Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Customer Data Platforms Key to Seamless Omni-Channel Experiences
The digital era has ushered in an exciting new chapter in consumer experiences, but it can be challenging for organizations to deliver the seamless customer journey across various analog and...
Learn more
Leadership Compass
Leadership Compass
CIAM Platforms
This report provides an overview of the market for Consumer Identity and Access Management solutions and provides you with a compass to help you to find the CIAM product or service that best meets...
Learn more
Event Recording
Event Recording
Browser Features vs. Identity Protocols: An Arms Race?
In an attempt to protect users from excessive tracking and surveillance, the last couple of years have witnessed major browser vendors introducing increasingly restrictive anti-tracking measures....
Learn more
UMA in the Enterprise: There’s far more potential for UMA
Blog
UMA in the Enterprise: There’s far more potential for UMA
UMA, the upcoming User Managed Access Protocol , is a profile of OAuth 2.0. The specification itself defines the role of UMA as follows: “UMA defines how resource owners can control...
The end of the Social Login begins: FIDO Alliance, Samsung, and PayPal to redefine authentication
Blog
The end of the Social Login begins: FIDO Alliance, Samsung, and PayPal to redefine authentication
Recently, the FIDO Alliance announced that PayPal and Samsung were enabling consumer payments with fingerprint authentication on the new Samsung Galaxy S5. My valued colleague Dave Kearns and I...
BYOI Revisited
Blog
BYOI Revisited
Some time ago, in the wake of Wired journalist Mat Honan’s story of his account compromise (“ How Apple and Amazon Security Flaws Led to My Epic Hacking ”), I wrote about  BYOI – Bring Your Own...
The Honan Hack and the BYOI meme
Blog
The Honan Hack and the BYOI meme
By now you should have heard about the so-called “epic” hacking of the accounts of Wired journalist Mat Honan. Only those on vacation well out of civilization (i.e., no internet, no phones, no...
Previous
1 2 3 4 5 6