Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation
The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or...
Learn more
Executive View
Executive View
Thales OneWelcome Identity Platform
This KuppingerCole paper looks at the Consumer Identity and Access Market and the key capabilities of vendors in this space. A technical review of the Thales OneWelcome Identity Platform is included.
Learn more
Event Recording
Event Recording
The Journey to Decarbonization and the Role of Digital Identity
In this session, we will explore how technology is playing a crucial role in decarbonization efforts. We will discuss how Customer Identity and Access Management (CIAM) can enable digital...
Learn more
Christian Goy - Data Privacy: Who Actually Cares and Why
Event Recording
Christian Goy - Data Privacy: Who Actually Cares and Why
Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook....
Prabath Siriwardena - Five Pillars of Consumer IAM
Event Recording
Prabath Siriwardena - Five Pillars of Consumer IAM
Transforming the customer experience is at the heart of digital transformation. Digital technologies are changing the game of customer interactions, with new rules and possibilities that were...
Tim Maiorino - GDPR: Four Months in... And Now
Event Recording
Tim Maiorino - GDPR: Four Months in... And Now
A quick overview of how the perception of GDPR has developed over the last few weeks prior to 25th May 2018 and in the weeks following the date everyone had been waiting for and working towards...
Consumer Identity World (CIW) USA 2018 - Report
Blog
Consumer Identity World (CIW) USA 2018 - Report
Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last...
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in...
Decentralized Identity 101: What It Is and Why It Matters
Blog
Decentralized Identity 101: What It Is and Why It Matters
Guest Author:  Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain...
NRI SecureTechnologies: Uni-ID Libra 2.0
Executive View
NRI SecureTechnologies: Uni-ID Libra 2.0
NRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product...
Patients, People and Things - Managing Identities in Healthcare
Webinar Recording
Patients, People and Things - Managing Identities in Healthcare
Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing...
Cross-Border Data Management and Cybersecurity:   Walking the Tightrope of Compliance and Business Efficiency
Blog
Cross-Border Data Management and Cybersecurity: Walking the Tightrope of Compliance and Business Efficiency
Guest Author : Jordan L. Fischer, Esq., Co-Founder & Managing Partner of XPAN Law Group, LLC Technology is changing rapidly, correlating in an increasing amount of data collected every...
Blockchain Identity – Success Factors and Challenges
Blog
Blockchain Identity – Success Factors and Challenges
When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the...
Some Perspective on Self-Sovereign Identity
Blog
Some Perspective on Self-Sovereign Identity
Identity isn't hard when you don't always use it. For example, here in the natural world we are anonymous—literally, nameless—in most of our public life, and this is a handy thing....
2018 – the Turning Point for Social Networks
Blog
2018 – the Turning Point for Social Networks
The Facebook data privacy story continues to be in the headlines this week. For many of us in IT, this event is not really a surprise. The sharing of data from social media is not a data breach,...
Previous
7 8 9 10 11 12 13 Next