Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
CIAM: Balancing security and user experience to get value from customer data
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely...
Learn more
Leadership Compass
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
Learn more
Webinar Recording
Webinar Recording
An Agile Approach to Customer Identity and Access Management (CIAM)
Business success in the digital era depends on delivering seamless and secure customer experiences. Failure to do so can easily result in abandoned shopping carts, fraudulent transactions, and...
Learn more
Enabling Digital Engagement With GAIN
Blog
Enabling Digital Engagement With GAIN
Digital engagement is a key driver of economic growth, but the lack of reusable, verified identities is a significant problem that needs to be solved. At present, there is no way for anyone to...
Entering a New Era: CIAM 2.0
Blog
Entering a New Era: CIAM 2.0
Questioning our identity fundamentals: Is single sign-on, multi-factor authentication, passwordless authentication, etc. enough for Web 3.0? Let's look at creating seamless access to prepare...
Consumer IAM
Blog
Consumer IAM
Many businesses and public sector organizations are finding that they need to collect, store, and analyze more information about the consumers who use their services to provide better digital...
A Iot to Venture, More to GAIN
Blog
A Iot to Venture, More to GAIN
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the...
EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity
Blog
EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity
Vittorio Bertocci, Principal Architect at Auth0, is to deliver a presentation entitled Browser Features vs. Identity Protocols: An Arms Race? on Tuesday, September 14 starting at 9:50 am. at...
EIC Speaker Spotlight: Gerald Horst on Effective Integration of Marketing, CRM, and Customer Identity and Access Management
Blog
EIC Speaker Spotlight: Gerald Horst on Effective Integration of Marketing, CRM, and Customer Identity and Access Management
Gerald Horst, PwC’s Digital Identity team leader in EMEA, is to deliver a presentation entitled Modernizing the Customer Journey at the European Identity and Cloud Conference 2021 . To...
The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation
Blog
The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation
The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or...
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Security vs Convenience: In the Cloud, it’s Still Your Choice and Your Responsibility
Blog
Security vs Convenience: In the Cloud, it’s Still Your Choice and Your Responsibility
Social logins are extremely popular. Instead of going through a process of creating a new account on another website, you just click on the “Continue with Facebook” or “Sign in...
The changing role of Azure AD in Enterprise IAM Architectures
Blog
The changing role of Azure AD in Enterprise IAM Architectures
For many companies, Microsoft Azure Active Directory (Azure AD) was the basis for a coordinated step into the cloud, by extending the reach of their existing on-premises Active Directory to the...
Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures
Blog
Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures
Requirements for - and context of - the future Identity Fabric.  We call it Digital Transformation for lack of a better term, but it consists of much more than this buzzword is able to...
Account Takeovers on the Rise
Blog
Account Takeovers on the Rise
Account Takeover (ATO) attacks are on the rise. The  2019  Forter  Fraud Attack Index  shows a 45% increase in this type of attack on consumer identities in...