Tamesis, The Glanty Egham
TW20 9 Surrey
Robert van der Meulen
+44 (1784) 267-892
Gartner Says Half of New Retail Customer Identities Will Be Based on Social Network Identities by 2015
Analysts to Explore Tomorrow's Identity and Access Management Demands at Gartner Identity & Access Management Summit 2013, 11-12 March, in London, UK
"For an increasing number of internet users, social networks are the internet. Using 'login with Facebook' - or other popular social networks - reduces friction and therefore improves users' experience of customer registration and subsequent login," said Ant Allan, research vice president at Gartner. "For registration, the required personal information can be imported from users' social profiles, reducing - if not eliminating - form filling. Moreover, using a social network identity means users don't have to remember rarely used passwords or endure convoluted password reset processes when they forget them."
Mr Allan added that organisations also benefit from the use of social identities for authentication. It reduces the number of abandoned registrations and logins, and makes it easier for customers to browse and buy. Therefore, it also helps organisations attract and retain customers.
However, the lack of identity proofing and weak authentication for social network identities can expose merchants to more fraud. Service providers therefore have to defend themselves. They may allow social network registration, but augment the process with additional controls when a retail site provides access to sensitive data and monetary transactions. Alternatively, merchants may accept the increased risk without additional controls because of the potential increase in the number of customers and the volume of purchases; this approach "passes the buck" to payment card companies - but they already have robust fraud detection and management tools and processes in place.
"It's important for IT leaders to remember that, despite the increased risk of fraud, social network identity proofing and user authentication are no worse than the practices currently used by many businesses. In fact, social network identities could offer better identity proofing than 'raw' customer registration. This is because social network analysis can potentially identify bogus social identities, and some vendors can exploit the 'wisdom of crowds' to verify claimed social network identities," said Mr Allan. "There will be increased demand for specialised vendors that support this use of social network identities, as well as for support for the OAuth and OpenID Connect specifications in traditional IAM vendors' web access management and federation products."
"However, using social network identities for authentication may not suit all organisations. Businesses offering consumer-facing services, as well as government agencies offering citizen portals, should assess the benefits of accepting social network identities for customer and citizen registration and login," Mr Allan said. "They must also weigh these against the risks posed by the lack of identity proofing and weak authentication for social network identities. Mitigating these additional risks may offset any cost savings."
Gartner analysts will explore these topics at the Gartner Identity & Access Management Summit 2013, 11-12 March, in London. For further information about the Summit, please visit gartner.com/eu/iam. You can also follow the event on Twitter at http://twitter.com/... using #GartnerIAM.
About the Gartner Identity & Access Management Summit
The Gartner Identity & Access Management Summit aims to identify the technology, tools and techniques needed to establish effective IAM programmes at a time when the Nexus of Forces - mobile, cloud, information and social - presents new challenges and opportunities to chief information security officers and IAM leaders.
Die Nutzung von hier veröffentlichten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Bei Veröffentlichung senden Sie bitte ein Belegexemplar an email@example.com.