Page 26 - GS230602
P. 26

CoverStory
                                                      Co  v er St o r y




        Shikiar expects early, high-profile implementations by   "API management plays a key role in digital identity, par-
        other leading brands to boost adoption and encourage    ticularly in authentication and authorization," he said.
        consumers to replace passwords with non-phishable pass-  "With API management, we provide an open ID to con-
        keys. He noted this will enable users to access online ser-  nect, enable and standardize the authentication and au-
        vices securely and easily, and the networked economy will   thorization process, to ensure that only authorized indi-
        subsequently benefit from reduced fraud and increased   viduals have access to specific APIs, meaning it has access
        service consumption.                                    to specific functionality."

        Subscription services                                   Federated strategies
        Shikiar pointed out that consumers are becoming more    Identiverse researchers noted that reusable identity is
        interested in simplifying and securing their identities on-  achieved through the use of identity federation, which al-
        line, which, he noted, has led to subscription service offer-  lows different systems and applications to recognize and
        ings in the space.                                      trust the same digital identity.

        "Twitter and Meta rolling out identity verification as a sub-  Torqueto noted the federated principle also applies to API
        scription service has brought identity verification into the   management, adding that organizations leveraging mul-
        mainstream vernacular," he said, while questioning how   tiple tools within an API omnichannel strategy can detect
        this will help prevent trolling, misinformation and online   when they're under attack, mitigate damage and identify
        scams and whether verification service offerings should   which API is affected. He also described identity protec-
        be required or offered as a free public service.        tion trends as follows:

        Todd Robertson, senior vice president of business devel-   • Zero trust security: "A hot trend that means you as-
        opment at ARGO, mentioned his company has integrated         sume no layer of your infrastructure is safe, even the
        LexisNexis True ID, an automated forensic analysis solu-     intra service communications that have its encryp-
        tion designed to quickly authenticate identity documents.    tion. The permissions used are the least permissive
        The solution can verify government IDs from around the       as possible. Zero trust will add security layers on top
        world and is available as a standalone application or host-  of your environment, making it even more difficult
        ed service, he noted.                                        for the attacker."

        "Consumers want to use digital and physical channels to    • Decentralized identity:  "It's a self-serving identity
        manage their finances and meet their goals," he said. "That   that's currently gaining traction. Users have full
        means financial institutions must have a complete strat-     control over their digital identities, including their
        egy to serve these needs and address the risk exposure by    personal data. They're now using this centralized
        blending the right technology innovation, risk foundation    technology, i.e., blockchain, or a distributed layer of
        and relevant operational functionality to align customer     technology to actually establish this identity - the
        experience and service."                                     APIs have this role. This crucial tool enables this in-
                                                                     teroperability within secure interactions between the
        API lifecycle management                                     decentralized identity itself and identification."
        Filipe Torqueto, head of solutions, USA at Sendedia, wants   • Consent and  private management: "It's a common
        to see the identity community evolve faster in response      theme in open banking. Your banking data is yours,
        to new variants in phishing and AI-powered attacks on        not the bank's. It belongs to the individual. Any ac-
        banking and financial services.                              tion in the open banking ecosystem requires the final
                                                                     user's consent. It's privacy management. If the con-
        "In the post-pandemic world, identity, especially in the     sumer doesn't want their data to be shared or sim-
        digital universe, will become increasingly important," he    ply doesn't want to participate, they have this right.
        said. "It is evolving, yet there is a gap between this evolu-  There's GDPR, California Consumer Privacy, and
        tion and the overall technological evolution in terms of the   other international laws that protect data privacy."
        adoption of identity technologies into normal services like
        banking, financial services, retailing, etc."           Synthetic identity threats
                                                                Christina Luttrell, CEO for GBG Americas and IDology,
        Torqueto urged businesses and service providers to meet   advocated using a multi-layered approach to fight all
        new threats with new, more secure technologies. As data   types of identity fraud, including synthetic identity, which
        leaks and new attacks threaten an increasingly interop-  she characterized as insidious and fast-growing in the
        erable financial ecosystem, he added, the industry must   United States. Layered data sources and alerts can notify
        adopt new identity technologies such as API management,   enterprises when deceased individuals' records or address
        which protects users across digital channels and apps, all   verification are in play, she pointed out.
        of which are served by APIs.



        26
   21   22   23   24   25   26   27   28   29   30   31