Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
A Iot to Venture, More to GAIN
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the...
Learn more
Executive View
Executive View
ForgeRock Workforce Identity Governance
This KuppingerCole Executive View report looks at the ForgeRock Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete...
Learn more
Event Recording
Event Recording
Lessons Learnt Rolling Out a B2B CIAM Program
Holcim is the Global leader in innovation and sustainable and building solutions and we are offering different digital solutions to the partners (Customers, suppliers, carriers...) making...
Learn more
The Importance of Consent Management: CIAM vs. GDPR
Blog
The Importance of Consent Management: CIAM vs. GDPR
Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling,...
Consumer Identity Summit 2016 - Summary
Blog
Consumer Identity Summit 2016 - Summary
KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well...
Comment: Know and Serve Your Customer
Blog
Comment: Know and Serve Your Customer
‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’...
Ping Identity Acquires UnboundID
Blog
Ping Identity Acquires UnboundID
Today, Ping Identity announced the acquisition of UnboundID . The two companies have been partnering already for a while, with a number of joint customers. After the recent acquisition of...
Not So Dead Yet: Why Passwords Will Survive All of Us
Blog
Not So Dead Yet: Why Passwords Will Survive All of Us
There is probably no single thing in Information Security that has been claimed being dead as frequent as the password. Unfortunately, it isn’t yet dead and far from dying. Far from it! The...
Strong Online Identities and Identity Sovereignty
Blog
Strong Online Identities and Identity Sovereignty
What is a strong online identity? A strong online identity can be defined as a combination of identification, authentication technologies along with personal identity data store capabilities which...
Managing the customer journey
Blog
Managing the customer journey
Every one of us, whether a security professional or not, is also a part-time online customer or a subscriber of digital services. Providing personal information to a service organisation, to a...
CIAM - Customer IAM explained
Blog
CIAM - Customer IAM explained
Martin Kuppinger talks about CIAM and explains what Customer IAM means.
The role of Adaptive Authentication in Consumer Identity Management
Blog
The role of Adaptive Authentication in Consumer Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor....
Challenges of large-scale IAM environments
Blog
Challenges of large-scale IAM environments
Long before analysts, vendors or journalists were coining terms like Digitalization, Identity Relationship Management or Customer IAM, several industries were already confronted with large-scale...
„Disruptive Change“: Right time to think security anew
Blog
„Disruptive Change“: Right time to think security anew
Is „Digital Transformation“ something of the future? Definitely not. It has long become reality. With connected things and production, business models of enterprises are already...
Secured by Design: The smart streets of San Francisco
Blog
Secured by Design: The smart streets of San Francisco
On April 18 th 1906, an earthquake and fires destroyed nearly three quarters of San Francisco. Around 3000 people lost their lives. Right up to the present many other, less critical tremors...