Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
Passwordless Authentication
Passwords have not been fit for purpose for a long time. They are too easy to guess, crack, discover, and steal. Passwords are also costly and time consuming to manage, and password reuse is a...
Learn more
Executive View
Executive View
Thales OneWelcome Identity Platform
This KuppingerCole Whitepaper looks at the Consumer Identity and Access Market and the key capabilities of vendors in this space. A technical review of the Thales OneWelcome Identity Platform is...
Learn more
Event Recording
Event Recording
Trust Inspiring CIAM – Essentials for a Secure, Experience-Driven Digital Business
Confusing Customer Identity Management (CIAM) with traditional Enterprise IAM comes at a high price: Applying internal regulatory compliance requirements and heavy security challenges to...
Learn more
Oops, Google Did It Again!
Blog
Oops, Google Did It Again!
Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m...
CIAM as a Key Factor in the Digital Transformation
Blog
CIAM as a Key Factor in the Digital Transformation
Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors,...
Thoughts on the Acquisition of Janrain by Akamai
Blog
Thoughts on the Acquisition of Janrain by Akamai
2019 started off with a very noteworthy acquisition in the identity and security space: the purchase of Janrain by Akamai. Janrain is a top vendor in the Consumer Identity market, as recognized...
Trends in Consumer Identity for 2019
Blog
Trends in Consumer Identity for 2019
2018 was a year of sweeping changes in Consumer Identity Management products and services. CIAM continues to be a fast-growing market. Research indicates that about half of all CIAM deals are...
Martin Kuppinger's Top 5 IAM Topics for 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
Consumer Identity World (CIW) USA 2018 - Report
Blog
Consumer Identity World (CIW) USA 2018 - Report
Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last...
Decentralized Identity 101: What It Is and Why It Matters
Blog
Decentralized Identity 101: What It Is and Why It Matters
Guest Author:  Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain...
Cross-Border Data Management and Cybersecurity:   Walking the Tightrope of Compliance and Business Efficiency
Blog
Cross-Border Data Management and Cybersecurity: Walking the Tightrope of Compliance and Business Efficiency
Guest Author : Jordan L. Fischer, Esq., Co-Founder & Managing Partner of XPAN Law Group, LLC Technology is changing rapidly, correlating in an increasing amount of data collected every...
Blockchain Identity – Success Factors and Challenges
Blog
Blockchain Identity – Success Factors and Challenges
When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the...
Some Perspective on Self-Sovereign Identity
Blog
Some Perspective on Self-Sovereign Identity
Identity isn't hard when you don't always use it. For example, here in the natural world we are anonymous—literally, nameless—in most of our public life, and this is a handy thing....
2018 – the Turning Point for Social Networks
Blog
2018 – the Turning Point for Social Networks
The Facebook data privacy story continues to be in the headlines this week. For many of us in IT, this event is not really a surprise. The sharing of data from social media is not a data breach,...
EBA Rules out Secure Open Banking?
Blog
EBA Rules out Secure Open Banking?
On January 30th in London I attended a joint workshop between OpenID and the UK Open Banking community that was facilitated by Don Thibeau of OIX. This workshop included an update from Mike Jones...