Insights

Customer Identity & Access Management

CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. CIAM solutions help organizations to comply with privacy regulations. Good CIAM systems can improve the customer experience.

KC Open Select
KC Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
Entering a New Era: CIAM 2.0
Questioning our identity fundamentals: Is single sign-on, multi-factor authentication, passwordless authentication, etc. enough for Web 3.0? Let's look at creating seamless access to prepare...
Learn more
Leadership Compass
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #76: Do we really need Cloud Infrastructure Entitlement Management (CIEM)
CIEM is one of the latest entries to the set of 3- and 4-letter acronyms in IAM technology. Martin Kuppinger and Matthias take a look at the functionality behind it and its role within an...
Learn more
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
The Disjointed State of CIAM
Blog
The Disjointed State of CIAM
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the...
Avoiding Pitfalls in CIAM
Blog
Avoiding Pitfalls in CIAM
Sadrick Widmann, CEO at cidaas, thinks that the biggest risk to an organization’s network is the user. Therefore, users need to be supported by frictionless technology so they don't engage in risky...
CIAM: Balancing security and user experience to get value from customer data
Blog
CIAM: Balancing security and user experience to get value from customer data
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely...
Passwordless Authentication
Blog
Passwordless Authentication
Passwords have not been fit for purpose for a long time. They are too easy to guess, crack, discover, and steal. Passwords are also costly and time consuming to manage, and password reuse is a...
Digital Transformation
Blog
Digital Transformation
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid...
CIAM a Way of Managing and Getting Value from Consumer Data
Blog
CIAM a Way of Managing and Getting Value from Consumer Data
As interactions between organizations and consumers of goods and services increasingly happen online, the collection, protection, and management of consumer information has become increasingly...
Customer Data Platforms Key to Seamless Omni-Channel Experiences
Blog
Customer Data Platforms Key to Seamless Omni-Channel Experiences
The digital era has ushered in an exciting new chapter in consumer experiences, but it can be challenging for organizations to deliver the seamless customer journey across various analog and...
Future Proof Your Organization with Policy-Based Access Management
Blog
Future Proof Your Organization with Policy-Based Access Management
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem...
1 2 3 4 5 6 7 Next