Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Webinar
Webinar
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best...
Learn more
Blog
Blog
The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation
The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or...
Learn more
Whitepaper
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #76: Do we really need Cloud Infrastructure Entitlement Management (CIEM)
CIEM is one of the latest entries to the set of 3- and 4-letter acronyms in IAM technology. Martin Kuppinger and Matthias take a look at the functionality behind it and its role within an...
Learn more
Analyst Chat #58: Innovation in CIAM
Analyst Chat
Analyst Chat #58: Innovation in CIAM
John Tolbert joins Matthias and shares insights about the results from the just recently published Leadership Compass CIAM. They talk about the overall maturing of the market and the areas of...
The Role of Customer Identity & Access Management in Digital Transformation
Webinar Recording
The Role of Customer Identity & Access Management in Digital Transformation
Companies and organizations have strategic decisions to make at the Customer Identity & Access Management (CIAM) front. First, they have to decide whether to invest into a dedicated CIAM...
Techniques for Securing Transactions With Identity Verification and Verifiable Claims
Webinar Recording
Techniques for Securing Transactions With Identity Verification and Verifiable Claims
Consumer and Workforce identities are under assault. Cybercrime and fraud are pervasive problems that have only escalated during the pandemic. Even as the number of online and mobile transactions...
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Security vs Convenience: In the Cloud, it’s Still Your Choice and Your Responsibility
Blog
Security vs Convenience: In the Cloud, it’s Still Your Choice and Your Responsibility
Social logins are extremely popular. Instead of going through a process of creating a new account on another website, you just click on the “Continue with Facebook” or “Sign in...
Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?
Webinar Recording
Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?
Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability...
KuppingerCole Identifies Leaders in Consumer Authentication
Webinar Recording
KuppingerCole Identifies Leaders in Consumer Authentication
Organizations are adopting Consumer Identity and Access Management (CIAM) solutions or enhancing their existing customer-facing IAM solutions with modular authentication services, in order to...
Onboarding Your Business Partners to Your Services: B2B IAM in Practice
Webinar Recording
Onboarding Your Business Partners to Your Services: B2B IAM in Practice
Virtually any business needs to grant business partners access to certain IT services. While employee IAM is a well-established discipline, where HR frequently delivers the information about...
How Leading Brands Build Trust With CIAM
Webinar Recording
How Leading Brands Build Trust With CIAM
In the age of digital transformation, consumers tend to have multiple digital identities across several devices deploying a variety of services. In this environment, digital trust is what sets...
The changing role of Azure AD in Enterprise IAM Architectures
Blog
The changing role of Azure AD in Enterprise IAM Architectures
For many companies, Microsoft Azure Active Directory (Azure AD) was the basis for a coordinated step into the cloud, by extending the reach of their existing on-premises Active Directory to the...
Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures
Blog
Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures
Requirements for - and context of - the future Identity Fabric.  We call it Digital Transformation for lack of a better term, but it consists of much more than this buzzword is able to...
Account Takeovers on the Rise
Blog
Account Takeovers on the Rise
Account Takeover (ATO) attacks are on the rise. The  2019  Forter  Fraud Attack Index  shows a 45% increase in this type of attack on consumer identities in...
Previous
3 4 5 6 7 8 9 Next