In this issue: Improve Customer XP with Social Sign-On; IAM Summit Discount; Ignite Dinner
The Optimal Brief | October 2019
Customer Experience Starts at Your Registration Screen
Social sign-ons deliver convenience and build credibility.

Social sign-ons are not meant to and should not be used to protect sensitive assets. Of greater concern is that data sharing is a two-way street. When a company uses single sign-on, it gets information such as email addresses and geographical locations from the social network; however, it also may be giving information about its users’ behaviors back to the social network. Businesses should understand which user information they are sharing when they agree to the terms of the social network.  
Social Identity Support -
Best Practices for Social Sign-On Success

When social sign-on is not an option, over 50 percent of users will leave a site rather than fill out a traditional registration form! In crease conversions and relieve password management issues with these simple guidelines.   
Going ToThe Gartner IAM Summit in Vegas This Year?

Save $350 on your registration with this special code: IAMSP49 . Then visit us in booth #322 to learn about our latest product features.

Also, SAVE THE DATE - Wednesday, December 11 for our co-sponsored party with Omada and TypingDNA at the Montecristo Cigar Bar in Caesars Casino! Watch for an RSVP info soon!
Join Us For Dinner At Ignite

If you are attending the Microsoft Ignite show in Orlando, join us for dinner on the evening of November 6th. Seating is limited, so send your RSVP soon to .

Can't make dinner? Visit us in booth # 2526 to learn about our latest product updates.

Featured IAM Solutions

A complete Identity as a Service (IDaaS) federated broker
  • Private Dedicated Cloud
  • SSO to Applications
  • Delegated Administration
  • Affordable Monthly Plans
  • Request a FREE TRIAL!
A hosted RESTful web service that provides the ability to perform various authentications including single and multi-factor authentication (MFA).

Benefits include:
  • Security and Control
  • Compliance
  • Efficient Deployment
  • Reduced Costs