CIDM & EIDM Maxwell Blander & Mark Burton. Enterprise Identity Management Systems (EIDM) Traditional...

download CIDM & EIDM Maxwell Blander & Mark Burton. Enterprise Identity Management Systems (EIDM) Traditional ID systems Traditional ID systems Originally intended.

If you can't read please download the document

description

The Pitfall of EIDM EIDM technology cannot handle large sets of data Not equipped to handle large-scale consumer data Runs into problems with protecting and managing customer identities to support business growth. Internally focused rather than externally focused Deals with employees rather than customers

Transcript of CIDM & EIDM Maxwell Blander & Mark Burton. Enterprise Identity Management Systems (EIDM) Traditional...

CIDM & EIDM Maxwell Blander & Mark Burton Enterprise Identity Management Systems (EIDM) Traditional ID systems Traditional ID systems Originally intended to limit employee access to certain data sets depending on roles and responsibilities Originally intended to limit employee access to certain data sets depending on roles and responsibilities EIDM uses legacy (older) technology to accomplish this task EIDM uses legacy (older) technology to accomplish this task Automates routine actions and allows visibility into who is accessing internal applications Automates routine actions and allows visibility into who is accessing internal applications The Pitfall of EIDM EIDM technology cannot handle large sets of data Not equipped to handle large-scale consumer data Runs into problems with protecting and managing customer identities to support business growth. Internally focused rather than externally focused Deals with employees rather than customers Consumer Identity Management (CIDM) Newer version of Identity Management tool created for B2C companies Purpose is to manage access to consumer data Centralizes consumer data in one spot to prevent the occurrence of a data breach Reduce risk associated with multiple sources of consumer data CIDM Integrates multiple sources of consumer data into one location Gives companies a clear picture of each customer Faster processing speed CIDM technology has the capability to manage large amounts of consumer data CIDM As opposed to EIDM, CIDM supports data from multiple channels and applications CIDM gives customers the ability designate what data they want to share with a company CIDM allows customers to decide how they want the company to interact/share with them Provides security measures in the event of suspicious login attempts CIDM Deployment The broker model pulls data from many systems and creates a single view of the customer Under the broker model, separate systems continue to exist and operate, which can pose a potential security risk The federated or aggregated model compiles data from different systems into one central repository The federated model reduces security vulnerabilities by eliminating silos of data. CIDM vs. EIDM CIDM can preform some of the functions of EIDM, however EIDM cannot preform the large scale data management associated with CIDM. EIDM deals with employee access to data CIDM deals with managing large amounts of consumer data