Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
A Iot to Venture, More to GAIN
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the...
Learn more
Executive View
Executive View
ForgeRock Workforce Identity Governance
This KuppingerCole Executive View report looks at the ForgeRock Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #147: How To Manage Your Clients, From Customers and Citizens to B2B and B2B2C
CIAM solutions are designed to address specific technical requirements that consumer-facing organizations have that differ from traditional “workforce” or Business-to-Employee (B2E)...
Learn more
Prabath Siriwardena - Five Pillars of Consumer IAM
Event Recording
Prabath Siriwardena - Five Pillars of Consumer IAM
Transforming the customer experience is at the heart of digital transformation. Digital technologies are changing the game of customer interactions, with new rules and possibilities that were...
Tim Maiorino - GDPR: Four Months in... And Now
Event Recording
Tim Maiorino - GDPR: Four Months in... And Now
A quick overview of how the perception of GDPR has developed over the last few weeks prior to 25th May 2018 and in the weeks following the date everyone had been waiting for and working towards...
Consumer Identity World (CIW) USA 2018 - Report
Blog
Consumer Identity World (CIW) USA 2018 - Report
Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last...
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in...
Decentralized Identity 101: What It Is and Why It Matters
Blog
Decentralized Identity 101: What It Is and Why It Matters
Guest Author:  Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain...
NRI SecureTechnologies: Uni-ID Libra 2.0
Executive View
NRI SecureTechnologies: Uni-ID Libra 2.0
NRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product...
Patients, People and Things - Managing Identities in Healthcare
Webinar Recording
Patients, People and Things - Managing Identities in Healthcare
Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing...
Cross-Border Data Management and Cybersecurity:   Walking the Tightrope of Compliance and Business Efficiency
Blog
Cross-Border Data Management and Cybersecurity: Walking the Tightrope of Compliance and Business Efficiency
Guest Author : Jordan L. Fischer, Esq., Co-Founder & Managing Partner of XPAN Law Group, LLC Technology is changing rapidly, correlating in an increasing amount of data collected every...
Blockchain Identity – Success Factors and Challenges
Blog
Blockchain Identity – Success Factors and Challenges
When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the...
Some Perspective on Self-Sovereign Identity
Blog
Some Perspective on Self-Sovereign Identity
Identity isn't hard when you don't always use it. For example, here in the natural world we are anonymous—literally, nameless—in most of our public life, and this is a handy thing....
2018 – the Turning Point for Social Networks
Blog
2018 – the Turning Point for Social Networks
The Facebook data privacy story continues to be in the headlines this week. For many of us in IT, this event is not really a surprise. The sharing of data from social media is not a data breach,...
EBA Rules out Secure Open Banking?
Blog
EBA Rules out Secure Open Banking?
On January 30th in London I attended a joint workshop between OpenID and the UK Open Banking community that was facilitated by Don Thibeau of OIX. This workshop included an update from Mike Jones...
Previous
7 8 9 10 11 12 13 Next