<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>user experience - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/user-experience/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/user-experience/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 19 Nov 2020 10:46:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>user experience - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/user-experience/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Key Enablers in Creating a Seamless and Secure User Experience</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 08:00:16 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Identity Control Tower]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[model]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user side]]></category>
		<category><![CDATA[Workplace]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14632</guid>

					<description><![CDATA[<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/">Key Enablers in Creating a Seamless and Secure User Experience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an <strong>Identity Control Tower</strong> model as described in this article.</p>
<p>&nbsp;</p>
<h2>The Workplace and its Collaboration Tools</h2>
<p>It’s great to be able to work from anywhere, any device and having the technology work when you need it. More than a luxury, it’s a <strong>necessity</strong> in the current intensified remote working situation, or for international organisations with very mobile, distributed, fluid users. While so many changes happen during the crisis, your workplace should support your business reconfiguration through enabling staff, partners, suppliers to work with different applications, different teams, etc.</p>
<p>The word “Workplace” used in this context refers to <strong>more than the workstations and collaboration tools</strong>. It extends to wider areas such as enterprise architecture, application security &amp; identity and access management. Arguably, we’re talking about the wider IT foundation/digital capabilities, to support and enable business needs –<strong> the workplace might just be the tip of the iceberg</strong>.</p>
<p>&nbsp;</p>
<h2>Legacy upon Legacy adds Complexity</h2>
<p>On the <strong>user side</strong>, as soon as you go through multiple use-cases, e.g. accessing a legacy system on premise or a Software as a Service application, you are likely to require multiple accounts and therefore a cumbersome user experience.</p>
<p>On the <strong>IT operation side</strong>, it is equally a burden to make it work: workstations are still most of the time a physical device bound to a rigid corporate domain; they need to be configured, then shipped to remote staff or external parties, and accounts still need to be provisioned in target environments, with access rights set appropriately. <strong>All the above usually being different processes which are repeated for each supplier or partner, leading to as many devices and set ups. </strong></p>
<p>More importantly, <strong>how secure is this</strong> disorganised and overlapping situation? Having visibility and control on who has access to what, end to end and for all environments, is a challenge because of the siloed use-cases. And as users join and leave, applications evolve, the security level likely decreases by lack of keeping accounts and rights accurate.</p>
<p>In our experience at Wavestone, all these challenges stem from the accumulation of new use-cases and technology, implemented in silo, for their own use or limited group of use-cases. The platform, which was first designed with one primary use, has now altered into a manifold use platform with an ill-fitting model and processes. Many organisations today can be proud to rely on a federated platform and modern access experience for cloud applications on one side – and a different, yet reasonably good, experience on internal applications side. However, often both are not integrated and therefore don’t get the benefits we described in the introduction. We believe this comes from the lack of a truly shared model/architecture to support a modern experience, <strong>across all use-cases</strong><em>.</em></p>
<p>.</p>
<figure id="post-14634 media-14634" class="align-center"><img fetchpriority="high" decoding="async" class=" wp-image-14634 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1.png" alt="" width="995" height="387" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1.png 812w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-437x170.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-768x299.png 768w" sizes="(max-width: 995px) 100vw, 995px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; <em>Example of a corporate model in which each entity manages identities and their access separately: duplicating pro</em>cesses</p>
<p>&nbsp;</p>
<h2>One Model for a streamline experience</h2>
<p>For this reason and for the future of user experience, at Wavestone we believe in a <strong>model based on Identity Control Tower</strong>(s).</p>
<p>An Identity Control Tower is a platform to enforce your access policies. Its purpose is to <strong>verify access requests coming from trusted sources of identity and determine if that identity is allowed to access a target digital resource.</strong> For the metaphor, a pilot willing to get clearance for take-off will submit their flight plan using a trusted channel, and after its approval and other verification by controllers, the pilot can proceed to take-off. If we were to transpose this metaphor digitally, we would talk about a user: in order for said user to access X platform, (s)he would need to use a corporate process which itself is trusted by an Identity Control Tower. Said user would provide their “access plan” (e.g. session token) to the Identity Control Tower. After the Identity Control Tower has verified the authenticity of the “access plan” against its access policies it will perform other checks of context, such as: time of the request, location of origin of the access, trust level of the device etc, the user can then proceed to access the resources. Should these verifications highlight anything unusual or inconsistent in authenticating the user, additional requests can be made to allow the user in (re-authentication or step up).</p>
<p>The Identity Control Tower is under your control and holds the conditions of access i.e. access policies and accepts users from specific sources thanks to a pre-established trust relationship between organisations.</p>
<p>For instance, in the diagram below, imagine a situation in which a supplier is developing a new service in your cloud environment. Users from the supplier would keep their device and authentication process they use within their corporate environment, while the Identity Control Tower (ICT) would enforce access control to the cloud environment – without having to use and manage a different account and re-authenticate. For environments with very granular privileges like AWS, building a decoupled ICT is maybe not a realistic approach and the ICT is then probably the identity platform from Amazon that is managed by your organisation and linked to the identity provider of the supplier. The Identity Control Tower model is basically an extension of federation, implemented to cover all use-cases.</p>
<p>&nbsp;</p>
<figure id="post-14636 media-14636" class="align-center"><img decoding="async" class="aligncenter wp-image-14636" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2.png" alt="" width="979" height="383" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2.png 874w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-437x171.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-768x301.png 768w" sizes="(max-width: 979px) 100vw, 979px" /></figure>
<p style="text-align: center;">Figure 2 – <em>Access of a Partner user to a Cloud Provider resource through an Identity Control Tower</em></p>
<p>&nbsp;</p>
<p>In another scenario, as seen in this diagram, let’s consider an applicant applying for a job in your organisation, thanks to a recruitment portal you offer. They would initiate an application in your portal using their government-backed digital identity, and once they provide their consent to access their LinkedIn profile, you could obtain a digital CV. For the applicant, it is as simple as showing their ID and giving a copy of their CV, rather than filling-in registration form(s) asking once again for the same standard identity information and risking a typo in their contact details – or even having to send copies of sensitive documents like their passport.</p>
<p>&nbsp;</p>
<figure id="post-14638 media-14638" class="align-center"><img decoding="async" class="aligncenter wp-image-14638" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5.png" alt="" width="986" height="377" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5.png 842w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-437x167.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-768x294.png 768w" sizes="(max-width: 986px) 100vw, 986px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; <em>An alternative scenario presenting the trust relationship between a government ID platform and the corporate</em></p>
<p>&nbsp;</p>
<h2>One Model, Three Key Pillars</h2>
<p>Using our knowledge and experience, we believe that this model should be built upon three key pillars:<strong> a unique identity across all systems</strong>, a <strong>common</strong> and <strong>flexible</strong> model to access information and, the establishment of a <strong>360</strong>°<strong> trust relationship.</strong></p>
<p><strong>A Unique Identity Architecture: this</strong> is achieved by following a simple rule: don’t duplicate identity data. The less identity records you create for the same physical person, the more streamline the digital experience will be – as cumbersome steps start to appear when an additional account, device or authentication action is required for the user to access the target resource. The key behind a unique identity data is to <strong>try reusing the data from its (authoritative) source</strong> instead of duplicating/copying it in your own systems. For instance, the suppliers or partners working with your organisation likely already have professional digital identities for their own IT use – what would be the conditions to leverage them instead of re-creating them?<a href="#_ftn1" name="_ftnref1">[1]</a> The next two pillars contribute to answering this question.</p>
<p><strong>A Common and Flexible Model:</strong> The second pillar is to use a common and flexible model to allow/restrict access to information. To provide flexibility, an attribute-based access control (ABAC) model enables granular rules and is well suited to a risk-based and adaptive approach. To make it work though, it is essential to <strong>define the “grammar” of the authorisation model</strong>: what are the actual attributes used to provide accesses that make sense at the enterprise level? How do they translate into “privileges”? What are their formats/values? When the Identity Control Tower is provided by a cloud provider (e.g. from a Cloud provider as Azure or AWS), the grammar is often determined by the said service. Furthermore, to make this model as widespread as possible across use-cases, both on the identity source side and on providing access on the target service side, we recommend implementing your platform following market standards to maximise inter-operability (SAML, OpenID Connect, OAuth, FIDO, etc.).</p>
<p><strong>360° Trust Relationship: </strong>Finally, the last pillar is to ensure the establishment of a 360° Trust Relationship. In other words, <strong>perform due diligence and establish confidence thresholds</strong> to accept interconnection (“technical trust”) of identity platforms. The due diligence should extend to all upstream processes leading to feeding the platform with identities, for instance the HR/procurement processes to vet identities, up to the IT on-boarding process itself – because trusting an identity platform is a first step for these identities to access your digital resources, you need to be within tolerance of the risk it comes with. This trust relationship should then be implemented through security level expectations, auditability in contractual clauses, and enforced via the supplier service management governance. With such strong requirements, one organisation must be prepared to temporarily on-board suppliers or partners within the organisation’s own platform, while suppliers or partners remediate their processes and platforms to be compliant.</p>
<p>&nbsp;</p>
<h2>Two key success factors</h2>
<p>In order to implement these three key pillars, Wavestone has identified two key success factors: being <strong>sponsored by appropriate level of management</strong> and <strong>building resilience and privacy by design</strong>. A transformation programme to establish this model would have implications and requirements in several of your organisation’s departments (HR, sourcing, legal, IT, risk, security etc.), hence should be sponsored by top-management and driven with a pan-organisation approach.<br />
Additionally, as it should always be, the supporting platform should be designed and built with <strong>security</strong>, <strong>privacy</strong> and <strong>resilience</strong> considerations from the beginning.</p>
<p>&nbsp;</p>
<h3>Final Thoughts</h3>
<p>As you have been able to understand throughout this article, looking at the user experience end to end and across use-cases is key to really streamline digital services. This can be achieved with a pan-organisation shift to enforce a unique identity across all systems, a common and flexible model to access information and, the establishment of a 360° trust relationship with third parties.</p>
<p>To go further in your reflection on the subject and understand the current state of your organisation, think about these questions and try to answer them: <em>picking users from different departments, what does the typical day to day digital experience look like? How long does my organisation take to on-board contractors and third parties? How does my organisation actually give access to its data and resources for external users? How many duplicate identities exist across my IT estate?</em></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> A technical entry might still exist within your systems, for reference purposes &#8211; but from the user perspective there is no new account, no duplicate, if they don’t have to register a new login, credentials etc.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/">Key Enablers in Creating a Seamless and Secure User Experience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Painsswords: a look at the alternatives to passwords?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/</link>
		
		<dc:creator><![CDATA[J3remYp4GeauX]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 16:40:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user friendly]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11108/</guid>

					<description><![CDATA[<p>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it), and security (and how to protect access to services).</em></p>
<h2>Calling time on passwords</h2>
<p>Authentication means using an agreed method to prove that someone is the person they claim to be. From the earliest times, the most widely used method has been, almost certainly, the password. However, passwords are an irritation for users and have numerous security limitations.</p>
<p><strong>A collective sense of having &#8220;had enough&#8221;&#8230;</strong></p>
<p>We all imagine, from time to time, not having to rack our brains for the right password when we connect to our most used applications. But it’s clear that this remains just a fantasy at present.<br />
The promise of single sign-on is a long way from being a reality in corporate settings, and the increasing popularity of password vaults reveals something of the challenges faced by users: the multiplicity and patchy relevance of password policies, obligatory password changes, not to mention the irritation of having to reset passwords.<br />
Having said that, the password’s main advantage remains its universal applicability and familiarity.</p>
<figure id="post-11109 media-11109" class="align-center"></figure>
<p><strong>&#8230;but with a limited degree of security</strong></p>
<p>Many cyber-attack scenarios rely, at some point or other, on a password—ideally that of a privileged account—being compromised. Various techniques are employed: high-volume combination tests (Brute Force), intercepting communications (Man in The Middle), and reconstituting passwords from their footprints (Rainbow Table).</p>
<figure id="post-11109 media-11109" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11109" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png" alt="" width="734" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png 734w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-69x39.png 69w" sizes="auto, (max-width: 734px) 100vw, 734px" /></figure>
<p>Security measures to guard against these attacks exist (such as encryption, hashing, salting, and blocking accounts), but these are not always implemented systematically—or satisfactorily. As the saying goes, <em>&#8220;From a corporate point of view, passwords are like nuclear waste: just bury them deep and hope they don’t leak.&#8221;</em></p>
<p>In addition to the technical weaknesses already discussed, user behavior presents a major risk: reusing the same password for different applications, passwords that are too weak or easy to guess, incrementation, etc. When a password is reused for several applications, it acts as the weakest link—thus weakening the whole chain.</p>
<p>Ultimately, the poor user experience and limited level of security offered by passwords are forcing companies to look for new authentication methods.</p>
<h2>What are the options?</h2>
<p>Authentication methods are generally divided into four categories:</p>
<figure id="post-11112 media-11112" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11112" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png" alt="" width="940" height="454" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png 940w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-71x34.png 71w" sizes="auto, (max-width: 940px) 100vw, 940px" /></figure>
<p>&nbsp;</p>
<p><strong>What I know</strong></p>
<p>These authentication methods are based on a key or code that the user knows. They represent the bulk of the solutions used today in both professional and private setting. Today’s solutions include traditional passwords, PIN codes, and secret questions. The latter, however, are rarely used, because they are either too generic (for example, &#8220;What’s your favorite color? &#8220;) or too difficult to remember.</p>
<p><strong>What I own</strong></p>
<p>Here, security is based on a specific piece of equipment being in the user&#8217;s possession. In particular, we are seeing the following in use:</p>
<ul>
<li><strong>Smartphones</strong></li>
</ul>
<p>Smartphones allow—both in professional and private settings—the securing of the most sensitive operations: accessing internal company networks, confirming online payments, or carrying out non-typical banking operations.</p>
<p>Smartphones can be used to achieve authentication in a number of ways:</p>
<figure id="post-11114 media-11114" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11114" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png" alt="" width="656" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png 656w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-303x191.png 303w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-62x39.png 62w" sizes="auto, (max-width: 656px) 100vw, 656px" /></figure>
<ul>
<li><strong>Authentication tokens</strong></li>
</ul>
<p>A token often takes the form of a mini-calculator that makes it possible to generate a single-use code (OTP), with the token itself protected by a PIN code chosen by the user. Historically widely used in companies (for VPN access in particular), and occasionally in the private sphere to connect to particular customer areas, tokens are, nonetheless, giving way to smartphones, which provide a less expensive method.</p>
<ul>
<li><strong>Smartcards</strong></li>
</ul>
<p>Smartcards contain a certificate that is used to prove the holder&#8217;s identity. A card reader is essential for this type of authentication; moreover, certificate management requires infrastructure and life-cycle-management procedures (covering issue, withdrawal, loss, etc.). Normally reserved for the corporate world, their use tends to be limited to specific groups or uses (IT administration, financial operations, etc.).</p>
<ul>
<li><strong>U2F keys</strong></li>
</ul>
<p>This item comes in the form of a standard USB stick, but instead of storing files, it stores a unique key linked to the user. Based on a standard developed by the FIDO Alliance, the solution combines a robust level of security (including resistance to phishing attacks) with a good user experience (the keys can remain connected to one of the device&#8217;s USB ports) because a simple key press is sufficient for authentication. Note, however, that this does not involve fingerprint recognition.</p>
<ul>
<li>A <strong>connected object</strong>, such as a watch</li>
</ul>
<p>This last solution—the most innovative in this category— allows users to connect <em>via</em> a connected object that they already own. As an authentication method it’s little used in corporate settings, but Apple, for example, offers an option to unlock a computer by simply approaching a device with another Apple connected object.</p>
<p>Solutions like this, based on the possession of a device, are differentiated mainly by their degree of ergonomics. In any case, it’s essential to manage &#8220;enrollment&#8221; (the linking of the object to its holder), replacement, loss, and theft of the relevant device.</p>
<p><strong>Who I am</strong></p>
<p>The physiological characteristics of a person, such as a fingerprint, the vein pattern of a hand, irises, faces, the signature of a voice, or even a heart rate, also make it possible to authenticate a user. The use of these solutions, for most people, is limited to opening their workstation or smartphone (<em>via</em> a fingerprint or face recognition). However, companies have used such solutions for a number of years to control access to rooms or highly sensitive areas.</p>
<p><strong>What I do</strong></p>
<p>Keystroke rhythms, mouse movements, using a phone, or touching a screen, are different ways to distinguish a legitimate user from an impostor or robot. These behavioral, biometric solutions require a large amount of data in order to be reliable, but this is improving, thanks to new Machine-Learning-based approaches. These solutions are used more as security measures that complement authentication (detecting robotic-attacks, account sharing, etc.).</p>
<p>As a summary, the figure below shows the different authentication solutions according to their level of security and ease of use.</p>
<figure id="post-11117 media-11117" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11117" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png" alt="" width="616" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png 616w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-345x245.png 345w" sizes="auto, (max-width: 616px) 100vw, 616px" /></figure>
<h2>User experience and security, a circle that can&#8217;t be squared?</h2>
<p>We believe that it is possible to reconcile the user experience with security. Below we set out four possible routes to achieving it.</p>
<h3>Route 1: simplifying the use of passwords</h3>
<p>While it seems too fantastic to imagine the use of passwords being completely abandoned, some of their failings can be addressed. The frequency of data entry can already be reduced <em>via</em> identity-federation mechanisms that provide access to both corporate and partner services. In addition, chatbots are emerging to simplify the password resetting process, and are helping drive significant improvements in user experience. As for security, raising users’ awareness about the proper use of passwords is still an essential activity if risks (from social engineering, spam, phishing, password theft, etc.) are to be reduced.</p>
<h3>Route 2: adapting the security requirements to the context</h3>
<p>Just as you have to adapt your road speed to the weather conditions, the concept of risk can guide us in the level of security needed to authenticate a user. Thus, to access non-sensitive information, a simple password will suffice; but more sensitive operations (a bank transfer involving a significant amount, for example) will require the user to be authenticated with greater certainty, using a combination of several authentication factors. Other criteria can be taken into account to assess risk, for example the PC or smartphone being used, the geographical location, the time of connection, or even whether the user is exhibiting their habitual behavior.</p>
<p>Beyond the authentication phase, the level of risk can also influence the time allowed before issuing a new authentication request (no need to retype a Facebook password as long as the user stays on the same PC or smartphone, reauthentication via webmail every X days only, etc.).</p>
<p>In the end, then, authentication is no longer seen as an event but as a <a href="https://twitter.com/bertrandcarlier/status/935876816090353666">continuous process</a>.</p>
<h3>Route 3: let the use choose the authentication method</h3>
<p>Rather than imposing a single authentication method on all users, Bring Your Own Token (BYOT) lets users choose the one that best suits their needs. The idea is to offer a choice of solutions with comparable levels of security.</p>
<p>Today, Facebook and Google offer BYOT as a second authentication factor, using a registered smartphone or secure USB key, for example.</p>
<p>In the world of work, this method remains less developed at present, but it’s easy to imagine such a method being offered to specific groups: those with particular work mobility requirements, the technological appetite for it, etc.</p>
<h3>Route 4: make use of accounts that exist already</h3>
<p>It’s more and more common for people to use their social media accounts (Facebook, Google, or LinkedIn, for example) to connect to e-commerce sites or other websites. A Social Login enables the creation of an account on the new site to be simplified, and limits the number of passwords to be remembered.</p>
<p>However, not all online services are designed to use a Social Login. Public or parapublic services for example, favor a State Login which allows users to log in using a tax, health, or similar identifier, and to carry out a range of online administrative activities. And these uses are in continuous development.</p>
<figure id="post-10334 media-10334" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10334" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png" alt="" width="284" height="356" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-152x191.png 152w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-31x39.png 31w" sizes="auto, (max-width: 284px) 100vw, 284px" /></figure>
<h2>In conclusion</h2>
<p>While passwords are not set to disappear completely, the search for alternatives is gathering pace: uses and technological solutions are evolving rapidly, consortia and new standards (such as OAuth2 and OIDC) are emerging, and, these days, the user experience, as well as security, is core to the thinking.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital in store : repenser l&#8217;expérience client en magasin</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/11/digital-in-store-repenser-lexperience-client-en-magasin/</link>
		
		<dc:creator><![CDATA[Ichraq Belmezouar]]></dc:creator>
		<pubDate>Wed, 13 Nov 2013 09:52:24 +0000</pubDate>
				<category><![CDATA[Métiers - Marketing et relation client]]></category>
		<category><![CDATA[click and collect]]></category>
		<category><![CDATA[consommation]]></category>
		<category><![CDATA[cross canal]]></category>
		<category><![CDATA[cross-selling]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[expérience client]]></category>
		<category><![CDATA[geofencing]]></category>
		<category><![CDATA[parcours achat indoor]]></category>
		<category><![CDATA[terminaux mobiles]]></category>
		<category><![CDATA[vente physique connectée]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4522</guid>

					<description><![CDATA[<p>Bornes digitales, vitrines interactives, cabines d’essayages intelligentes… Autant de nouveaux dispositifs que vous allez manifestement découvrir de plus en plus dans les boutiques physiques. Dopées par l’essor des nouvelles technologies, les marques multiplient en effet les innovations digitales in store...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/11/digital-in-store-repenser-lexperience-client-en-magasin/">Digital in store : repenser l&#8217;expérience client en magasin</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;" align="center"><em>Bornes digitales, vitrines interactives, cabines d’essayages intelligentes… Autant de nouveaux dispositifs que vous allez manifestement découvrir de plus en plus dans les boutiques physiques. Dopées par l’essor des nouvelles technologies, les marques multiplient en effet les <a title="e-marketing.fr - Digital in store : 30 initiatives incontournables" href="http://www.e-marketing.fr/Thematique/Retail-1002/Breves/Digital-in-store-30-initiatives-incontournables-52462.htm" target="_blank">innovations digitales in store</a> pour réinventer l’expérience client en magasin. Éclairage sur les enjeux que cette nouvelle tendance soulève, à la fois pour les entreprises et pour leurs clients.</em></p>
<h2> S’adapter à un nouveau profil de consommateur <em>cross canal</em></h2>
<p>Il est fort probable que le magasin tel qu’on le connait aujourd’hui disparaisse dans les années à venir, pour laisser place à une nouvelle forme de vente physique ultra connectée. Plus de cloisons entre la vente en ligne et la boutique : le <em>on</em> et le <em>off</em>  ne feront plus qu’un.</p>
<p>Cette mutation de la boutique physique va dans le sens de l’évolution du consommateur. Ce dernier dispose de plus en plus de supports digitaux (tablettes, <em>smartphones</em>…) et n’hésite pas à en faire usage !</p>
<p>Selon une étude d’Experian, 95% des consommateurs font une recherche sur internet avant d&#8217;acheter un bien, dont 84% finalisent leur achat dans un magasin. Inversement, le taux de conversion en magasin, même s’il reste élevé, a légèrement baissé au profit d’achat en ligne (il passe de 83% en 2012 à 78% en 2013).</p>
<p>Ces nouvelles tendances d’achat client, <em>web to store</em> et <em>store to web</em>, révèlent deux choses : tout d’abord, le point de vente physique n’est pas « mort », il reste un point d’ancrage important dans la relation client et le parcours d’achat. Ensuite, ce lieu doit impérativement se réinventer pour se positionner de manière plus cohérente dans un parcours client omni canal !</p>
<p>Plusieurs dispositifs ont déjà vu le jour pour répondre à ce phénomène d’achat ROPO (<em>Research</em> <em>Online Purchase Offline</em>). On peut citer les services de <em>click and collect</em> qui permettent au client de commander en ligne, et de retirer la marchandise en magasin (la grande distribution, comme Auchan ou Carrefour, proposent ce type de service), ou encore des systèmes proposant des coupons personnalisés en fonction de la position géographique du client (géofencing).</p>
<h2>Fluidifier le parcours d’achat indoor</h2>
<p>L’un des enjeux majeurs des entreprises est d’augmenter le taux de conversion du panier client.  Pour se faire, il est nécessaire, d’une part, de fluidifier le parcours d’achat en magasin de la recherche d’information au paiement, et d’autre part, de diminuer le temps d’attente qui peut engendrer de l’insatisfaction client. La digitalisation du magasin se révèle un bon levier pour répondre à ces enjeux.</p>
<p>Chez Leclerc par exemple, le client peut s’informer en autonomie sur les produits exposés en les scannant via des applications mobiles. Plus besoin de chercher un conseiller pour une information ou d’attendre son tour avant de poser une question : en quelques clics, le consommateur accède aux fiches détaillées des produits et compare  les articles.</p>
<p>Dans <a title="JDN - le plein d'innovations de commerce connecté" href="http://www.journaldunet.com/ebusiness/commerce/innovations-vad-conext/" target="_blank">certains magasins Leroy Merlin</a>, le client peut s’orienter en magasin à l’aide de la géolocalisation indoor et  trouver facilement le produit souhaité. Des <em>showrooms</em> virtuels tactiles permettent aussi aux clients Leroy Merlin de découvrir en toute autonomie les collections.</p>
<p>Pour ce qui est du paiement en magasin, les enseignes commencent à démultiplier les points de conversion en surface de vente pour faire gagner du temps au client et fluidifier cette phase cruciale du parcours client : on ne paie plus uniquement en caisse standard, le client peut transformer son achat en autonomie avec des bornes de <em>self check out</em>, ou encore directement auprès de vendeurs équipés de terminaux mobiles.</p>
<h2 align="left">Faire vivre une expérience client unique</h2>
<p align="left">Grâce aux nouvelles technologies, les marques cherchent à construire une relation plus forte, engageante et même affective avec le client en lui proposant une expérience particulière en magasin. L’idée est de faire vivre au consommateur une expérience utile, ludique, divertissante et interactive. Si le pari est réussi, le client est plus engagé et plus apte à revenir au magasin, voire à augmenter son panier.</p>
<p>Parmi les dispositifs innovants, on peut citer les cabines d’essayages intelligentes dans certains magasins de prêt-à-porter, où on peut projeter sur soi différents articles, prendre une photo et la partager sur les réseaux sociaux !</p>
<p>À titre d’exemple, Asos, en partenariat avec les bureaux R&amp;D du Centre d&#8217;innovation des technologies sans contact (CITC), a créé un nouveau concept de cabine d’essayage : une borne RFID récupère le numéro de série de la puce <a title="SolucomINSIGHT - articles NFC" href="http://www.solucominsight.fr/?s=NFC" target="_blank">NFC</a> de l&#8217;étiquette de l’article et déclenche l&#8217;affichage du produit dans un coin du miroir. Grâce à ce miroir intelligent, le client peut demander une autre taille, effectuer une commande en ligne, ou encore accéder au catalogue de l&#8217;enseigne, qui peut d&#8217;ailleurs lui proposer des articles en <em>cross-selling</em> avec celui qu&#8217;il est en train d&#8217;essayer.</p>
<p>Kiabi propose également depuis 2012, des bornes interactives dans son magasin de Villeneuve d&#8217;Ascq avec de multiples animations : un photomaton, des jeux à instant gagnant, la possibilité de scanner un produit puis de le partager, du <em>coaching </em>mode&#8230;</p>
<p>Si l’essor des nouvelles technologies permet de ré-enchanter l’expérience en magasin, tous ces outils digitaux devraient être utilisés à bon escient. Le cas échéant, ils seraient vite perçus comme des gadgets sans valeur ajoutée.</p>
<p>Pour concevoir son dispositif digital, il est nécessaire de s’adapter aux usages du secteur, de penser parcours client dans une logique <em>cross canal</em>, et de définir en amont les enjeux stratégiques à garder en ligne de mire (connaissance client, différenciation, acquisition, conversion, image de marque…). Enfin, il ne faut pas oublier dans l&#8217;intégration des dispositifs, la notion de formation des collaborateurs et des clients qui vont les utiliser.</p>
<div></div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/11/digital-in-store-repenser-lexperience-client-en-magasin/">Digital in store : repenser l&#8217;expérience client en magasin</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
