Implementing Digital Identity: Understanding the Requirements
Posted December 11, 2017
Digital identity certainly seems to be catching fire. But, as with anything new, it pays to balance exuberance with caution and to ground perception in reality.
At ThreatMetrix, we’ve been at this for 10 years – building digital identity solutions that fight fraud and deliver a frictionless digital experience. To be effective, a digital identity solution needs to do both because cybercrime isn’t just about fraud and doesn’t just affect individuals. It’s a drain on the economy, and it impedes business by adding cost and friction, which slows growth and impacts profitability.
Naturally as a vendor of digital identity solutions, we have a vested interest in being a part of the conversation. We believe that digital identity is the best way to help businesses drive profitable growth through online channels. We also believe that a well-informed customer is good customer.
To help separate fact from fantasy, we’ve spent quite a bit of time and effort educating the market. We have a unique perspective. After all, our solutions are adopted globally at more than 5,000 organizations in multiple industries.
The Definitive Guide to Digital Identity is one type of educational resource. We published it last month with the intention of evolving it in step with the state of the art. Now, we are bringing the first enhancement to it.
The Getting Started section (Chapter 9) of The Guide takes a look at the people, processes and technologies needed for a business to implement digital identity, and presents a roadmap for making that happen. But before you undertake such a task, it’s natural to have questions: What would it take to make digital identity part of my digital transformation effort? What does it require from an organizational standpoint? What are the challenges I’m likely to face?
To help in systems selection, we’ve added a Digital Identity Request for Information Template. This document is designed to give businesses a better understanding of the full breadth of the capabilities needed to implement digital identity across the enterprise. It also includes key questions that you might ask when assessing and selecting a solution provider.
The sections in this downloadable template cover the wide range of requirements that are essential to successfully implementing digital identity, including basic device recognition, analytical abilities, threat detection and a host of other capabilities.
I hope that you find this a worthwhile addition to The Guide, as well as a useful tool to help you navigate your way down the implementation path.
Let me know what you think by commenting below or connecting with me on LinkedIn, Twitter or the social platform of your choice. You can also join in the conversation at #NextGenID.