Blog EN

Blog EN

Proving digital identities clearly through artificial intelligence.

Digitale Identität mithilfe von Gesichtserkennung nachweisen

Using so-called authentication options, such as face recognition, it is possible to verify digital identities clearly.

Proving digital identities clearly through artificial intelligence.

What is a digital identity and how should a company deal with digital identities? Learn how important customers’ digital identities are today and how comfortable their management can appear in the age of AI and ML.

The term “digital identity” is no longer a strange word for most companies. Nowadays, companies are more and more challenged to efficiently manage the digital identities of their numerous users. Unfortunately, cyber criminals are enriching themselves on the digital identities of real people and posing as them on the World Wide Web. Especially in the high-involvement product segment, the unique proof of identity of a person is indispensable for almost all companies. This article covers the theoretical background of the concept of identity and evaluates technical implementations of digital identity checks.

What is a digital identity?

Every person has a unique identity. So-called identity attributes define identities and make them unique. In real life, identities are described by means of attributes such as character traits, appearance, gestures or general personal data. Attributes of this kind no longer exist as soon as a real person moves around on digital platforms in the World Wide Web. People have numerous digital identities, one for each platform (social networks, online shops, forums, account variations, etc.). Digital identities, in contrast to their real counterparts have electronically recordable identity attributes. These are divided into three categories:

  • Possession: IDs, cards, terminals, chips, papers, …
  • Knowledge: Names, dates of birth, addresses, client numbers, PINs…
  • Inherence: Biometrics, genetics, facial expressions, gestures, …

Possession attributes are considered the most insecure to date, as material objects such as ID cards or papers can change ownership very easily and identity thieves have an easy job of it. Knowledge attributes can be communicated and thus fall into the wrong hands. The safest way to disclose attributes of inherence is to declare them, as they are bound to a specific person, can hardly be shared and can only be replicated with great effort.

For a successful, digital authentication of identity on the Internet, identity attributes are assigned to a specific person. One of the most common processes of this kind is known to many as the “username + password” on request. The correct entry of these knowledge attributes is then assigned to the real person so that authentication can take place. This process is described as digital or electronic identity verification.

Did you know?

Even devices can have digital identities, within the framework of IoT (Internet of Things). Alexa, Cortana and Siri are just a few of the famous examples of devices that have their own identity attributes and can be integrated into processes. Also, in the smart home and office area, electronic devices are used which are authenticated by their device ID alone and can pass a digital identity check.

Due to the rapid development of cybercrime, it is important for companies as well as for everyone to protect their data and to act proactively. Digital identities today should meet individual security requirements, as criminals can use a stolen digital identity to gain entry, access or access to secured resources or impersonate someone else if the theft is successful. Depending on the size of the company, the resulting damage can quickly run into millions.

 

How are digital identities protected?

There are numerous measures for the protection of digital identities. Depending on the confidentiality of the data to be protected, which can be stolen when accessing an identity, different complex authentication options are used. In addition, specific misuse scenarios must be taken into consideration, such as the duplicate creation of digital identities, the intentionally false depositing of personal data or the violation of data protection law when processing personal data. Each of the authentication methods has specific advantages and is selected differently depending on the application.

Classification Normal Confidential of dataNormalConfidentialPersonalSensitive
DescriptionGeneral dataCommercial data (accounting, strategic plans, etc.)Identification information (e-mail address, date of birth, address, biometrics, etc.)Sensitive information (political opinion, religion, health, at contract signing, etc.)
Recommendation for accessEasy authenticationPassword less authentication2 Authentication factor (passwordless)Unique identification by badge and biometrics
Current authentication optionsPassword, Social Login, WebAuthnTOTP, IVR, biometrics, SmartCard, client certificate, Smart PushSocial login + Face ID, password + IVR, etc.By post office, video chat, AI
Cyber riskMedium-LowLowVery lowAlmost none

How to verify digital identities clearly?

The progressive digitization of all branches of the economy is also evident in the Digital 20’s in very data-sensitive sectors such as the financial and banking sector, which continuously have new requirements regarding the keyword “know your customer”. The demand for user-relevant and convenient identification solutions is therefore becoming ever greater. The most innovative possibility of digital identity verification is identification using artificial intelligence and machine learning. Smart, digital identity verification is replacing older procedures due to the added value for customers and the numerous advantages in the future.

ComfortSecurityCosts
SpeedTime frameRequired technical knowledgeCyber riskData protectionFor companiesFor users
Mailing addressTravel times, queues, service staff (30 min +)Limited to opening hoursNoneNoneGDPR- compliant€€€None
VideoidentCompletely digital, service staff (5-10 minutes)Tied to service employeeInternet, camera-enabled device, support by service staff, app obligationeIDAS compliantGDPR- compliant€€€None
Identification through artificial intelligenceCompletely digital, automated (max. 2 minutes)24/7, AutomatedInternet, Camera-enabled device, Automated, convenient processeIDAS compliantGDPR compliant, automated transfer into systemsNone

 

Why digital identity verification?

To prove the correctness of the digital identity and compliance with the real identity clearly, a digital, unambiguous procedure, such as the verification of an identity document, is required. Due to the flexible procedure and the extremely high user comfort, an independent digital identity verification maximizes the conversion rate. The consumer is not torn out of the individual customer journey and does not have to move cross-media. The reactive nature of the recipient’s information intake is completely avoided. The user is provided with a concrete increase in value. The result is satisfaction and loyalty.

The above-mentioned advantages are especially given by a digital identity check using artificial intelligence.

  • + Specific AI algorithms ensure highly secure authentication
    During the identification process, the artificial intelligence compares biometric aspects of the ID with the corresponding real person and checks the ID for security features that confirm the authenticity of the document.
  • + A unique, comfortable user experience is created
    There is no need for contact with a second person because the process is completely automated due to machine learning. Thus, the verification for e.g. the conclusion of a contract can be carried out at any time, any place and on any camera- and internet-enabled device.
  • + Process costs are significantly reduced
    The costs per identification case are significantly lower than with previous procedures, outsourcing of external labour can be resolved and internal employees experience an increase in work efficiency. The extraction and maintenance of personal customer data can be easily provided with the help of well-thought-out interfaces.
  • + Digital identity verification using modern AI with the cidaas ID Validator is both eIDAS and GDPR compliant

 

Which applications exist for digital identity verification?

Financial service provider

Financial service provider

Fast identity verification, for instance for the flexible opening of accounts, the safe transfer of large sums of money or the taking out of loans.

Insurance

Insurance

Conclude or extend insurance online contracts conveniently, quickly and secure.

Automobile industry

Automobile industry

Digital identity proof in form of a driver's licence for example rental cars, car sharing or leasing. Mobile has never been so safe!

Entertainment industry

Entertainment industry

No more fake profiles! Identity checks for applications, proof of age for entertainment content and leisure activities with age restrictions (e.g. gambling or age-restricted film content).

Educational sector

Educational sector

Online verification for students for applying for digital exams or to enrol for the first time.

e-Commerce

e-Commerce

Conclude credit agreements easily and conveniently during the ordering process and indulge in dream products. Also, the conclusion of mobile phone contracts or the creation of customer and shopping credit cards is no longer a problem.

The cidaas ID Validator – the Digital 20’s AI innovation

An innovative solution for digital identity verification represents the cidaas ID. Validator With the help of artificial intelligence and machine learning, users can be identified in a most comfortable, secure and unique way. Thus, highly sensitive data can be comprehensively secured and processed. The ID Validator works in three steps.

  1. Face recognition: Scan of biometric data and verification of the authenticity of the person.
  2. ID card scan: recording the information and biometric data. Check for authenticity and validity.
  3. Intelligent analysis: comparison of the collected data and seamless, GDPR-compliant transfer of the data to the company’s systems.

Conclusion and outlook – The future of digital identities

The management of customers’ digital identities represents already a central element in all companies and should be integrated as an integral part of business processes. The digitalization megatrend has produced digital identities that can already be so-called microtrends. In order to reach new customer segments and maintain existing customer bases, trends should be picked up – especially with the trend “digital identities”, an „Identity and Access Management System“ can provide significant support. For this reason, the implementation of such a system can be regarded as a priority one. The following points represent the focus topics of an IAM solution.

An Identity and Access Management System can be a basis for the maintenance of all digital identities of different stakeholders (customers, employees, and suppliers). With a modern Identity and Access Management solution, data security, user comfort, and user insight management can be combined on one platform. It opens the doors for efficient and sustainable management of millions of users.

cidaas
identity is everything.

Facebook
Twitter
LinkedIn
Instagram
Blog EN, Real World Identification

Tante Emma 2.0 – The unique customer experience, thanks to the linking of the offline and online worlds

Who still remembers it? The little shop around the corner where “Aunt Emma” was still standing behind the counter selling everyday essentials to her customers. The special thing about these shops was that “Aunt Emma” often knew her customers from an early age and therefore knew exactly what their preferences were and what they liked to buy. She knew when the budgie needed new food again and which type of bread was eaten by all family members. And obviously, the inevitable “candy” to eat on the way could not be missed!

Today, “Tante Emma“ or the traditional “mom and pop“ stores have largely disappeared from the scene. The changes that the retail industry, in particular, has undergone in the course of digitalization are immense. Communication, sales and customer contact takes place predominantly in the digital world. As a result, shopping no longer starts at the doorstep of the store.

Digitalization of the POS bridges the gap inorder to present a continuous customer journe

One thing that has not changed and has in fact gained relevance with increasing digitalization: Understanding the customer and his needs. In the online world, personalized advertising is already common practice and is regarded as the decisive success criterion. In the offline world, i.e. in the real world, there is often still some catching up to do. The digitalization of the point of sale represents a “must-have” for a successful future for retail companies, because in the physical world the same principle applies, as in the digital world: Only those who know their customers do business. Tante Emma (Aunt Emma) already knew this!

The touchpoints that customers access today before making a purchase are manifold. They cannot be limited to online or offline, but rather consist of a mix of both the worlds.

The word of the hour is: Omnichannel. Customers shop conveniently using a tablet or PC from home, on a smartphone while on the move, or – even today – visit a stationery shop. For retailers, this means that they now have to cater to all channels. Many have already done so and offered their customers not only stationery stores but also online shops and smartphone apps as digital customer cards. What many still lack, however, is the link between the digital and the real world in order to make the customer journey consistent and the customer experience unique.

Connecting the real world with the digital world – quite easily: with CIAM and Location Based Services

Thanks to modern location-based service technologies, customers can be identified at the POS via their devices with the help of apps. A Customer Identity and Access Management (CIAM) serves as an interface between the localization technology and the device/app and can uniquely identify the customer. This enables retailers to address their customers at the POS in the same personalized way as they do today on online channels. In addition to the unique authentication of customers, a CIAM also offers a 360° view of user data, thus providing a consistent shopping experience across all channels. This also turns the stationary shop into a networked world of experience.

Geo-Fencing

With geofencing, a certain area around the shop is virtually fenced in. If a registered customer enters this zone, he is recognized via GPS and automatically receives targeted marketing messages such as the indication of a discount via push messaging, SMS or email on his mobile device.

Beacons

Beacons are small mini transmitters and are often used within stores to mark certain areas, analyze them or, like geofencing, trigger messages to customers in the store. In contrast to geofencing, the beacon range is rather limited.

NFC (Near field communication

NFC is a wireless transmission technology that is mainly used today for mobile payment. However, NFC technology can also be used to communicate offers or product information to customers. The technological developments presented in the field of information transfer make it possible to locate customers or their mobile devices. But how do the little helpers manage to determine the identity of the customer and trigger marketing messages according to their taste? This is exactly where a CIAM system comes into play.

Omnichannel Experience for Customers

By using a customer identity management system, touchpoints – whether online or offline – are synchronized and linked to the real identity of the buyer. If a buyer has been known in the “online world” for a long time, Real World Identification at the POS allows this digital customer profile to be linked to the actual person – making the purchase an omnichannel experience for the customer:

  • Real-world identification: thanks to smart information technologies, the real person can be linked to the digital identity as soon as the person approaches the shop
  • Proximity Marketing: through holistic user profiles, targeted campaigns can be managed, which in turn leads to a
  • Higher conversion due to individual addres

In this blog post we have described how a CIAM can get the customer journey going and sustainably contribute to a higher conversion rate.

Thanks to CIAM, the stationary shop has become a networked world of experience.

The Customer Journey has become more multifaceted in times of Omnichannel retailing

Retail is changing: online trade is booming, but over-the-counter trade also remains an important sales channel. Consumers no longer want to have to choose between online and offline, but prefer to use all sales channels in parallel. The key to continued success in the future can clearly be summarized by the key words “Omnichannel” or “Synchronization of touchpoints”. Where digital touchpoints such as online shops or apps merge with traditional customer contact points, the customer experiences the “Tante Emma feeling” of the past and will always remain a loyal customer.

Are you a retailer and would like to learn more about the use of customer identity management at your POS? Simply book a non-committal appointment for a meeting

Blog EN

Digital identity is the key to successful digitalization

The digitalization of processes is a challenging task. The topic of security in the digital space is primarily an important criterion for the further development of one’s own digital transformation. The protection and management of digital identities is therefore a central key function.

At the heart of the new, mostly digital business models lies the customer or his digital identity and direct contact with him. A digital identity cannot just be a customer, a partner or an employee. In Industry 4.0, too, the direct involvement of the customer and his devices takes centre stage in the business process. As a result, a machine or service also has a digital identity.

Many companies, especially medium-sized ones, continue to focus on the protection of classic end-points. The protection of the digital identities of users (such as customers, partners and employees) or “things” (such as machines and applications) is still neglected. The secure digital identity for man and machine is a key prerequisite for a complete digital transformation and to tap new business areas.

Digital Identity as a central asset for a fully digitalized value chain

In Technical Report No. 114 of the Hasso Plattner Institute for Software Systems Engineering at the University of Potsdam, digital identities are described as follows: “Digital identity is a collection of electronic data to characterize an internet user with a physical identity. Data belonging to a digital identity are e.g. user name, e-mail address, home address, account number, password etc. and are referred to as attributes. A physical user can exist on the Internet with many different digital identities (different username, different e-mail, etc.)”.

Digital identities are required so that users or machines can access services. This requires that persons or objects uniquely identify themselves.While in the real world this can be done via an ID document for example, in the virtual world it is much more difficult to ensure that the digital identity belongs to the corresponding physical user.

Secure authentication of digital identities through Two-Factor-Authentication

So how can the misuse of digital identities be prevented?

Authentication can be performed based on knowledge, ownership or biometrics. The former represents the classic known username/password query. Since both, companies and consumers, are becoming more and more afraid of identity theft and too simple or identical passwords often favour this, the latter two methods are becoming more and more established. In biometric queries, fingerprint, face or iris in the eyes of real people are scanned and compared with the stored identity. Since these are unique to each person and very difficult to forge, this type of authentication is the safest.

For convenience purposes, it is recommended to use an adaptive 2FA. The additional factor is only queried if particularly sensitive data is accessed or if access appears unusual, for example outside normal times or from an unusual location.

Digital identities require end-to-end identity management

Digital identity is a key element of the new technology trends and is significantly involved in the digitalization of the value chain. By placing identities at the heart of your business, you can acquire new customer segments and make existing processes within a company more efficient.

As a result, Customer Identity and Access Management (CIAM) is becoming increasingly significant. With a modern CIAM solution, the aspects of data security, user comfort and knowledge of the customer and his behaviour can be combined on one platform.

A customer identity and access management system can form the basis for customer-oriented digitalization efforts. It enables end-to-end identity management, helping to manage millions of users.

These aspects can thus be controlled centrally:

  • Data security through secure authentication procedures (also passwordless)
  • Simple and convenient onboarding into all channels and services (e.g. through social login)
  • GDPR-compliant consent management
  • Personalized marketing communications in real time

In a nutshell: A good CIAM solution brings IT, marketing and sales together and contributes significantly to the success of the company. The future also presents new challenges for medium-sized businesses and the complexity of the data is increasing. Targeted identity management is therefore an essential requirement for any organization that has a digital presence in any form.

Blog EN

Happy Birthday GDPR

The new data protection regulation turns 1 year old

The new edition of the European Union – General Data Protection Regulation (EU-GDPR) celebrates its first anniversary today.
But even one year after it’s coming into force, many still ask what exactly is behind the GDPR and the effects it has on companies and the management of personal data.

The Data Protection Act of the European Union, in effect since 25 May 2018, is considered one of the most important changes to data privacy regulations. It defines how the personal data of EU citizens must be handled. In short, citizens now have more rights to know their data, that companies store and can have the data deleted upon request. Businesses, on the other hand, must ensure that data is handled in a lawful manner and make the processing of personal data more transparent and secure. The regulation comes with clearly defined penalties for non-compliance – companies could be fined up to 4% of their annual global turnover or €20 Million (whichever is greater).

Less progress in compliance with the data protection regulation

One year after the GDPR came into effect, there was no major wave of warnings, but more than 59,000 violations were reported throughout Europe. A study by the Digital Association Bitkom e.V. also shows that so far only 24% of all German companies have fully implemented the GDPR. This leads to the conclusion that many companies still have difficulties in fully implementing and complying with the Data Protection Regulation.

The successful implementation of the GDPR remains a major challenge.

The hurdles that companies still face today are more or less the same as they were a year ago:

  • Numerous data silos: Companies often store personal customer data across multiple systems. This makes it very difficult to gain a holistic view of personal data and the corresponding processing of data.
  • Incomplete Self-Services: The GDPR stipulates that the personal data of people should always be up to date – preferably by leveraging the function of self-service. Due to the data silos that companies have, this becomes an impractical challenge.
  • Insufficient data governance: Access to data must be mapped in all applications via centralized data access policies. In most cases, these role-based access privileges, which should be built according to the “need to know” principle, are not comprehensively implemented across the operational file system.
  • Lack of data security: The GDPR requires the implementation of technical and organisational measures (TOM) to protect data. Many companies have not yet fully complied with these security requirements, which include data encryption.

Customer Identity and Access Management helps you become GDPR-compliant

For companies that have not yet completed their GDPR homework, the implementation of customer identity and access management software such as cidaas is the optimal solution for managing digital identities on a single unified platform.

CIAM makes you GDPR compliant at one go:


Figure 1: cidaas centralizes the management of your digital identities on one platform

  1. Management of consents
    Informational self-determination of every single individual provides the basis of the GDPR. As soon as the data subject gives his unambiguous consent, or a legal allowance is granted the data processing is permitted (principle of prohibition).

    • Companies should collect the consent of the data subject at the start of data collection e.g. during the registration process or if a change of the purpose of use occurs (art. 6 (1) point (a) GDPR)
    • The data subject can withdraw his or her consent. The withdrawal shall be as easy as giving consent (art. 7 (3) GDPR)
    • The company must provide a proof of consent on request (formal requirement, mandatory record) (art. 7 para. 1 EU-GDPR)

    cidaas fully supports you in the management of consent preferences and offers you the possibility to send stored personal data (PII= personally identifiable information) to your customers at the push of a button.

  2. User Self-Services
    According to Art. 5 para. 1 d), personal data must be factually correct and, if necessary, up to date. Furthermore, all reasonable measures must be taken to ensure that personal data which are inaccurate with regard to the purposes of their processing are deleted or rectified without delay (“accuracy”).
    So why not give the customer himself the control over it? After all, he knows best about his personal data.

    With cidaas, you return control over data management to the user and
    thus ensure that the data is up to date.

  3. Data Security
    Art. 32 of the GDPR requires the implementation of technical and organisational measures (TOM) to protect data. However, what this means exactly and what actions must be taken to ensure data security is not specified in more detail.

    A CIAM solution such as cidaas guards personal data and protects it from unauthorized access through procedures such as two-factor authentication (2FA) and biometric registration procedures. Furthermore, the integrated role and group management of cidaas makes it possible to trace exactly who accessed which data and which changes were made. Thus every data entry, change and deletion can be traced, as required by Art. 5 para. 1 EU-GDPR.

  4. One identity across multiple channels
    In order to comply with the stricter regulations of the Data Protection Regulation, companies must abandon stand-alone applications.

    Customer Identity and Access Management consolidates the existing data silos and enables the management of all user data on one platform.

Data protection can only be achieved through targeted identity management.

In the past, data protection was a fringe issue, but today violations are penalized with heavy fines. As current studies show, the implementation of the GDPR still has gaps in many companies today.

By using a Customer Identity and Access Management solution, you can master the technical requirements of the Data Protection Regulation.

Have you still not completely fulfilled the requirements of the GDPR and still need support in its implementation? Contact us or start today with our free cidaas Freeplan

CIAM Guide: What need to be considered when choosing a Customer Identity and Access Management solution?

Find out in our guide which criteria you should consider when making your decision.

Blog EN

Data protection and process optimization – how do they go hand in hand?

Implementation of Identity and access management in the Healthcare industry

The EU-GDPR is already live in action and no industry would be spared. The healthcare sector is hence forced to strictly adhere to the regulations, failing which, a huge penalty could be imposed. Companies that have a digital presence are wary of it – up to 4% of the annual turnover of the organization could be levied in the event of non-compliance.

It is claimed that medical records are worth more than credit card information in the black market– and the strict enforcement of such data protection regulations that come in the wake of data breaches is not surprising. In the light of digitalization, the best way to remain compliant and protect digital assets is to adopt the right digital strategy – to be precise, the best option is to embrace a CIAM (Customer Identity and Access management) product that offers the highest standards of security and facilitates regulatory compliance through a robust consent management system.

The Healthcare industry involves a diverse group of stakeholders that includes doctors, pharmaceutical companies, medical insurance companies, medical engineering companies, medial diagnostics providers etc. and most importantly, the patients. By implementing an Identity and access management solution, the cumbersome task of managing roles, accesses and privileges of such a varied group of users is simplified, thereby helping organizations focus on their core activities and the same time be compliant to all local and regional data privacy regulations. The use of latest biometric techniques to support authentication and authorization only enhances security further.

One such solution is cidaas, a product from WidasID GmbH that could be easily integrated into any existing software. With cidaas, we are committed to providing data protection in a highly regulatory environment by implementing proven and advanced industry standards in line with exemplary security models without compromising on user convenience. This way, company-specific or industry-specific international regulations can also be covered. The use of state-of-the-art biometric techniques to support authentication and authorization only further increases security – and companies can focus on their core tasks.

In this white paper, we take you through the challenges and intricacies associated with implementing the EU-GDPR guidelines and how a smart CIAM solution can be leveraged not only for ensuring compliance but also to optimize and enhance existing processes and systems – improve authentication, manage accesses and privileges and simplify the various other process workflows.

An intelligent CIAM solution like cidaas can be used in the healthcare industry not only for identity management but also to ensure regulatory compliance and at the same time optimize existing workflows. This white paper shows you how.

Blog EN

Arriving at the perfect Identity and Access management solution

Is identity management really required – this question no longer arises for many companies. The use of Identity Management has become a fundamental functional requirement in every organization, that has a digital presence of any form. This realization stems from the fact that customer identities and related personal data are considered the most valuable assets, that help companies take data-driven marketing and other business decisions. Companies have myriads of options when it comes to choosing the perfect identity and access management solution. Organizations have various options to choose from – Either build a proprietary identity solution with available in-house expertise or adopt a commercially available off-the-shelf cloud-based solution that would satisfy all the business requirements.

Many a times, the advantages of opting for a readily available identity management system outweigh those of creating such a solution from scratch. The major benefits include:

  • Technical Expertise
  • Ready for immediate use
  • Significantly shorter implementation time
  • Saves time, costs, effort and human resources
  • Solution remains up-to-date always and without downtimes
  • Bridging personal bottlenecks
  • You can concentrate on your core business.

There are a number of CIAM solutions available in the market today – The key to choosing the product that suits your organization the best is to clearly understand your requirements. In order to outline your exact requirements, it is essential to have a fair idea on the basic functionalities a CIAM solution is expected to deliver, the value-added functionalities it could deliver and how you could leverage the features through customization to suit your individual needs.

cidaas-en

The above figure depicts few of the major functionalities that need to be seriously considered while assessing a CIAM solution. To get more insights into all the factors that should be well-thought of, if you plan to go for an identity and access management solution, read through our freely downloadable CIAM Buyer’s Guide that will give you a better picture of the capabilities of a CIAM solution, what to look out for, and will hopefully help you define your individual requirements better.

This white paper sheds light on the potential advantages of adopting a readily available CIAM product various aspects that one should consider while choosing a CIAM solution.

Blog EN

The Payments Directive PSD2 – deadline is approaching! Is your authentication solution ready for it?

What is PSD2?

PSD2 follows the original Payment Services Directive (PSD) that was adopted by the European Union in the year 2009. This regulation breaks the monopoly of banks on their customers’ data and represents an important step towards “open banking”. The new EU regulation directs financial institutions to open up their interfaces and give third party providers (TPPS) access to customer data. The third parties could leverage the data to create new & innovative services to enhance customer experience. This results in new services, such as the initiation of payments directly from an online shop – obviously, with the consent of the account holder or the customer. In short, the new EU directive aims to boost competition in European payments, encourage innovation and make money transfers more convenient and secure.

But this is nothing new and has been known for a long time. But slowly things are getting serious. The deadline to implement PSD2 is only a few days away and banks have to provide a technical interface including a test environment for payment initiation services and access to their customers’ account information. For established financial institutions, the new directive would mean both opportunity and risk.

The implications - What to keep in mind

The new directive that is set to revolutionize the payments industry, poses technical challenges to banks- Banks will have to ensure that they have the right infrastructure to support secure data-sharing across all channels via APIs and other services to TTPs while providing a strong authentication solution to secure payment transactions. There is no much time left, as by March 14, 2019, financial service providers are expected to provide a PDS2 test environment and the deadline to be PSD2-compliant, September 2019, is fast approaching.

The requirements are not really new

The challenge of secure data exchange and unique authentication is not new. Many companies outside the banking sector have already implemented this in the past. However, this is the first time that the financial services industry has been forced to interface with third parties. In order to implement the regulatory requirements accurately and on time, banks should rely on a partner who has the necessary expertise from completed customer projects and can implement the PSD2 requirements quickly. cidaas, our Customer Identity and Access Management solution (CIAM), delivers the required functionalities out-of-the-box. A comprehensive feature set ensures PSD2 conformity and the cloud service can be easily integrated into any existing IT landscape.

Secure and seamless authentication with cidaas

Based on the OAuth2 and OpenID connect standards, cidaas guarantees the secure access to accounts (XS2A) required in the PSD2 context as well as the required SCA – strong customer authentication. cidaas relies on strong multi-factor authentication methods, which also include biometric factors such as face, voice, fingerprint etc. in its two-factor authentication.

Within the framework of the PSD2, special attention must also be paid to data protection regulations. Payment service providers should process the customers’ personal data only upon obtaining their consent. The respective account-holding organization must check the consents and ensure that they are accessible and editable by the end customer himself at any given point in time. By default, cidaas supplies all features necessary for the administration of the consents. Financial institutions can thus obtain and manage the obligatory consents of the customers and at the same time grant access based on their defined preferences.

Are you impacted by the upcoming PSD2 guidelines and still need help implementing them? Please feel free to contact us or start with our free cidaas Freeplan

Read what Thomas Widmann, CEO of WidasConcepts, has to say about PSD2 and the importance of an identity and access management solution for secure and unique customer authentication.

cidaas helps financial institutions meet the requirements of the PSD2 regulation while ensuring a consistent strategy for the digital transformation of financial services providers. Read our factsheet to know how we do it.

Blog EN, Real World Identification

Identity and Access Management: The business driver to boost sales in the Retail industry

Customer Identity Management is the recipe for success when it comes to making Customer Journey safe and exceptional
Yael Widmann, Business Development

With the retail industry being one of the worst hit by the digital disruption wave, the most dynamic retail brands are becoming more customer-centric. Today’s digitally empowered customers yearn for more – they expect a unique shopping experience each time. Hence providing exceptional omnichannel experience has become one of the most critical goals that retailers have to achieve. A diverse range of digital & physical shopping options would only mean a diverse and humungous amount of data to manage! And this is exactly why Identity and Access management has evolved over time into a “must-have” critical business enabler that not only provides the omnichannel experience but also makes the organization more successful.

So how is such an omnichannel experience accomplished?

The customer is given the same identity across all channels, enabling the delivery of a personalized shopping experience while ensuring data protection

Easy and convenient registration for better conversions

Asking users to fill extensive forms, requesting for verification at the initial stages of the customer-conversation and the like are things of the past – In today’s digital world, this is enough reason for customers to turn to other competitors who provide them seamless access to their services.

Cidaas enables an easy and convenient registration process

  • Social Login allows the end user to register with their Social network accounts.
  • Progressive or intelligent profiling allows the creation of forms with minimal data entry requirements
  • Single Sign On (SSO) enables end-users to log on to all devices and platforms

In short: With the login and registration features, retailers are sure to make an impressive start with their customers!

Holistic User profiles to identify your customers, understand them better and provide a unique shopping experience

To begin with, understanding your customer, their behavior & interests and insights into their decision-making traits would prove crucial in delivering the experience of their choice – to keep them hooked to your business.

Cidaas CIAM solution plays a pivotal role here – like fixing the pieces of a jigsaw puzzle, cidaas analyses each of the interactions of the customer in course of time, join the dots and assesses if it was the same customer who made all these interactions and, with the help of its “progressive user profiling”, incrementally & step-by-step, builds a holistic profile of the customer. This helps is delivering personalized content and the appealing experience to the user that results in brand loyalty.

Connecting digital and real-world identities: Real time marketing across all channels

cidaas goes one step further and enables the identification of digital customers in the real world – Thanks to the feature “Real World Identification”. A link between the two identities (real world and digital) can be accomplished with the help of installed IP cameras, beacons or NFC-based devices such as smartphones. This extends the Omni-Channel experience to include the stationary point-of-sale and allows retailers to run targeted marketing campaigns.

Consider the scenario in which the customer is in the vicinity of your store – cidaas leverages beacons to identify the customer and correspondingly present customized offers on his registered mobile devices, that entice him into visiting your store. Or, say, the customer is already in your store – cidaas could inform the customer about special offers or discounts.

Want to track customer traffic within your store? Cidaas uses NFC technology and IP cameras to help you figure out the most and least visited areas of your store – accordingly, you may want to consider refining your marketing strategies.

cidaas can be easily integrated into existing systems through open interfaces and offers plenty of scope for customization – from the defining the fields to be displayed on the registration pages to the design of an individual look and feel.

It’s not too late to seriously consider investing in an all-in-one comprehensive and reliable CIAM solution like cidaas – because the goal is not to just to sell a product, but to build a long-lasting relationship of confidence and faith with the customer.

Read our freely downloadable factsheet to know more about how retailers can profit from a CIAM solution.

Interested in knowing how cidaas can add value to your company? Then arrange your personal demo appointment today: Schedule a Demo

Blog EN

Multi-Factor-Authentication against data theft

Digitalization has, no doubt, created a spike in cyberattacks. The recent online attack on politicians and celebrities that led to the arrest of a 20-year-old in Hesse, is proof to the same. “It is possible to carry out data attacks from anywhere in the world – even from children’s rooms. This can have serious consequences for public life”, quotes Ungefuk, from the Attorney General’s office on the issue.

True.

IT Security has become a critical business function without which the very reputation of any company could land at stake. However, many companies still overlook the very many aspects of security. This results in significant gaps, which hackers easily exploit. Most of the famous hacks are inexpensive, easy and lucrative, yielding huge money in exchange for stolen data.

Authentication is indispensable in protecting data or resources – Be it entering an office premise, backing up confidential information, performing an online banking transaction or even making an online purchase. The growth of the “Internet of Things”, with a massive number of sensors and other devices connected to the internet, only adds on to the pressing need for authentication.

If you are the one, who uses the same password across platforms or slight variations of it or write it down, then for your own good, you will need to change. Passwords, as we know, have outlived their time. However, the process of authentication has evolved – to stay one step ahead of cybercriminals who find it easy to crack conventional passwords, and simultaneously maintain the optimal customer experience.

Thinking beyond passwords, organizations today rely on the fact that Biometrics certainly serves as a unique key to a person’s identity. This, when combined with smart fraud detection based on Big Data Analytics, Machine Learning, user profiling and predictive factors, could be leveraged to enhance authentication and ensure that all the requirements of data protection and cybersecurity are met.

Multi factor Authentication (MFA) using biometric recognition technology, hence, ensures adequate security and acts as a shield that safeguards data and resources. The following methods could be used and combined for effective identification and authentication:

  • Face Recognition: Users identified using advanced, biometric facial features
  • Voice recognition: Identification by voice
  • Fingerprint recognition: Touch based identification
  • Pattern: Identification through a user-drawn pattern
  • Push notification: Identification by the confirmation of message by the user only on the configured device

These methods could be leveraged to facilitate password-less authentication – Where the user could just scan a code or even their face using their phone’s camera to gain access to their devices. This not only provides an enhanced user experience but could also minimizes successful phishing attacks.

A two-factor authentication (2FA) only heightens security – for example, finger or face recognition in addition to a password validation provides the required “strong security”. Triggering 2FA in case of suspicious activities detected using fraud detection systems could help in protecting data and keeping fraudsters at bay.

Hence, 2-Factor authentication combined with biometric technologies would certainly be the way ahead, making it difficult to gain unauthorized access to data or information across devices, platforms and systems.

The panacea to the global “Data theft epidemic” is certainly a robust identity management solution. A modern, Big Data Technology based Customer Identity and Access Management (CIAM) software is essential not only to manage data and identities, but also to provide the appropriate authentication mechanism – for example, to allow the distribution of roles and access rights to the employees of an organization and correspondingly authorize them, be into physical or digital spaces.

cidaas, with its in-built intelligent fraud detection system, offers a wide range of authentication options to ensure that data is never compromised. Users can benefit from its array of MFA options for password-less authentication/2FA and role-based/access-based authorization mechanism that provides the best-in-class security. With cidaas, you can confidently steer your business in the right direction – into a highly secure digital future!

You are already one step ahead and want to see our solution in action? Get your free demo version today: https://cidaas-in-action.cidaas.de/

safeguards data and resource

Blog EN

The right game tactics for supporting your fans digitally

 

Digitization is progressing across various industries at an ever increasing pace – including the world of sports. The Digital Market offers sports fans a host of channels to access services and offerings from their favorite club. But to excite fans today and to provide personalized attention throughout the game, a quick and above all, convenient access to the digital offerings and services is a must.

Improving the “Fan Experience” has become the core of the brand strategy for the sports and entertainment industry. Only those who can excite their fans can retain them.

The biggest challenge here is probably the overflow of data, caused by the variety of interactions that fans can perform today. This almost infinite amount of information is already gathered in most cases today, but unfortunately often in different data buckets. To put it in the language of a coach: it’s like training each player of your team individually and letting the team play as one whole team, only when the right time comes. With this tactic a game can be won badly. However, if you train everyone together, the world looks completely different.

If you apply this scenario now to the world of data, you can not ignore identity and access management. Such a software – preferably cloud-based – offers an intelligent solution for the various fan support stations throughout the course of a game.

The infographic shows how the right tactics for taking care of fans could practically look like:

Ticket purchase

A fan informs himself in advance of a game about quota and prices of tickets, and would like to order them right away online in the ticket shop. With cidaas the fan registers quickly and easily via social login registration into the online shop. The single sign-on function allows the user to access all contents and services after a one-time login, across all portals. In accordance with the EU GDPR, he gives his consent to the use of his data during the ordering process. This information is stored by cidaas. If the fan thinks differently over time, he can adjust his preferences of data usage through the self-service option.

Shop offers

If a fan is a real fan, he would want to be well-provided accordingly. Personalized offers can increase sales of merchandise or special game offers. Data collected through email campaigns, advertising platforms or ticket purchases can be used to create a complete fan profile using big data technologies. This now contributes to the fact that organizers can align offers to individual needs and interests of the fans and thus not only improve customer journey, but also increase their own sales.

Access control to the stadium on the day of the game

Physical access control is the linchpin of a fan’s customer experience, especially at sports events – because who likes to stand in a queue for hours? With the physical access control function, cidaas offers an intelligent solution for access control to the stadium, but also inside the building, such as access to the VIP area. Authentication is based on the physical identity of a person. Different access rights can be assigned – secure and with reduced time and costs. Various methods of multi-factor authentication using Biometrics are available, for e.g. Face recognition, speech recognition, or Touch ID.

Visit to the fan shop before the game begins

The fans are now in the stadium-can the organizer can lean back? No way! On entering the stadium, the “Fan experience” begins. With the help of WiFi, beacons or apps, the digital fan now gets a real identity and can be directly provided with information on his smartphone, like e.g. about special offers in the fan shop or about special food and beverage offers during the game. The organizer benefits not only from higher sales, but also from detailed reports on customer traffic, the most visited areas of fan shops, as well as customer interest and behavior.

Intelligent identity and access management is a must for every club

Intelligent identity and access management is therefore a must for the sports and entertainment industry. Our Customer Identity Management solution cidaas includes all the necessary functionalities for managing user identities in digital business processes.Our cloud service is cross-platform and can be quickly and easily integrated into existing processes. Obviously, you can continue to use your current user authentication.

Do you want to learn more about cidaas? If so, contact us today at 07044 – 95 103 200 or at sales@cidaas.de

You are already one step ahead and want to see our solution in action? Get your free demo version today: https://cidaas-in-action.cidaas.de/