Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, SeamlesslyJan 29, 20194:00pm CET, 10:00am EST, 7:00am PST
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
CCPA: GDPR as a catalyst for improving data protection outside the EU
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Consumer Identity and Access Management (CIAM) encompasses many aspects. On the one hand, it is about optimizing the usability of services through technologies and practices to make it easier and secure for users sign up for a service. For the service providers, CIAM is all about lifecycle management of identities of many kinds - ensuring that accounts are set up, changed, and deactivated (or deleted) in a timely, accurate and secure manner. And for even more people, it focuses on security and compliance through technologies and practices that facilitate auditing and governance activities, such as recertification, easily and comprehensively.
Choosing and using the right components and services are critical to a successful CIAM deployment.
Language: English • Duration: 15:05 • Resolution: 1280x720
Executive View: Safe-T Software Defined Access - 79075
Whitepaper: OneSpan: Intelligent Adaptive Authentication - 80026
OT, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning