Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Vittorio Bertocci on Browser Changes Affecting Identity
Vittorio Bertocci, Principal Architect at Auth0, is to deliver a presentation entitled Browser Features vs. Identity Protocols: An Arms Race? on Tuesday, September 14 starting at 9:50 am. at...
Learn more
Whitepaper
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity...
Learn more
Event Recording
Event Recording
Trends in Passwordless Authentication for CIAM
Passwordless helps in reducing ATO fraud, provides better security, and smoother experience. But the passwordless approach for each organization and region is fundamentally different, in large...
Learn more
GDPR and Customer Data - Eyes on the Stars and Feet on the Ground
Blog
GDPR and Customer Data - Eyes on the Stars and Feet on the Ground
Big data analytics is getting more and more powerful and affordable at the same time. Probably the most important data within any organisation is knowledge of and insight into its customer's...
The Importance of Consent Management: CIAM vs. GDPR
Blog
The Importance of Consent Management: CIAM vs. GDPR
Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling,...
Consumer Identity Summit 2016 - Summary
Blog
Consumer Identity Summit 2016 - Summary
KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well...
Comment: Know and Serve Your Customer
Blog
Comment: Know and Serve Your Customer
‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’...
Ping Identity Acquires UnboundID
Blog
Ping Identity Acquires UnboundID
Today, Ping Identity announced the acquisition of UnboundID . The two companies have been partnering already for a while, with a number of joint customers. After the recent acquisition of...
Not So Dead Yet: Why Passwords Will Survive All of Us
Blog
Not So Dead Yet: Why Passwords Will Survive All of Us
There is probably no single thing in Information Security that has been claimed being dead as frequent as the password. Unfortunately, it isn’t yet dead and far from dying. Far from it! The...
Managing the customer journey
Blog
Managing the customer journey
Every one of us, whether a security professional or not, is also a part-time online customer or a subscriber of digital services. Providing personal information to a service organisation, to a...
CIAM - Customer IAM explained
Blog
CIAM - Customer IAM explained
Martin Kuppinger talks about CIAM and explains what Customer IAM means.
Challenges of large-scale IAM environments
Blog
Challenges of large-scale IAM environments
Long before analysts, vendors or journalists were coining terms like Digitalization, Identity Relationship Management or Customer IAM, several industries were already confronted with large-scale...
„Disruptive Change“: Right time to think security anew
Blog
„Disruptive Change“: Right time to think security anew
Is „Digital Transformation“ something of the future? Definitely not. It has long become reality. With connected things and production, business models of enterprises are already...
Secured by Design: The smart streets of San Francisco
Blog
Secured by Design: The smart streets of San Francisco
On April 18 th 1906, an earthquake and fires destroyed nearly three quarters of San Francisco. Around 3000 people lost their lives. Right up to the present many other, less critical tremors...
UMA and Life Management Platforms
Blog
UMA and Life Management Platforms
Back in 2012, KuppingerCole introduced the concept of Life Management Platforms . This concept aligns well with the VRM (Vendor Relationship Management) efforts of ProjectVRM , however it goes...