Data security and an improved customer experience go hand in hand for successful digital transformation. Credit: Thinkstock “The customer is always right” is a motto originating in the early 20th century which encourages employees to give a high priority to customer satisfaction. The quote has morphed into an intense focus on the customer experience in the new millennium. This new focus is driven by a string of massively disruptive technology changes, such as cloud, big data, API/microservice architectures, smartphones/tablets, UI frameworks and the like. Market dynamics are also playing a disruptive role, with media, travel/leisure, automotive, aerospace, retail, and other industries experiencing a new wave of competitors. One outcome is a focus around improving the customer experience in every aspect of the customer journey. Often called “Digital Transformation” this evolution is focused on modernizing tools and processes within an organization.Executives have realized that without updating legacy IT approaches, they will fall drastically behind their competitors and won’t be seen as a modern, digital organization. Enterprises are now implementing a wide variety of customer-centric initiatives designed to delight the experience of customers, employees, as well as partners.Customer-centric initiativesCustomer-centric initiatives are about providing a seamless digital experience. It is a way of doing business that provides a positive customer experience, drives repeat business, customer loyalty and profits. There’s also a need to be able to link the customer journey in back-end systems, to help businesses meet these goals, measure and improve over time.This drive to customer centricity is happening across industries. One example is in the banking industry. Banks are implementing a full omnichannel experience for their customers. This means customers have access to their bank account anywhere, at any time, on any device. It also means that when a customer makes a deposit in-person with a bank employee, it will immediately reflect on the bank’s mobile app. When funds are withdrawn or deposited at an ATM, it should reflect on the online portal right away, delivering a seamless banking experience. There is also a full array of examples from the healthcare industry, where there is a shift from fee-for-service compensation to value-based or patient-centric care. Value-based care rewards high quality patient care that is cost-effective. By drawing on massive amounts of patient data and correlating that data to electronic health records (EHR), patients in a similar circumstance can often receive and experience better health outcomes.However, customer-centric initiatives in banking, healthcare and many other industries require significant amounts of data and documents to be exchanged – often Personally Identifiable Information (PII) or other sensitive data. But, without the right protocols and security around the data being shared, customer-centric initiatives introduce great risk to the organization, especially when it comes to privacy and compliance regulations. Security considerations need to accompany these initiatives or they will fail every time. Securing customer-centric initiativesA proven way to secure sensitive data for customer-centric initiatives is with an Attribute Based Access Control (ABAC) model. ABAC is an access model that allows organizations to securely share data across an entire collaborative chain by only allowing authorized users access to sensitive data under the right conditions.ABAC only grants access to data if every attribute is aligned with a corporate policy, regardless of how general or granular the policy is written. ABAC goes beyond just “who” is accessing data, but also considers “why,” “when” or “where.” Who is accessing data is a key attribute, but so is the relationship between the user and the data, their location, the device they are using, the time of day or other variables.Beyond known risks to PII for banks and healthcare organizations, the need to share and protect data is growing to meet the needs of a data-driven marketplace; ABAC is being adopted by product companies, leisure companies and even software firms. Knowing and enforcing policies built with key attributes could be the difference between data being shared securely for effective customer-centric initiatives, and data being shared inappropriately and insecurely, leading to data leakage, breaches and angry customers.Enterprises who are slow to keep up with the times and modernize their legacy IT systems to support digital transformation will be left behind and may struggle to succeed. Status quo is an option that doesn’t look viable any more. While enterprises that can implement and secure their customer-centric initiatives, will deliver to customers a seamless digital experience, ensuring satisfied customers, a good reputation and ultimately, an increase in revenue. Related content opinion Enhancing cloud security for AWS deployments As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential. By Gerry Gebel Sep 13, 2018 5 mins Access Control Cloud Security Security opinion Securing continuous deployment for applications in the cloud Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help. By Gerry Gebel Aug 01, 2018 4 mins Access Control Application Security Cloud Security opinion Connecting ABAC to identity governance and administration to extend access control capabilities Enterprises need an approach to improve synergies between existing IAM technologies. By Gerry Gebel Jun 25, 2018 5 mins Identity Management Solutions Technology Industry opinion When security and privacy overrule convenience Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC. By Gerry Gebel May 31, 2018 5 mins Technology Industry Application Security Privacy Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe