Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
Digital Transformation
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid...
Learn more
Leadership Compass
Leadership Compass
Reusable Verified Identity
This Leadership Compass provides an overview of up-to-date insights on the leaders in innovation, product features, and market reach for Reusable Verified Identity. These vendors enable a digital...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #147: How To Manage Your Clients, From Customers and Citizens to B2B and B2B2C
CIAM solutions are designed to address specific technical requirements that consumer-facing organizations have that differ from traditional “workforce” or Business-to-Employee (B2E)...
Learn more
UMA and Life Management Platforms
Blog
UMA and Life Management Platforms
Back in 2012, KuppingerCole introduced the concept of Life Management Platforms . This concept aligns well with the VRM (Vendor Relationship Management) efforts of ProjectVRM , however it goes...
UMA in the Enterprise: There’s far more potential for UMA
Blog
UMA in the Enterprise: There’s far more potential for UMA
UMA, the upcoming User Managed Access Protocol , is a profile of OAuth 2.0. The specification itself defines the role of UMA as follows: “UMA defines how resource owners can control...
The end of the Social Login begins: FIDO Alliance, Samsung, and PayPal to redefine authentication
Blog
The end of the Social Login begins: FIDO Alliance, Samsung, and PayPal to redefine authentication
Recently, the FIDO Alliance announced that PayPal and Samsung were enabling consumer payments with fingerprint authentication on the new Samsung Galaxy S5. My valued colleague Dave Kearns and I...
BYOI Revisited
Blog
BYOI Revisited
Some time ago, in the wake of Wired journalist Mat Honan’s story of his account compromise (“ How Apple and Amazon Security Flaws Led to My Epic Hacking ”), I wrote about  BYOI – Bring Your Own...
The Honan Hack and the BYOI meme
Blog
The Honan Hack and the BYOI meme
By now you should have heard about the so-called “epic” hacking of the accounts of Wired journalist Mat Honan. Only those on vacation well out of civilization (i.e., no internet, no phones, no...
Previous
1 2 3 4 5 6