Articles
Here are 7 common marketing personalization mistakes that brands are making today that keep them from maximizing the benefits of their personalization efforts.
Continue reading...
No single technology will provide a '360 degree view of the customer.' Choose your technology stack based on your specific goals.
Continue reading...
Working in data marketing, you’ve likely heard all about getting to know your customers.
Continue reading...
On Sunday, software giant SAP announced its intention to acquire Mountain View, Calif.-based Gigya, a customer identity and access management platform provider. Though terms of the forthcoming sale have not been announced, analysts, including Constellation Research founder and analyst R Ray Wang, estimate the price to be around $350 million.
Continue reading...
Okta, a San Francisco-based identity management vendor, has hired Goldman Sachs to lead it through an initial public offering (IPO) or possible sale, CMSWire has learned.
The news broke last night, just hours after Twilio, a cloud communications platform, announced it will raise more than it expected in its
Continue reading...
SAN FRANCISCO — For years, we’ve heard measured, well-reasoned, tempered suggestions that the IT security team within an organization should coalesce or collaborate or do something with “co-” as a prefix with the human resources (HR) team.
Continue reading...
The keynote address Monday at the OpenStack Summit in Vancouver — where the world’s data center admins and engineers discuss the evolution of the data center — was ostensibly about “Connecting the Clouds to Create Huge Value.
Continue reading...
Janrain, a customer identity management provider, today announced it acquired a real time social curation and engagement provider that brings "an integrated customer identity and customer engagement solution to the market." Portland, Ore.-based Janrain scooped up Arktan but did not disclose the terms.
Continue reading...
For all concerned organizations and stakeholders to agree on a very secure and robust identity management solution that can be used with all cloud services, and could be used in a federated manner, perhaps even replacing or supplanting enterprise directory services such as MS AD. Then we could really leverage the potential of the cloud. Also, (and this is kinda industry specific for me working in financial services) all cloud offerings to include highly performant "encryption at rest" solutions built in! -- Jed Cawthorne, Senior Strategy Consultant
Continue reading...
In an era of mobile agility and digital security, businesses are continually challenged to offer the opportunity for employees to access secure applications from a variety of devices.
Continue reading...
Quick! Name all the third-party applications and cloud-based solutions your company is using right now.
Continue reading...
Kim Cameron, Distinguished Engineer and Chief Architect of AD at Microsoft as well as author of the Seven Laws of Identity impressed the crowd today at the Defrag 2009 Conference. His session, “Identity as a Collaborative Foundation ” began with the preface, “How are we recognized in different
Continue reading...
With compliance issues top of mind for companies today, Identity and Access Management are critical components of any application. Keeping track of many users and their access to many different systems is often difficult and time consuming.
Continue reading...
In the final days of 2007, many a to-do list is being checked off. With all the last minute, "revolutionary" social web updates, you'd think Santa's elves were part of the operation.
Case in point: OpenID, a universal signature mechanism that eliminates the need for multiple site logins, has been
Continue reading...