m&a transaction services - deloitte us...digital identity with data flowing freely within an...

8
Digital Identity 2020

Upload: others

Post on 01-Jan-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Digital Identity 2020

Page 2: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Digital Identity

With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the crucial point to manage, control, and govern access to data and applications. With growing digitisation, identity is no longer limited to humans and includes identities of computers, BOTs, mobile phones, devices, services, etc.

“Software is eating the world in all sectors; in the future every company will become a software company” (TechCrunch 2016, Marc Andreessen)

Every identity is a unique set of attributes that come together to identity as a entity. These unique attributes leave behind digital footprints that each individual/ organisation or device is online. With customer interaction becoming pivotal to a company's growth in these changing times it is important for organisations to embrace this digital transformation by redesigning their delivery and revenue models.

Now with the world becoming more digital, cloud and hybrid architectures have become a basic necessity for companies as well as personal use. With digital, the world is more connected via their mobile phones, Internet of things (IoT) devices are multiplying and it has spread across machines as well, BOT to Internet, service to service, etc., and everything boils down to identity, which is the most valuable thing to secure and is readily available, accessible and verifiable.

Person

Vehicle

Assets

Infrastructure

Service

Overview

Page 3: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Digital Identity core capabilites

Digital Identity is

A digital identity solution is an answer to the mayhem that digital transformation is bringing. This solution will be key to digital business determinations—for shorter time to value, better levels of employee engagement and customer satisfaction, evolving aspects of interconnectedness, privacy regulations, and the paradigm shift to the cloud.

• User onboard/off board

• Self-service access • Password management

• Delegated administration

• Group management • Access concierge service

• Single sign-on • Multi-factor authentication

• Password change • Application dashboard

• Registration • Consent mgmt.• Preference mgmt.• Identity proofing• Password mgmt.

Consumer Experience

Identity Lifecycle

User Access

Identity Governance

Privileged Access

• Role management• Meta-data mgmt.• Certification review• Remediation

• Session monitoring• Password vaulting• Emergency access• Command control

identity 2.0

Page 4: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Digital consumer experiences require

All digital businesses rely on customer insights, data from mobile phones, tablets, Point of Sale (PoS) systems and more sources to provide seamless customised experiences to its customers. This data may lead customers to tailor made solutions and experiences but it also makes them vulnerable to hackers and is a breeding ground for privacy breaches. It's important how one designs the architecture systems to ensure optimal experience in a safe and secure way.

Below you will find a digital customer identity solution and what it encompasses:

Capture and manage customer identity from various data sources in a secure manner, and control customer access to applications, systems, and services.

Collate the data into a single view of customers, which can provide input to other applications, and aid in personalised marketing, sales forecast, and product enhancements.

Provide consistent and seamless experience to the customers irrespective of the device, channel, or media they choose to interact with.

Identify and address unusual activity quickly by coupling multifactor authentication with adaptive and analytics based capabilities such as anomaly detection.

Consent management feature embedded within the solution provides an enhanced customer experience by giving them control on how and where their data can be used, as well as

digital identity

Page 5: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Across industries, satisfied customers spend more and stay more loyal over time

Profile Users

Build Trust

Create Value

Enhance Security

Digital Identity

Digital Identity needs to break the clunky solutions into micro-services and Application Programming Interface (API) based offerings to keep pace with the increasing demand. Customers may be reluctant about storing their data digitally, on the cloud, hence an adaptive approach will balance security and risk mitigation.

keeps pace with demand

Cost of adoption & cost of ownership According to Gartner clients can save up to 30% in the initial integration costs and 40% in overall professional services over a three- year period when they use an identity solution architected in the cloud. (Gartner IGA MQ 2018).

Outcome based pricing A digital identity approach means clients can go from choosing features and functions to managing outcomes. Clients can adopt the service proportionally to the usage based on the volume of users and the volume of service they need.

Best practices & knowledge arbitrage Software alone does not unlock the value of a service. Digital Identity can aggregate and provide best practices from a broad set of clients. Every client has a evolutionary impact enhancing the DNA Of the service.

Time to value According to Gartner clients can get as much as a three-month time to value advantage by architecting IGA (Identity and Governance Administration) in the cloud.

One size fits most vs one size fits all Clients looking to simplify IAM today are faced with either choosing public cloud SaaS solution which accommodates only a fraction of the use cases needed or a hosted solution. Digital identity provides the benefits of both models.

Economies of scale Cloud management services that scale up to manage large volumes Of environments can provide more service at a lower base price.

01

02

03

04

05

06

Page 6: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Digital identity

The inter-networking of various technology-enabled devices, an IOT infrastructure in all sectors is capable of generating large amounts of data. A digital identity solution will support in managing the super admin identities and user access to the IoT infrastructure. The business landscape in digital identity is meant to provide a seamless walk through experience across the spectrum. It has to evolve beyond its traditional back-office roots to a new vital business enabling and profit-generating role.

Below is the list of identity services that Deloitte offers:

• Access Management of enterprise applications in Mobile devices

• IAM for IoT such as Cars and other smart devices

• Authentication of IoT devices based on PKI certificates

• Use of inbuild IAM APIs in smart devices for user authentication and self service

• Role based physical access for perimeters and facilities

• Integration of Logical identity and access management solution with physical Access management

Automation of IAM processes to improve efficiency using Automation tools Securely Manage BOT identities in environment • BOT identity Password Management • BOT identity Access Management

End to end Automated Lifecycle Management for User Identities • Inclusion of emerging trends of Customer, Cloud and social identities

• Self Service, user Password Management

• Directory Services • Custom Connectors

Implementation of Role Based Access Controls • Centralized portal Of all enterprise apps for users

• Single Sign On for in house or third party applications, Federation

• Advance Authentication • Use of Social Identities for Enterprise

Implementation of Privileged Access Management across Enterprise Infrastructure and Applications • Implementation Of PAM covering Infra, Apps, Network

• Inclusion of PAM for BOT identities • Manage Application to Application/Service accounts

Identity Services from Deloitte

enables every industry

Physical Access Management

Mobile and IOT Identity

Management

Robotic Process Automation

User Identity Access Management

Privileged Access Management

Access Management

Identity Services

Page 7: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Across industries, satisfied customers spend more and stay more loyal over time

• Gartner Magic Quadrant, “Identity and Access Governance”, 2017

• Gartner Magic Quadrant, ”Identity and Access Governance”, 2018

• Forrester, The Future of Digital Experiences, 2018

• Forrester, The Future of Identity And Access Management, 2019

• Forrester, Top Trends Shaping IAM In 2019, 2019

• Patel, Jeetu, “Software is still eating the world”, TechCrunch 2016

• Gartner, Critical Capabilities for Access Management, 2019

• Gartner, Identity and Access Management Primer for 2019

• https://www.theceomagazine.com/business/innovation-technology/ciam-revolutionising-customer-experience/

• Forrester, Risk-Centric Identity And Access Management Process Framework, 2019

References

When clients embark on a mission to use software in any business initiative, it is almost sure that there will be an identity management opportunity that intersects the delivery of the service.

Deloitte Digital Identity reduces security risk and improves audit compliance by delivering five

capabilities.

On-board/off-board, change job role & map employees to apps & data

Verify the user is who they say they are by credentials, multi-factor, biometrics, behavior

Access privileges within applications or systems, read/write access, admin access

Tracking "who did what" and providing visibility & pattern analysis to detect fraud

Providing visibility on user access and periodic review to prevent excessive access

Administration01

Authentication

Authorisation

Audit

Attest

02

03

04

05

Page 8: M&A Transaction Services - Deloitte US...Digital Identity With data flowing freely within an organisation and the disappearing boundaries between networks, identity has become the

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms.

This material has been prepared by Deloitte Touche Tohmatsu India LLP (“DTTILLP”), a member of Deloitte Touche Tohmatsu Limited, on a specific request from you and contains proprietary and confidential information. This material may contain information sourced from publicly available information or other third party sources. DTTILLP does not independently verify any such sources and is not responsible for any loss whatsoever caused due to reliance placed on information sourced from such sources. The information contained in this material is intended solely for you. Any disclosure, copying or further distribution of this material or its contents is strictly prohibited.

Nothing in this material creates any contractual relationship between DTTILLP and you. Any mutually binding legal obligations or rights may only be created between you and DTTILLP upon execution of a legally binding contract. By using this material and any information contained in it, the user accepts this entire notice and terms of use.

©2020 Deloitte Touche Tohmatsu India LLP. Member of Deloitte Touche Tohmatsu Limited

Key Contacts

ROHIT MAHAJANPresident Risk Advisory

[email protected]

North GAUTAM KAPOORPartner Risk Advisory

[email protected]

East PRITI RAYPartner Risk Advisory

[email protected]

National

Regional

West ASHISH SHARMAPartner Risk Advisory

[email protected]

South GAURAV SHUKLA Partner Risk Advisory

[email protected]

ANAND VENKATRAMANPartnerRisk Advisory

[email protected]