Forrester CIAM
Forrester CIAM
Forrester CIAM
Key Takeaways
forrester.com
Table Of Contents
2 CIAM Is Critical To Customer Experience
CIAM Connects Marketing, Business, And
Security Teams
August 4, 2015
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
Before
Informatio
Price
Location
Customer s
s
Institution
Now
Technolog
y
Institution
s
Informatio
Price
Location
Customer
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
Worst-performing CX leaders
Best-performing CX laggards
2007
2008
2010
2011
2012
2013
2014
100%
50%
0%
a
tn
Ae
Bo
rd
e
rs
(B
P
(A )
ET
)
om eB
ca ay
st (EB
(C A
M Y)
C
C
om
SA
fo
)
rt
In
n
C (CH
ig H
Ba
na )
rn
(C
es
I)
&
C N
ab ob
le le
C
vi
ha
si (BK
rte
on S
rC
(C )
om
VC
m
)
un Ta
ic rg
at et
io
ns (TG
(C T)
H
TR
JC
)
C Pe
om n
n
ca ey
C
ha
st (J
rte
(C CP
M )
rC
C
om J
SA
m CP
)
un en
ic ne
at
io y (J
ns C
(C P)
H
TR
)
-50%
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
better and help with mapping out and understanding customer behaviors and underlying needs.
If the business continuously understands these customer needs, it can build a long-term loyal
customer base.
Feeds customer analytics that can help grow your business. Your firm wants to generate and
grow revenue and develop intelligence about customers that it can use to drive upsell/cross-sell
opportunities.6 According to our data, 49% of global business and technology decision-makers
in the Forrester Business Technographics survey say improving the use of data and analytics
technology is a high priority for their firm (see Figure 3). This is why so many firms are investing
heavily in analytics to drive deeper customer relationships. CIAM solutions help build that bridge
between marketing and line-of-business owners. As an example, CIAM solutions can deliver
consolidated reports and analytics around user demographics, social registration and login data,
behavioral data, and revenue activity (purchases, purchase amounts, and ad clicks), allowing
organizations to gain a true 360-degree view of the customer that can drive incremental revenue.
Acts as a link between security and marketing teams. Line-of-business and marketing teams
can no longer manage customer identities in isolation from their S&R counterparts. This is where
CIAM comes into play and can serve as a critical integration and collaboration point between
security and marketing teams to deliver an optimal customer experience. One example is the
ability of CIAM platforms to complete an automatic account deletion if a given users social identity
credentials are compromised. This autodeletion helps facilitate compliance with privacy regulations
and helps protect sensitive customer data.
Loosens marketings purse strings. As more and more marketing professionals and line-ofbusiness stakeholders become involved in discussions with S&R professionals on how to formulate
and implement a successful CIAM strategy, they bring not only their usability concerns but also
their budget. S&R professionals tell Forrester that the budget that marketing and lines of business
can inject into a starving IAM budget can quickly reinvigorate and boost CIAM efforts.
Connects digital operational excellence and digital customer experience. CIAM solutions help
build the bridge between marketing and line of business to deliver platforms that keep customers
delighted while simultaneously delivering actionable data to the business in a risk and privacy
sensitive manner. Employees and contractors also need to work on customer records so CIAM
connects digital operational excellence and digital customer experience.
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
FIGURE 3 Plans Focus On Data And Analytics To Retain And Grow Their Customer Base
Critical priority
36%
33%
29%
23%
12%
9%
27%
26%
13%
9%
8%
7%
22% 7%
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
CIAM access governance processes mainly tie to marketing not security. B2E IAM spends
a lot of resources on access governance (e.g., periodic audits and access recertifications). In
CIAM, attestation processes are usually suppressed or put on a back burner because marketing
doesnt want security to hurt the DCX by revoking certain access rights or privileges from customer
accounts.
Solution sets for B2E IAM and CIAM dont align. The ability to help maintain a consistent user
experience is what drives a lot of interest in CIAM solutions. Many S&R pros tell Forrester that even
though they have successfully deployed IAM for employees, the demands and needs of customers
are so different that they need an alternative solution, one that can more closely align with business
and marketing and deliver the capabilities needed for a unified cross-channel view across disparate
applications and web properties.7
CIAM has a greater need for scale than B2E IAM. Although many firms have successful
enterprisewide employee IAM deployments, that number is in the tens or hundreds of thousands of
active users; the user populations of leading online consumer properties are 10 to 50 times larger.
This creates numerous architectural challenges, as CIAM solutions must be able to support login
flows and personalization/preference management for hundreds of thousands, even millions, of
online consumers.8
Customers still want to maintain some level of control over their identities. In employee
IAM, the security teams create centralized security and privacy policies that they propagate to
employees. In CIAM, customers want and expect to be able to control and manage how the firm
uses and shares their personal information.
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
August 4, 2015
the identity repository. Gigya gives business users the ability to visualize, query, and segment user
data for use in marketing campaigns, through direct integrations with more than 50 marketing and
service applications.
IBM extends a B2E IAM solution to CIAM. IBM offers both on-premises IBM Security
Access Manager (ISAM) and Federated Identity Manager (TFIM) and cloud-based (IBM Cloud
Identity Service) CIAM solutions. IBMs CIAM solutions scale to millions of users, support social
identity registration and login, and provide context-based access control and flexible strong user
authentication to help defend against the latest web-based security threats. Data can be exported
into third-party tools for further analysis.
Janrain excels at customer profile management and API-based operations. Janrain is a SaaS
offering that provides registration and consumer profile management services via prebuilt and
customizable screens, an extensible database schema used to host user data, and RESTful APIs.
Janrain provides rich web-based dashboards to view individual and aggregated customer insights,
and dozens of prebuilt integrations to deliver demographic and psychographic insights into other
marketing systems for marketing purposes.
Ping Identity delivers an identity platform to help its customers deliver CIAM. Consumers
access applications using the included portal and mobile application or quickly integrate with
their custom applications or portals. Ping integrates with a wide range of identity stores and social
identity providers. Consumer identities can be managed in its SaaS-based cloud directory or
software-based identity data store provided through a reseller partnership with UnboundID.
Salesforce provides a complete platform for CRM with identity capabilities. Salesforce offers
its Salesforce Identity solution for free or at a discount for its CRM and non-CRM clients and
includes support for federation, account provisioning, single sign-on, and strong authentication. It
also provides robust APIs for integration with the Salesforce platform and customizable reporting
for customer activities.
Stormpath focuses on authentication and single sign-on services. Stormpath is an
authentication and user management API service that offers user registration, workflow,
authentication, authorization, group access control, fine-grained permissions, user store, session
management, and SSO capabilities. Stormpath can be accessed as a traditional SaaS offering
(public or private cloud), or as on-premises deployment.
UnboundID strengths include CIAM data management, security, and scalability. The
UnboundID Platform provides capabilities to on-board users and capture, store, sync, aggregate,
protect, maintain, and leverage consumers identity and preference data across applications/
channels. The platform allows customers to self-manage privacy and preference choices, provides
centralized policy-based data governance, and offers real-time visibility into operational metrics
and preference data such as opt-ins/outs. The platform provides REST APIs and deploys on
traditional or virtualized infrastructure and a range of private/public/hybrid clouds.
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
10
August 4, 2015
Vendor
Corporate
headquarters
Product
name
Gigya
Mountain View,
California
Customer Identity
Management Suite
5.6
IBM
Armonk,
New York
GA date of
currently
shipping version
Product
architecture
June 2015
SaaS
IBM Federated
Identity Manager (TFIM) TFIM: February 2015
V6.2.3 or IBM Cloud
CIS: June 2015
Identity Service (CIS)
On-premises or
SaaS
Janrain
Portland,
Oregon
Janrain Customer
Identity Management
Platform
2014
SaaS
Ping Identity
Denver,
Colorado
On-premises or
SaaS
Salesforce
San Francisco,
California
Salesforce Identity
February 2015
SaaS
Stormpath
San Mateo,
California
Stormpath
Enterprise Edition
Not provided
by vendor
SaaS
UnboundID
Austin, Texas
UnboundID
Platform 5.1
June 2015
On-premises or
SaaS
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
11
August 4, 2015
Recommendations
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
12
August 4, 2015
Analyst Advisory
Supplemental Material
Survey Methodology
Forresters Global Business Technographics Priorities And Journey Survey, 2015, was fielded to
14,596 business and technology decision-makers located in Australia, Brazil, Canada, China, France,
Germany, India, New Zealand, the UK, and the US from SMB and enterprise companies with two or
more employees. This survey is part of Forresters Business Technographics and was fielded from
December 2014 to March 2015. ResearchNow fielded this survey on behalf of Forrester. Survey
respondent incentives include points redeemable for gift certificates. We have provided exact sample
sizes in this report on a question-by-question basis.
Each calendar year, Forresters Business Technographics fields business-to-business technology
studies in 10 countries spanning North America, Latin America, Europe, and Asia Pacific. For quality
control, we carefully screen respondents according to job title and function. Forresters Business
Technographics ensures that the final survey population contains only those with significant
involvement in the planning, funding, and purchasing of business and technology products and
services. Additionally, we set quotas for company size (number of employees) and industry as a means
of controlling the data distribution and establishing alignment with IT spend calculated by Forrester
analysts. Business Technographics uses only superior data sources and advanced data-cleaning
techniques to ensure the highest data quality.
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
13
August 4, 2015
Salesforce
IBM
Stormpath
Janrain
UnboundID
Ping Identity
Endnotes
The age of the customer is here. To prove this, we analyzed recent economic and survey data and reviewed the
practices of over a dozen companies that have made customer-focused transformations. We found that customers
are now more mobile, consume more reviews, and buy more online than ever before. Companies must respond by
becoming customer-obsessed and adopting four mutually reinforcing market imperatives: 1) Get a quick start by
embracing the mobile mind shift; 2) attain maximum customer intelligence by turning big data into business insights;
3) seek a broad impact by transforming their customer experience; and 4) become more effective by accelerating
their digital business. This transformation happens locally, from the bottom up, and globally, with the backing of the
CEO, CIO, and CMO. For more information on empowered customers, see the Winning In The Age Of The Customer
Forrester report.
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and
improved customer engagement. However, you must do so while protecting customers privacy and shielding them
from fraud and other malicious activities. To do this, security and risk (S&R) pros need to design security controls that,
ideally, improve customer experience, or at a minimum, dont detract from it. Passwords and traditional out-of-wallet
questions are go-to security measures but are weakening by the day. Moreover, because consumers are task-oriented,
going in and out of apps and other services quickly, these clunky security controls are no longer acceptable. There
are a number of security technologies that will have a major business impact on mobile initiatives, but perhaps the
most significant and promising is mobile authentication. Using a combination of new sensors, biometrics, and physical
device characteristics, mobile authentication will help preserve the trust customers require in a digital economy. For
more information, see the Transform And Protect Your Customers Mobile Moments With Seamless Authentication
Forrester report.
Forrester recently published updates to its US digital marketing forecasts, including search engine marketing, display
advertising, social advertising, and email marketing. This report examines overall US digital marketing spending
through the lens of these forecasts, which extend to 2019 and detail how spending will grow within each advertiser
industry and across search and search engine optimization (SEO), display, social, email, and mobile. We explore
the data and key trends that digital advertisers, agencies, and publishers must be aware of in the second half of the
decade, including the maturation and specialization of search and display, the rising tides of social and mobile, and
the commoditization of SEO and email. For more information, see the Digital Will Win The Day, But Which Channels
Will Win Digital? Forrester report.
Trust is the most critical component to develop and maintain a healthy brand. Customers are more likely to trust
experts, friends, and relatives than marketing campaigns. B2C marketers must deliver visible value with their brands
and do so consistently across all channels, with mobile taking a lead role. As marketers will need to use more personal
data to power mobile and contextual experiences, we expect consumer distrust for brands to increase. For more
information, see the How Will People Trust You? Forrester report.
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
14
August 4, 2015
Business leaders dont think of digital as central to their business because in the past, it hasnt been. But now your
customers, your products, your business operations, and your competitors are fundamentally digital. While 74% of
business executives say their company has a digital strategy, only 15% believe that their company has the skills and
capabilities to execute on that strategy. A piecemeal strategy of bolting on digital channels or methods is no longer
sufficient. As an eBusiness leader, you know change is needed. You must take a lead in driving digital business
transformation. You must think of your company as part of a dynamic ecosystem of value that connects digital
resources inside and outside the company as needed to compete. You must harness digital technologies, both to
deliver a superior customer experience and to drive the agility and operational efficiency you need to stay competitive.
For more information, see the The Digital Business Imperative Forrester report.
Source: Retail Banks Invest In The Cross-Channel Consumer, eMarketer, March 27, 2015 (http://www.emarketer.
com/Article/Retail-Banks-Invest-Cross-Channel-Consumer/1012284).
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your
customers cant register for or log into your website, mobile app, or phone system, or if they cant conduct low- and
high-risk transactions easily, the effort youve put into the architecture and development of these channels will be
irrelevant: Frustration will drive those customers to your competition. To assess both the security and usability of CIAM
tasks across a multitude of customer engagement channels, Forrester developed its CIAM security maturity model.
For more information, see the Introducing Forresters Customer IAM Security Maturity Assessment Model Forrester
report.
Even a small company with modest B2E IAM needs (for example, in the media space) can have huge CIAM
requirements, such as servicing hundreds of thousands of customer login attempts in an hour.
This report focuses on SaaS vendors that deliver CIAM services. It is important to note that vendors such as CA
Technologies, ForgeRock, Microfocus/NetIQ, Oracle, RSA Security, and other IAM vendors also offer on-premises,
Internet-scale IAM solutions that can address consumer-oriented use cases.
Increasingly in 2014, IAM has become a tool not just for security but also business agility. Competitive challenges
push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
These trends create pressing provisioning, authentication, and authorization challenges for S&R pros while compliance
requirements and breaches and other security threats continue to swell. This report recommends that S&R pros apply
a Zero Trust information security model to IAM to unify and improve access control across the extended enterprise.
For more information, see the Navigate The Future Of Identity And Access Management Forrester report.
10
Amid the talk of big data, privacy, and personal clouds, another important trend has emerged: Consumers are
increasingly aware of the data they create as they move about the Web and engage with businesses and with
each other. Forrester believes that these trends will usher in a new era of consumer-managed data, and that a new
framework personal identity and data management (PIDM) will drive how, when, and why consumers share their
data with organizations. The PIDM playbook addresses the tools, technologies, responsibilities, and requirements
that customer insights (CI) professionals will need to adopt to build trusted relationships and ensure success in a new
era of consumer-managed data. For more information, see the Prepare For A World Of Consumer-Managed Data
Forrester report.
11
12
Other IdPs provide similar mechanisms. Source: Add Facebook Login to Your App or Website, Facebook Developers
(https://developers.facebook.com/docs/facebook-login/v2.3).
Forrester survey data showed that the average shopping cart abandon rate was 54%. For more information, see the
The State Of Retailing Online 2013: Key Metrics And Initiatives Forrester report.
13
2015 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
[email protected] or +1 866-367-7378
15
Technology Management
Professionals
CIO
Application Development
& Delivery
Enterprise Architecture
Infrastructure & Operations
Security & Risk
Sourcing & Vendor
Management
Technology Industry
Professionals
Analyst Relations
Client support
For information on hard-copy or electronic reprints, please contact Client Support at
+1 866-367-7378, +1 617-613-5730, or [email protected]. We offer quantity
discounts and special pricing for academic and nonprofit institutions.
Forrester Research (Nasdaq: FORR) is one of the most influential research and advisory firms in the world. We work with
business and technology leaders to develop customer-obsessed strategies that drive growth. Through proprietary
research, data, custom consulting, exclusive executive peer groups, and events, the Forrester experience is about a
singular and powerful purpose: to challenge the thinking of our clients to help them lead change in their organizations.
122926
For more information, visit forrester.com.