Negotiating Social and Mobile Trust
By Michelle Kimihira on May 20, 2013
Identity Management Product Marketing Team Blog
You get the impact of social and mobile today. I know because you are reading a blog. While I will not venture a guess as to what device you are reading it on, chances are you do access your social network or email on your smartphone or a tablet. So, you are mobile, and likely social! And well, who isn’t these days?
Social interaction today is dictating consumer spending. Purchases happen based on friends’ recommendations, other users’ reviews of products and services. One report indicated that 30 customers are lost with just 1 negative review on a social site! The impact of social media on a business is huge and perhaps that is why about 80% of Fortune 500 companies are looking to connect to their customers via social media today. But how do you connect seamlessly with your customers across all the social media sites? There are way too many social channels if you were to support integration between your application(s) and the social sites. On the other hand, most of these companies feel that their employees’ behavior on social sites may endanger their corporate security.
While social sites are the points of influence, the point of sale maybe the mobile device! Over 79% of smart phone subscribers use their mobile devices for shopping. As a result, companies are rapidly building and enabling mobile applications. But did you know that 76% of mobile applications store credentials on the device and 10% of those store the passwords in plain text? And you know the first rule of security – you are only as secure as the weakest link! So, your enterprise data is as secure as the devices accessing that data!
Security and, in effect, Identity Management is the lynchpin for today’s anytime-anywhere world. Whether it is personalizing a consumer experience, enabling access or conforming to compliance regulation, identity is what enables the online digital experience. Catch this screencast to get an overview of security points of failure in today’s social and mobile world and learn how you can safeguard your company’s data while effectively leveraging the social and mobile channels. Learn about the latest advances in Oracle Identity Management that provide the foundation for a secure mobile and social environment.
Engage with Us
- Product Information on Oracle.com: Oracle Fusion Middleware and "> font-family: "Times","serif";"> Oracle Identity Management
- Blogs: OracleIDM
- Follow us on Twitter and Facebook, YouTube
- Subscribe to our regular Fusion Middleware Newsletter