssociation Restaurant.org.
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
DIGITIZING OUR WALLETS Digital Wallets for E-Commerce Development.
© 2016 IBM Corporation How to grow from a smart solution to a smart city Smart Cities – Driving a New Economy: How to grow from a smart solution to a smart.
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
Master the MULTI-SCREEN WORLD.
Mastercard Identity Check Mobile
5 Strategies to Win Business and Stay Competitive
Web Application Development
Data and Applications Security Developments and Directions
Frictionless Commerce....
Master the MULTI-SCREEN WORLD.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Chatbot Market to reach $1.34bn by 2024: Global Market Insights Inc.
FORECASTED ONLINE GROWTH VS IN STORE GROWTH
Proven Track Record Enhancing the User Experience just used your new facial recognition software on my iPhone.
312MKT International Marketing
E-Commerce for Developing Countries (EC-DC)
Computer Services Business challenge
Operator Based Authentication
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Digital Identity: Federation, Integration and Deployment of Trusted Identity Solutions Ryan Fox : JULY 19, 2014

 Founded by two Army Rangers in 2010 to help brands offer special loyalty programs to affinity groups like: Military, Students, Influencers and Professionals  Capable of securing offers delivered online, in-store and via mobile  Consumer- centric network empowers a consumer to bring their own identity to third party apps in order to receive personalized offers. CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me WHO WE ARE Leaders in Digital Identity Technology CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 2

AWARD WINNING SOLUTIONS Our Accomplishments  Department of Commerce for a $2.8M grant as one of the five companies in America with the most advanced digital Identity technology  Finalist for 2013 Wall Street Journal Startup of the Year  Named US Chamber of Commerce & Spike TV’s “Most Veteran-Friendly Small Business in America” in 2013  March 2013 Raised Series A round of $10 million led by USAA, Silicon Valley Bank  Recognized in Entrepreneur Magazine’s 2014 edition of 100 Brilliant Companies  2014 Finalist for LinkShare Advertiser’s Choice Golden Link Award CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 3

ID.me Operates as Digital Identity Bank Allowing Users to Leverage their Identity Data as Renewable Currency CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 4 Interoperable Secure User Controlled Privacy Enhancing Affordable

Driving Adoption of Identity Solutions Identity matters to everyone… BUT - For different reasons… …and based on context CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 5

Effective solutions must view their value through multiple lenses Understanding business challenges is key… CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 6 Security / IT E-commerce Public Sector Protect… Enable…

CASE STUDY Under Armour Military Loyalty Program  Under Armour integrated ID.me technology to create an omni-channel customer experience  Customer verifies affinity in real-time and claims discount directly in cart  Under Armour had a military discount program in-store but was unable to provide the program online because they couldn’t verify customer affinity CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me7

CHECK OUT INTEGRATION Under Armour Example CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me8 Veteran verifies with ID.me to receive discount Member claim is verified and credential is issued Veteran sees button on UnderArmour.com 1 2 3

Identity Alone Will Not Drive Adoption CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 9 It’s all about the attributes Business value is often driven by the data/attributes associated with an identity Network effect allows for the identity to be build out over time – reducing friction associated with user on- boarding Identity = Unique Collection of Attributes

Interoperability and Trust….Kinda CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me 10 Remote identity proofing technologies are very ‘configurable’ Protocol usage – mileage may vary No RP enforcement (e.g., single log out) Compensating controls associated with Levels of assurance leave ‘equivalency’ up for interpretation by each RP

Standards are only the beginning… CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me11 Underlying protocols are the first, foundational step Developer adoption of the technology is a key barrier Open source solutions must emerge that provide simple integrations for consumption of the trusted credentials – app deployment, gems, etc. will lower the barrier of entry

Questions… CONFIDENTIAL & PROPRIETARY INFORMATION OF ID.me12