Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation
The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or...
Learn more
Executive View
Executive View
Synacor Cloud ID
Synacor offers Cloud ID as a highly capable and scalable Consumer Identity and Access Management (CIAM) solution for the consumer services and media streaming market. Their platform is fully...
Learn more
Event Recording
Event Recording
The Journey to Decarbonization and the Role of Digital Identity
In this session, we will explore how technology is playing a crucial role in decarbonization efforts. We will discuss how Customer Identity and Access Management (CIAM) can enable digital...
Learn more
How Policy Based CIAM can Improve the Customer Journey
Event Recording
How Policy Based CIAM can Improve the Customer Journey
In an ever-changing and rapidly evolving world, the fight about the customer is getting tougher. Companies that can offer a customer-centric approach have the advantage. With new technologies such...
5 months of GDPR –  status quo on implementation of the most extensive digital law in the world
Event Recording
5 months of GDPR – status quo on implementation of the most extensive digital law in the world
How are companies, consumers and authorities taking the new regulation?
Panel: Blockchain, Identity and Privacy - How to Combine It?
Event Recording
Panel: Blockchain, Identity and Privacy - How to Combine It?
Blockchain, Identity and Privacy: Three words that buzz, fade and mature.  The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how...
A Digital Society Needs a Digital ID
Event Recording
A Digital Society Needs a Digital ID
Our world is becoming more digital and more mobile every day. The sensitivity of information being exchanged online grows rapidly and data privacy is a real concern to many people. How are we...
Panel: CIAM Strategy Best Practice
Event Recording
Panel: CIAM Strategy Best Practice
When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The...
Privacy By Design in Practice
Event Recording
Privacy By Design in Practice
Privacy has become a global concern, with regulations such as GDPR coming into effect. In this context, e-commerce businesses that operate globally cannot simply adopt data protection regulations...
The End of the Password – How to Really Protect Digital Identity
Event Recording
The End of the Password – How to Really Protect Digital Identity
In the digitalized world, passwords are not sufficient anymore to protect digital logins and transactions. What’s even worse: In 81 percent of all cases, they are the main reason for a hack....
Consent Life Cycle Management
Event Recording
Consent Life Cycle Management
Consent Management is a crucial aspect of PSD2 and GDPR regulation. At initial thought, consent seems to be simple but from legal and regulatory perspective its complexity arises. Managing consent...
Panel: How to Defend your Customer from Current and Future Threats
Event Recording
Panel: How to Defend your Customer from Current and Future Threats
This  panel will explore contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.  Learn best practices from data protection &...
Data Privacy — Who Actually Cares and Why?
Event Recording
Data Privacy — Who Actually Cares and Why?
Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook....
Transform Your Customer Experience: Customer Identity Today and Tomorrow
Event Recording
Transform Your Customer Experience: Customer Identity Today and Tomorrow
Customers are increasingly expecting more from the businesses they interact with, especially as security and privacy breaches dominate headlines. Customer Identity and Access Management can help...
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
Webinar Recording
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the...
Previous
5 6 7 8 9 10 11 Next