A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Keep Me Safe, Make Me Happy (Part 3) Breadcrumb Home Insights Blog Keep Me Safe, Make Me Happy (Part 3) September 16, 2020 Keep Me Safe, Make Me Happy (Part 3) PART 3 OF PING IDENTITY PARTNER SERIES In the final installment of this series, Ping Identity’s Richard Bird looks at how security capabilities can do more than make your customers feel safe. By putting digital identity at the center of both security and experience, they’ll feel empowered and protected. In part 1 of this series, we started our journey toward understanding why customers want both security and great customer experiences by examining how customer expectations have changed in the past few years. Customers want more than just great digital experiences: they also expect companies to protect their privacy and security and legislative obligations requiring the same protections (part 2 of this series). Today we’ll conclude this series by explaining how frictionless and enjoyable customer experiences can only be achieved by addressing security first. A Sea Change in Customer Expectations In March, I shared survey results (as well as Apple’s announcement of better security and privacy for consumers using their products) as evidence of changing consumer attitudes. These insights truly pale in comparison to the realities and lessons we’ve since learned -- thanks to the global pandemic of 2020. Customer use of digital channels to interact with brands and companies exploded. The early days of the epidemic weighed heavily on companies like Netflix, Amazon and Zoom as they tried to accommodate accelerating demand from customers around the globe. The true test of consumer patience and security expectations manifested later. Fraudulent account takeovers boomed, from unemployment filings to stimulus checks to online shopping. 2020 has shone a harsh light on our ability—or inability—to provide customers with both security and excellent digital experiences. The result? Companies are moving faster than ever to address the gaps exposed during this crisis, specifically working to mitigate the risk of losing existing customers while attracting new customers. Keeping customers happy isn’t just a company platitude or marketing slogan anymore; it means staying competitive and staying in business. When we started this series together, the focus was to show how the customer world was changing and how we could use customer identity to improve security outcomes and create great experiences for them. But now convincing companies that such a change is good has been replaced by the urgent need to convince them that the change is necessary for survival. Achieving Frictionless Security So, how can we meet the dual requirements of higher security and better experiences? The key truly does rest with the security practitioner. This may sound counterintuitive since cybersecurity has frequently been referred to as “the office of no.” We can debate the fairness of that another day, although there’s certainly some technology-dictated truth to it. It’s a dangerous cyber world, and as a result, friction often happens by design. But friction can be the death of customer experience. With the arrival of multi-factor authentication and continuous or adaptive approaches to both authentication and authorization, the pathway to frictionless security has flattened out. Along with the rise of technical capabilities that can fundamentally change the way that we acknowledge customers and direct their flow within our systems, we’ve collectively arrived at the same conclusion about the fundamental weaknesses in our customer-facing security frameworks. If we authenticate the wrong person, bad things happen. Are you who you say you are? The answer to that simple question is the very core of security. With high confidence and assurance in the authentication of our customer, we can enable greater access and elevated levels of customer self-management. Rock-solid proofing of our customers’ identity during registration affords us the ability to more tightly couple the digital identity to the data associated with them. We have a much lower risk of authenticating the wrong person if we get the proofing exercise right at the onset of our relationship. Identity proofing and strong authentication are no longer isolated security measures; they’re business enablers for exponentially better customer experiences. With the surety that customers are who they say they are, we can now invoke additional security measures transparently in the background with much less or even zero friction for the user. For the first time in our digital history, “strong security” and “outstanding customer experience” can be used in the same sentence. Rich Digital Identities The evolution of identity-centric security technologies isn’t solely limited to authentication and proofing. Hybrid infrastructure and application deployment capabilities across on-premises assets and cloud now provides both the compute power and storage capacity to aggregate details about preferences, patterns, behaviors and characteristics of users. Building these deep digital profiles about a customer, citizen, partner or employee allows us to develop, for the first time, useful identity authorities to facilitate seamless and frictionless authorization flows for these users. Our security architectures can now leverage these identity authorities with even more precise authentication authorities: user-specific aggregations of critical information allow us to correctly authenticate that user with a high degree of certainty. The building of these rich identity authorities, in combination with powerful authentication authorities, provides a company with the type of actionable data that can be leveraged to create truly unique and personalized experiences at the individual customer level. The delivery of those enhanced capabilities is further facilitated by the ability to manage both secure access and a quality experience for the user by leveraging APIs. As we wrap up this series, we stand on the edge of a truly new frontier. We finally can create a more meaningful, useful and secure digital version of “you” that more closely aligns to the real-world, analog “you.” Let’s get started by calculating the value of an extraordinary customer experience. By: Richard Bird Chief Customer Information Officer | Ping Identity Richard Bird is the Chief Customer Information Officer for Ping Identity. An internationally recognized data privacy and identity-centric security expert and global speaker, he is a Forbes Tech council member and has been interviewed by the The Wall Street Journal, CNBC, Bloomberg, The Financial Times, Business Insider and CNN on topics ranging from privacy regulations and election security to cybersecurity-enabled consumer protection. Richard received the 2019 SC Media Reboot Leadership Award, recognizing outstanding global CIOs. His focus is strongly oriented to using his experiences to help corporations, organizations, governments and solution providers to truly change the framework of cybersecurity by shifting our focus to protecting people ahead of protecting “things.” Share: identity Partner Series Customer Experience Copyright © 2024 Optiv Security Inc. All rights reserved. No license, express or implied, to any intellectual property or other content is granted or intended hereby. This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information. Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards. Complaints / questions should be directed to Legal@optiv.com
Copyright © 2024 Optiv Security Inc. All rights reserved. No license, express or implied, to any intellectual property or other content is granted or intended hereby. This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information. Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards. Complaints / questions should be directed to Legal@optiv.com
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?