{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/134","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"COVID-19 is a global epidemic that demands decisive and robust action. Following the announcement by the World Health Organization (WHO) to…","fields":{"slug":"/identity/loginradius-business-continuity-covid-19-outbreak/"},"html":"<p><em>COVID-19 is a global epidemic that demands decisive and robust action.</em></p>\n<p>Following the announcement by the World Health Organization (WHO) to address the <a href=\"https://www.who.int/emergencies/diseases/novel-coronavirus-2019/events-as-they-happen\">coronavirus (COVID-19) threat as a pandemic</a>, organizations across the globe are looking to their Business Continuity Management (BCM) plan to make sure they are covered.</p>\n<p>For LoginRadius, as a SaaS-based customer identity platform,  planning ahead to counter any disruption has always been an essential aspect of its resilience program. </p>\n<p>Consequently, we have put our contingency plan to action to fight the current and future risks to our business, and our customers' businesses, due to the COVID-19 outbreak.</p>\n<h2 id=\"mitigating-risk-by-loginradius\" style=\"position:relative;\"><a href=\"#mitigating-risk-by-loginradius\" aria-label=\"mitigating risk by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mitigating Risk by LoginRadius</h2>\n<p>As the developing situation changes with respect to world health outlook, we have outlined three key areas to ensure our readiness towards workplace mitigation. They include:</p>\n<ul>\n<li>Employee health and safety</li>\n<li>Service operations</li>\n<li>Business operations</li>\n</ul>\n<p>Thereafter, we are prepared to react accordingly to ensure business continuity. Here’s what our plan looks like:</p>\n<p><strong>Employee Health and Safety</strong></p>\n<p>We are mindful of our employees and are up to date on the officially mandated actions related to hygiene and safety at our workstations. Likewise, we have rolled out the following policies:</p>\n<ul>\n<li>Hand-washing policy and education:  We have trained our staff on proper, effective hygiene practices for reducing the risk of contracting or spreading the virus. </li>\n<li>Travel restrictions, guidelines, and recommendations - We have limited all non-essential business travel and travel to designated high-risk regions. </li>\n<li>Remote Workforce - Phase 1: We have allowed optional, voluntary work from home. This measure is already in place. All staff in all locations have the autonomy and flexibility to work remotely to help mitigate the risk of exposure from public transit and closed communal spaces.</li>\n<li>Remote Workforce - Phase 2: We will impose mandatory work from home. If mandated by the government or regulatory bodies, or implemented by LoginRadius management, we are prepared for mandatory full-time remote work. We have already tested this measure and are to enact it as needed.</li>\n<li>We have installed multiple hand sanitizers within the office premises. </li>\n<li>We ensure frequent cleaning and sanitization of our workplaces. </li>\n<li>We have increased space between employees' workstations.</li>\n</ul>\n<p><strong>Service Operations</strong></p>\n<p>As an automated, fully cloud-based software solution redundantly hosted on industry-leading infrastructure providers like Amazon Web Services and Microsoft Azure, the LoginRadius platform is inherently insulated from the business and commercial impacts of the virus. </p>\n<p>This includes impacts from regional staffing and manpower shortages or disruptions in global supply chains.</p>\n<p>We have been working for several weeks with impromptu and scheduled drills to help ensure that operations run without disruption in the eventuality of an outbreak or other critical event which may impact our organization.</p>\n<p><strong>Business Operations</strong></p>\n<p>Similarly, we have rolled out remote working policies for all LoginRadius team members. Employees can work offsite as they would on-premises, guaranteeing no disruption to business operations, including our customer-facing sales, customer success, support, and account management teams.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>We place the highest value on the partnerships that we've established with our customers and stakeholders. Rest assured, we are committed to ensuring uninterrupted success, even in times of hardship and challenges.</p>\n<p>In the end, we wish our customers health, security, and good fortune.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA Graphics for Blogs V03 01 05 3 1024x310\"\n        title=\"CTA Graphics for Blogs V03 01 05 3 1024x310\"\n        src=\"/static/d66987b67542719567f4fddb41b0fe18/e5715/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png\"\n        srcset=\"/static/d66987b67542719567f4fddb41b0fe18/a6d36/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png 650w,\n/static/d66987b67542719567f4fddb41b0fe18/e5715/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png 768w,\n/static/d66987b67542719567f4fddb41b0fe18/2bef9/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 17, 2020","updated_date":null,"description":"COVID-19 is a global epidemic which demands action that is decisive and robust.","title":"LoginRadius Announces Its Business Continuity Plan to Fight COVID-19 Outbreak","tags":["LoginRadius","industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/0cba9af333c5468f0d2da4b839d4d8da/6051d/loginradius-business-continuity.png","srcSet":"/static/0cba9af333c5468f0d2da4b839d4d8da/69585/loginradius-business-continuity.png 200w,\n/static/0cba9af333c5468f0d2da4b839d4d8da/497c6/loginradius-business-continuity.png 400w,\n/static/0cba9af333c5468f0d2da4b839d4d8da/6051d/loginradius-business-continuity.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The hospitality industry has always been about luxury, pleasure, and excellent customer services. Modern guests travel for both business and…","fields":{"slug":"/growth/improve-customer-experience-hospitality-industry/"},"html":"<p>The hospitality industry has always been about luxury, pleasure, and excellent customer services. Modern guests travel for both business and pleasure. Therefore, they expect business owners to interact better and understand them well. </p>\n<p>They love it when hotel owners engage and empower them. They want to be delighted by personalized experiences, and when that happens, they are likely to come back for more stays. </p>\n<p>If your company isn’t doing it yet, you are already behind. Your competitors may have reinvented their <a href=\"https://www.loginradius.com/blog/2018/11/enterprise-needs-digital-business-transformation-strategy/\">digital transformation plan</a> and offering customer-centric hospitality experience with comfort features and better customer service. </p>\n<p>So, how do you catch up with the latest trends? Here are a few of the latest customer-centric innovations in the hospitality industry. </p>\n<h2 id=\"2020s-top-5-trends-in-the-hospitality-industry\" style=\"position:relative;\"><a href=\"#2020s-top-5-trends-in-the-hospitality-industry\" aria-label=\"2020s top 5 trends in the hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2020’s Top 5 Trends in the Hospitality Industry</h2>\n<h3 id=\"1-artificial-intelligence-will-eliminate-human-error\" style=\"position:relative;\"><a href=\"#1-artificial-intelligence-will-eliminate-human-error\" aria-label=\"1 artificial intelligence will eliminate human error permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Artificial intelligence will eliminate human error.</h3>\n<p>AI has been a game-changer for the hospitality industry. One of the most popular reasons behind its popularity is its ability to work like humans (minus the error). </p>\n<p>Compared to the traditional setup, AI treats businesses with a host of advantages including:</p>\n<ul>\n<li>Eliminating human errors.</li>\n<li>Providing personalized services.</li>\n<li>Offering tailored recommendations.</li>\n<li>Automating techniques for customer advocacies. </li>\n<li>Assisting data analysis and data collection.</li>\n<li>Adapting to customer interactions.</li>\n</ul>\n<p>Moving on, let’s find out how deep is the impact of AI in the hospitality industry. Here are a few:</p>\n<ul>\n<li><strong>Brand monitoring</strong> - Travelers love to post reviews after their vacation. And speaking of reviews, negative comments have the potential to influence more people.<br>\nWith AI, hotel owners can keep a check on what messaging people are exchanging about their property, amenities, services, and stays.  </li>\n<li>\n<p><strong>Competitive analysis</strong> - When it comes to reviewing customer feedback, competitive analysis plays an important role. The advantages are three-fold. It helps hotel owners understand their guests, figure out their expectations, and what they liked or disliked about their stay.   </p>\n<p>AI can capture such information with 100% accuracy – something human eyes aren’t capable of analyzing. </p>\n</li>\n</ul>\n<p><strong>Frictionless authentication</strong> - Facial recognition is one of the most delightful <a href=\"https://www.hotelmanagement.net/tech/facial-recognition-tech-creates-service-security-options\">self-servicing technology</a> that delights guests in the hospitality industry. Everybody would love the opportunity to skip queues at the front desk while checking-in. Well, AI-infused facial recognition is your solution.</p>\n<h3 id=\"2-iot-will-offer-smart-customized-solutions\" style=\"position:relative;\"><a href=\"#2-iot-will-offer-smart-customized-solutions\" aria-label=\"2 iot will offer smart customized solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. IoT will offer “smart” customized solutions</h3>\n<p>IoT solutions for hotels will add extra oomph to customer experience in 2020. </p>\n<p>At the core of the hospitality industry lies the ultimate guest experience. People love to feel special – a reason why the concept of customization went mainstream. Blending hospitality with IoT will do <a href=\"https://www.ezeeabsolute.com/blog/iot-in-hospitality-industry/\">wonders for hotel operators</a>.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsSAAALEgHS3X78AAABmklEQVQoz3WS2U7CUBCGuYE5p41CjEYu3BIpLV2AAhJoacvpArUxJhA0rOqNz2Di0zunLErAZHK6TL/5Z/5phpZ7PCT799wLGxTvrBFfORPBiIgW4JtdNrO+ENWnekh5zvlLYpCyk28kl70XqCVUZfswqlUY1SMkiRHRdW0pDdmlssPFq0OqBim511eG59TgwhzcsamoRwT1MaG41BiQ1gi6U+gtecVS93AoDlOlj58KKI5ANaa8RERrCXRnYM3BeQNrduDFbmbeeZ9qPm9MsokxwEcwn6k9zznvYC+gt+JWSdYxeOPN9saIcvfWbbBorr5O2Ue2M0V97sv/cKqf2iOoLCv3K2wSfX6fectsc0TaYz627HB97Guzsx0spZPjKwzVJ/VE1IOC7hMURKvxVDxSS3DVxVZcbA5F5Csss2lVcUl1SLQQV4IkLomoLKelm1e8tLoFFXZuDpG87jzldQZauDUMrdJ8sT2Gzisqc6mSJez/fFhO0MO8+VgwY150p0xk96Qe37gTeBjzqWTn2G6Q90GPYN2RZP8AWUZwiOMR09QAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IOT devices in hospitality sector\"\n        title=\"IOT devices in hospitality sector\"\n        src=\"/static/30b61a4cb5c367d513db874b78cc70f9/e5715/image2-1.png\"\n        srcset=\"/static/30b61a4cb5c367d513db874b78cc70f9/a6d36/image2-1.png 650w,\n/static/30b61a4cb5c367d513db874b78cc70f9/e5715/image2-1.png 768w,\n/static/30b61a4cb5c367d513db874b78cc70f9/2bef9/image2-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Wondering how? Let’s find out.</p>\n<ul>\n<li>Businesses can save a lot on operational costs (human resources management, housekeeping, front desk).</li>\n<li>With more customer engagement, businesses can enjoy increased revenue generation. </li>\n<li>With progressive profiling, businesses can better understand the likes, dislikes, and preferences of their guests.</li>\n<li>There will be no more standing in long queues for check-in and check-out. </li>\n<li>For hotels that offer in-house navigation, it will be easier for guests to find all the amenities inside the property.</li>\n<li>Thanks to <a href=\"https://www.loginradius.com/progressive-profiling/\">progressive profiling</a>, hotels can understand their guests and offer them customized choices to order from. For example, they can customize their room temperature based on their guests’ sleep preferences or give them a personalized breakfast menu.</li>\n</ul>\n<p>What more?</p>\n<p>The hospitality industry can also automate room services. Hotels can ask guests to fill out their preferences through a centralized app and customize their stays accordingly. </p>\n<p>For example, they can install motion sensors to switch on the lights when they wake up with the coffee machine brewing their favorite cup of coffee. </p>\n<p>They can install sensors to detect occupancy and switch off lights automatically as the guests leave. </p>\n<p>They can install sensors to detect faulty appliances (like leaky taps, broken AC, heater, geyser, etc.) inside the hotel room and notify the maintenance team before check-in.</p>\n<h3 id=\"3-virtual-reality-vr-will-be-a-key-differentiator\" style=\"position:relative;\"><a href=\"#3-virtual-reality-vr-will-be-a-key-differentiator\" aria-label=\"3 virtual reality vr will be a key differentiator permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Virtual Reality (VR) will be a key differentiator.</h3>\n<p>Another example of creating personalized experiences in the hospitality industry is virtual reality. VR offers the ability to transport a person from one space to another within the digital ecosystem. </p>\n<p>In the hotel business, VR can allow guests to enjoy a 360-degree view of the hotel and find out what their rooms will look like booking the property. </p>\n<p>On a different note, VR’s virtually simulated environment can be used as a source of entertainment too, by offering their guests a tour of the local attractions right from the hotel premises.</p>\n<h3 id=\"4-augmented-reality-ar-will-rule-the-hospitality-industry\" style=\"position:relative;\"><a href=\"#4-augmented-reality-ar-will-rule-the-hospitality-industry\" aria-label=\"4 augmented reality ar will rule the hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Augmented Reality (AR) will rule the hospitality industry.</h3>\n<p>Augmented Reality, on the other hand, simulates real-world surroundings with digitally enhanced overlays. The concept is almost similar to VR, where the entire surrounding is changed.</p>\n<p>The hospitality industry can use it to its <a href=\"https://www.revfine.com/augmented-reality-hospitality-industry/\">advantage in a number of ways</a>. Imagine the walls of your room are infused with AR-powered technology. At the tap of a button, it can transform into any surrounding (beach, forest, cloud, city heights) you like and let you enjoy the experience without actually being physically present.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"augmented reality (AR) in hospitality industry\"\n        title=\"augmented reality (AR) in hospitality industry\"\n        src=\"/static/4d52b04e5aae9acff6c237b3c1cd5ad5/e5715/image3-1.png\"\n        srcset=\"/static/4d52b04e5aae9acff6c237b3c1cd5ad5/a6d36/image3-1.png 650w,\n/static/4d52b04e5aae9acff6c237b3c1cd5ad5/e5715/image3-1.png 768w,\n/static/4d52b04e5aae9acff6c237b3c1cd5ad5/2bef9/image3-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"5-digital-registration-forms-will-replace-the-use-of-pen-and-paper\" style=\"position:relative;\"><a href=\"#5-digital-registration-forms-will-replace-the-use-of-pen-and-paper\" aria-label=\"5 digital registration forms will replace the use of pen and paper permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Digital registration forms will replace the use of pen and paper</h3>\n<p>The hospitality and tourism industry is largely responsible for the emission of CO2 in the atmosphere. 2020 will be the year of sustainability. Hotel owners will limit the use of traditional forms by introducing digital check-in and check-out processes. </p>\n<p>Guests can use a check-in terminal or conduct advanced check-in through an app to make the process as seamless as possible. </p>\n<p>Also, hospitality companies witness a huge influx of data every day. In the quest to offer personalized services with unique experiences, they need to understand customer behavior.</p>\n<p><a href=\"https://www.business2community.com/cybersecurity/5-data-security-errors-that-can-break-your-business-02290681\">Data can make or break a business</a>. Some of the popular data metrics include name, length of stay, number of guests, property type (urban, suburban), geographics (region, country, city), reservation source (travel agent, corporate online site, direct call, meeting), number of repeat stays, etc.</p>\n<p>No wonder the hospitality industry requires a reliable identity management platform that prioritizes data security from unauthorized access, being tampered or destroyed.</p>\n<h2 id=\"the-role-of-loginradius-identity-platform-in-the-hospitality-industry\" style=\"position:relative;\"><a href=\"#the-role-of-loginradius-identity-platform-in-the-hospitality-industry\" aria-label=\"the role of loginradius identity platform in the hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of LoginRadius Identity Platform in the Hospitality Industry</h2>\n<p>Simply put, data security is a crucial metric for hotel owners. Guests should never feel insecure about their data, and that’s rule 1. </p>\n<p>Henceforth, advanced identity management policies, coupled with frictionless verification should make security seem effortless. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-travel-and-leisure-companies-use-loginradius-identity-solution/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABjklEQVQY02PgVLP5D8Jc6jb/uTVs//No2P3nVrcFiln/h8nBMIeK1X8ubaf/gqZ+/4V0nf5zajn959Cw/8+pav2fA6qGAUSADBDRcfgvADSEW8n8Pz/QcEkj9//i+i7/+TTt/3OoWkMNtPzPref2X9Y5+r+2S/h/dtPA/2w6bkADrSDyQHUMMNsVzbz+m7pH/DdwCv4vqGn3n9cq9D+fkdd/XnWQQhu4BhmgOhlTz//ixu7/Zc08/8tZeP/nRbKUAaZQ3yXsv0dExv/AxIL/eg6B/8VMvf/L2wT9F9R2AMtzAdUxKZj/5wPyJYw9/osauIINFdZ3BYujGMimbPl//Y79/9+9f///9t37/+89ePT/wYOH/9+9e//fNiT1P4Oc6X9GebP/+Q29/09fvPZ/+cad/xeu2fJ/weot//cfO/N/7fZ9/4X0nMHmMIBsZgUy9gElQODDhw//v3z+/P/bt29gvlNE5n8GGWOwYhC7vH3y/6yazv+Z1R3/M6s6/hc19/9PKWv5z6fl8J8dGGkAJ4nfK3vL0E4AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image4 1\"\n        title=\"image4 1\"\n        src=\"/static/5d953a9f32d67cdd6afb453e81c80fbf/e5715/image4-1.png\"\n        srcset=\"/static/5d953a9f32d67cdd6afb453e81c80fbf/a6d36/image4-1.png 650w,\n/static/5d953a9f32d67cdd6afb453e81c80fbf/e5715/image4-1.png 768w,\n/static/5d953a9f32d67cdd6afb453e81c80fbf/2bef9/image4-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>When your business revolves around accommodating customer preferences, the need for identity verification becomes crucial. LoginRadius is a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) platform that helps hotel owners to roll out strict security policies while offering excellent customer experiences. </p>\n<p>With LoginRadius, here’s what you can offer your customers:</p>\n<h3 id=\"seamless-verification-with-biometrics-authentication\" style=\"position:relative;\"><a href=\"#seamless-verification-with-biometrics-authentication\" aria-label=\"seamless verification with biometrics authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Seamless verification with biometrics authentication</h3>\n<p>The hospitality industry is a booming market at the moment. With intense competition happening at the backdrop, taking charge of internal processes and increasing security within the hotel staff has become more crucial than ever.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"seamless biometrics authentication - Loginradius\"\n        title=\"seamless biometrics authentication - Loginradius\"\n        src=\"/static/ac9285309a913f8e9ebeb55a91364398/e5715/image5-1.png\"\n        srcset=\"/static/ac9285309a913f8e9ebeb55a91364398/a6d36/image5-1.png 650w,\n/static/ac9285309a913f8e9ebeb55a91364398/e5715/image5-1.png 768w,\n/static/ac9285309a913f8e9ebeb55a91364398/d0143/image5-1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Looking ahead, LoginRadius’ biometric technology will help you: </p>\n<ul>\n<li>Monitor the attendance of your staff in real-time. </li>\n<li>Schedule shifts and manage them efficiently.</li>\n<li>Review staff holidays, late coming, etc. in real-time. </li>\n<li>Improve staff productivity. </li>\n<li>No tailgating with accurate identification.</li>\n<li>On-time salary and payroll.</li>\n</ul>\n<h3 id=\"strict-adherence-to-global-regulatory-compliances\" style=\"position:relative;\"><a href=\"#strict-adherence-to-global-regulatory-compliances\" aria-label=\"strict adherence to global regulatory compliances permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Strict adherence to global regulatory compliances</h3>\n<p>The hospitality industry runs a <a href=\"https://www.hospitalitynet.org/news/4094427.html\">high risk of data theft</a>, and when that happens, it leads to severe repercussions, extending far beyond reputations damage.</p>\n<p>Therefore, you need to understand the nature of the data you collect from your guests to protect it. Generally, it falls under three categories.</p>\n<ul>\n<li><strong>Personal data</strong> - includes name, date of birth, and contact information, i.e., basic information.</li>\n<li><strong>Preference data</strong> - includes room type, special check-in/ check-out requests, i.e., information tracked by hotels to understand the likes and dislikes of their guests.</li>\n<li><strong>Transaction data</strong> - include bank numbers, credit card information, i.e., information related to payment and reservation services.</li>\n</ul>\n<p><a href=\"https://www.zdnet.com/article/hotel-front-desks-are-now-a-hot-target-for-hackers/\">Cybercriminals are mostly fond</a> of personal and transaction data. A lot of such data is collected, stored, and processed daily. As hotel operators, it is your responsibility to ensure that all data remains protected. </p>\n<p>LoginRadius abides by industry-approved security compliances like EU’s <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">GDPR and California’s CCPA</a> to keep guests’ data safe and protected at all times.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Most businesses in the hospitality sector offer complex ownership structures. Hence, it is only feasible to shift your data protection responsibilities to an ideal customer identity and access management platform that commits to securely managing your guests’ data. </p>\n<p>After all, the hospitality industry is all about customer experiences and keeping up with their changing expectations.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 13, 2020","updated_date":null,"description":"It has always been about luxury, pleasure, and excellent customer service in the hospitality industry. Modern guests travel for both company and fun. They also want business owners to better connect and understand them well.","title":"Improving Customer Experience in the Hospitality Industry","tags":["digital transformation","cx","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/e399c056362534dc2967afeacbad60a5/33aa5/hospitality.jpg","srcSet":"/static/e399c056362534dc2967afeacbad60a5/f836f/hospitality.jpg 200w,\n/static/e399c056362534dc2967afeacbad60a5/2244e/hospitality.jpg 400w,\n/static/e399c056362534dc2967afeacbad60a5/33aa5/hospitality.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"With population growth and municipal services expanding, cities need to get creative on how to provide services to all citizens without…","fields":{"slug":"/identity/unlock-the-future-of-smart-cities/"},"html":"<p>With population growth and municipal services expanding, cities need to get creative on how to provide services to all citizens without compromising the quality of service. A single platform is needed where all services are centralized and customer experience is taken into account. Below, we’ll look at some examples and best practices for municipalities to follow. </p>\n<p>As digital transformation transforms everyday life and interactions, cities are looking for ways to offer their services through online platforms. Cities are becoming “smarter” not to jump onto the technology bandwagon but in order to increase citizen engagement and serve them better. </p>\n<p>Residents are accustomed to 24/7, anywhere access to consumer products and services, and this expectation has bled over into government and municipal services. That’s why utility companies are also adapting their business models to work with new digital technology.</p>\n<p><a href=\"https://www.loginradius.com/registration-and-authentication/\">The LoginRadius Citizen Identity Platform</a> helps cities overcome these obstacles in three ways: </p>\n<ol>\n<li>\n<p>Centralizing online services: Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The LoginRadius Identity Platform enables cities to centralize their customer-facing digital applications into one portal.  </p>\n<p>This single locus of access delivers a connected experience across multiple touchpoints and channels. LoginRadius has supported applications such as Account Summary, Customer Profile, Permit Applications and Bill Payment.   </p>\n</li>\n<li>\n<p>Helping maintain one digital identity across all customer service: What good is a centralized portal if citizens have to create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a thorough view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.  </p>\n<p>Without a seamless user experience, engagement rates drop. But with <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius Single Sign-on (SSO),</a> cities and companies can allow customers to access all applications within their platform with a single set of unified credentials, rather than having to separately register and log in to each service.   </p>\n</li>\n<li>\n<p>Integrating with third-party applications: Many public sector organizations have a hard time using customer data to improve the digital experience. The LoginRadius Identity Platform offers prebuilt integrations with over 150 third-party applications such as CRM, email marketing tools, online communities, payment systems and more.  </p>\n<p>This enables organizations to use that customer data to better understand their customers, offer more useful information and deliver that information more directly.</p>\n</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/surrey-case-study\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CS My City MySurrey 1024x310\"\n        title=\"CS My City MySurrey 1024x310\"\n        src=\"/static/74d44f3e4dc15fbc3851fa141c45e104/e5715/CS-My-City-MySurrey-1024x310.png\"\n        srcset=\"/static/74d44f3e4dc15fbc3851fa141c45e104/a6d36/CS-My-City-MySurrey-1024x310.png 650w,\n/static/74d44f3e4dc15fbc3851fa141c45e104/e5715/CS-My-City-MySurrey-1024x310.png 768w,\n/static/74d44f3e4dc15fbc3851fa141c45e104/2bef9/CS-My-City-MySurrey-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The City of Surrey offers a great real-world example of what our Identity Platform can do. This bustling city in Metro Vancouver, British Columbia welcomes approximately 1,500 new residents per month – all in need of municipal services. The City was not able to expand its physical offices or add staff, so the solution was to move all services online.</p>\n<p>We’ve created a case study to show you how the LoginRadius Identity Platform helped the City of Surrey transform its online services and unlock its future as a smart city.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo-loginradius\"\n        title=\"Book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/Book-a-demo-1024x310.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/Book-a-demo-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 13, 2020","updated_date":null,"description":"With population growth and the expansion of public services, cities need to be innovative about how to provide services to all people without compromising service quality. There is a need for a single platform where all facilities are centralised and customer experience is considered. Below, for municipalities to follow, we'll look at some examples and best practises.","title":"Unlock the Future of Smart Cities","tags":["digital transformation","digital identity","sso"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/29ce2162a588a4637c77eb9076493282/33aa5/future-of-smart-cities.jpg","srcSet":"/static/29ce2162a588a4637c77eb9076493282/f836f/future-of-smart-cities.jpg 200w,\n/static/29ce2162a588a4637c77eb9076493282/2244e/future-of-smart-cities.jpg 400w,\n/static/29ce2162a588a4637c77eb9076493282/33aa5/future-of-smart-cities.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory…","fields":{"slug":"/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/"},"html":"<p>As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory compliances. </p>\n<p>From the EU’s General Data Protection Regulation (GDPR) to the recently released California's Consumer Privacy Act (CCPA), each regulation has a unique strategic imperative. </p>\n<ul>\n<li>The European Union’s GDPR came into force on May 25, 2018, to protect the personally identifiable information (PII) of its citizens. </li>\n<li>Likewise, on January 1, 2020, the California Consumer Privacy Act (CCPA) went live, affecting millions of companies with its share of new consumer rights.</li>\n</ul>\n<p>Businesses cannot afford to ignore these new policies. From a financial point of view, the  <a href=\"https://www.itgovernance.co.uk/dpa-and-gdpr-penalties\">European supervisory authorities</a> imposed as many as 133 administrative penalties by the end of 2019, which sums up to a massive fine of approximately €400 million (£337 million).</p>\n<p>Businesses need to understand that customers are the sole drivers of the economy, and a trusted relationship with them will lead to loyalty and boosted revenue generation.</p>\n<p>On a similar note, enterprises are often curious if LoginRadius, as a customer identity and access management (CIAM) platform, meets regulatory requirements of the popular data protection laws.</p>\n<p>Well yes, it does.</p>\n<p>Not just the infamous GDPR, LoginRadius also helps enterprises adhere to the recently active <a href=\"https://www.loginradius.com/blog/2019/05/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>.</p>\n<p>But before we go any further, let’s understand a few things about the CIAM platform and the CCPA compliance.</p>\n<h2 id=\"what-does-it-take-to-make-the-perfect-ciam-platform\" style=\"position:relative;\"><a href=\"#what-does-it-take-to-make-the-perfect-ciam-platform\" aria-label=\"what does it take to make the perfect ciam platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does it take to make the perfect CIAM platform?</h2>\n<p>Well, the driving force of CIAM lies in its ability to use data security as a tool for offering seamless customer experiences. </p>\n<p>Customer Identity and Access Management (CIAM) is a relatively new customer-focused business solution that collects, manages, and provides a secure and seamless access to customer's personal data.</p>\n<p>An ideal <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">customer identity management platform</a> should include all the crucial components that drives an enterprise – from customers, suppliers, contractors, partners, employees to systems, applications, and devices.</p>\n<h2 id=\"what-is-the-california-consumer-privacy-act-ccpa\" style=\"position:relative;\"><a href=\"#what-is-the-california-consumer-privacy-act-ccpa\" aria-label=\"what is the california consumer privacy act ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the California Consumer Privacy Act (CCPA)?</h2>\n<p>The California Consumer Privacy Act is a relatively new consumer privacy right enacted by the State of California. It comprises groundbreaking laws relating to contemporary business practices and the role of citizens in securing their personal data in the Golden State.</p>\n<p><a href=\"https://www.loginradius.com/gdpr-and-privacy/\">Like the GDPR</a>, these new regulations apply not only to California businesses but to all the companies that do business in the state.</p>\n<h3 id=\"what-does-the-ccpa-offer\" style=\"position:relative;\"><a href=\"#what-does-the-ccpa-offer\" aria-label=\"what does the ccpa offer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does the CCPA offer?</h3>\n<ul>\n<li><strong>Ownership:</strong> Under CCPA, consumers will have the right to know what information businesses collect about them, and if need be, restrict them from sharing or selling their personal data.</li>\n<li><strong>No discrimination:</strong> CCPA does not allow businesses to discriminate against consumers who haven't approved of selling their data. Consequently, enterprises cannot impose additional charges or offer services with low quality to those consumers.</li>\n<li><strong>Security and protection:</strong> Under CCPA, companies are accountable for protecting the personal information of its consumers against potential data breaches.</li>\n</ul>\n<h3 id=\"what-rights-do-consumers-enjoy-under-ccpa\" style=\"position:relative;\"><a href=\"#what-rights-do-consumers-enjoy-under-ccpa\" aria-label=\"what rights do consumers enjoy under ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What rights do consumers enjoy under CCPA?</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsSAAALEgHS3X78AAABW0lEQVQoz21Ri2qDQBDM//9bS6GUlkIIxhi9l3d6D++5dk1NYovDebcOM7A7e5hvKDCHstxbxLKcLVAQ4Sk74Ie1cFFox2186FwCpj033uVViw8K2Gh7F+FhxrJm6uW7qoRJvzTAEMrnsXqv6RBWM7Z2Yer169Rqn8rdjIUK+WqSjM++pzxTGxubHxy+/ZRbE2VYhznElCgXrFcdV0z0Shtk1aiRJEIS3jPeTz6gjDAhB620HY0x1gHMB+QvLbkS1lGuRuPjMnYvh7qlSLaUj8aWAqUUba3zHgByKXjWtrfAdDCh+Dd2n2ebAOb/uKUNyzxwK8YIZyKOrbjPhU6o+VB1nNuwY96CTuWjEWcqXV4ZHcupZW+N7DaL3DejlE6gAs64tolbkVNqdLDLfmDfjPKOCYyNECbVYIxDpXFTfSVSjdbaYdQY+74ZB48x4U4wf7ing6niL4Y97+EHrAy8OXKf3p4AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"5 consumer rights under ccpa\"\n        title=\"5 consumer rights under ccpa\"\n        src=\"/static/5eb2c2748ed8c8e083580d96d9de4af9/e5715/image2.png\"\n        srcset=\"/static/5eb2c2748ed8c8e083580d96d9de4af9/a6d36/image2.png 650w,\n/static/5eb2c2748ed8c8e083580d96d9de4af9/e5715/image2.png 768w,\n/static/5eb2c2748ed8c8e083580d96d9de4af9/2bef9/image2.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"what-data-is-considered-personal-under-the-ccpa\" style=\"position:relative;\"><a href=\"#what-data-is-considered-personal-under-the-ccpa\" aria-label=\"what data is considered personal under the ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What data is considered personal under the CCPA?</h3>\n<ul>\n<li><strong>Direct identifiers</strong> like name, address, e-mail id, social security numbers, passport information, driver's license, and signature.</li>\n<li><strong>Unique identifiers</strong> like IP addresses, account id, cookies, pixel tags, beacons, and telephone numbers. </li>\n<li><strong>Internet activity identifiers</strong> like search history, advertisement, browsing history, etc.</li>\n<li><strong>Geolocation identifiers</strong> like location history.</li>\n<li><strong>Sensitive data</strong> like financial and medical history, religious or political views, sexual preferences, education data, etc.</li>\n<li><strong>Biometric identifiers</strong> like voice recordings, fingerprints, facial recognition, etc. </li>\n<li><strong>Commercial data</strong> like property records, products or services purchased, purchasing histories, etc.</li>\n</ul>\n<h3 id=\"is-ccpa-a-big-deal\" style=\"position:relative;\"><a href=\"#is-ccpa-a-big-deal\" aria-label=\"is ccpa a big deal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is CCPA a big deal?</h3>\n<p>Yes, CCPA is a big deal for companies that collect data from the residents of California – irrespective of where their business is located. </p>\n<p>Non-compliance may lead to hefty fines and rigid enforcements.</p>\n<h3 id=\"what-are-the-ccpa-penalties\" style=\"position:relative;\"><a href=\"#what-are-the-ccpa-penalties\" aria-label=\"what are the ccpa penalties permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the CCPA penalties?</h3>\n<p>The maximum penalty for unintentional violations is $2,500 USD, while for intentional violations, it may go as high as $7,500 USD. Consumers may also take legal action against companies and can sue them individually for each breach.</p>\n<h2 id=\"does-ccpa-apply-to-your-business\" style=\"position:relative;\"><a href=\"#does-ccpa-apply-to-your-business\" aria-label=\"does ccpa apply to your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Does CCPA apply to your business?</h2>\n<p>If your business or organization answers positively to any one of the following criteria, you are required to comply with the CCPA.</p>\n<ul>\n<li>Does your business earn annual gross revenue of more than $25 million USD?</li>\n<li>Do you buy, sell, or share data of 50,000 or more consumers for commercial intent?</li>\n<li>Does your business earn 50% or more of its revenue by selling consumers' personal information?</li>\n</ul>\n<p>Remember: Non-profit or small companies that do not meet the income threshold do not require to comply.</p>\n<h2 id=\"can-ccpa-optimize-user-experience\" style=\"position:relative;\"><a href=\"#can-ccpa-optimize-user-experience\" aria-label=\"can ccpa optimize user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Can CCPA optimize user experience?</h2>\n<p>Today, consumers have a lot of control over how companies shape their brand image and retain their businesses. </p>\n<p>When it comes to CCPA, the Californian data privacy law provides some excellent opportunities to gain an advantage over customer experience. </p>\n<p>Wondering how? Let’s find out.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CCPA optimize user experience\"\n        title=\"CCPA optimize user experience\"\n        src=\"/static/025350e3c90b15c5cbeb9adbf8f3529f/e5715/image3.png\"\n        srcset=\"/static/025350e3c90b15c5cbeb9adbf8f3529f/a6d36/image3.png 650w,\n/static/025350e3c90b15c5cbeb9adbf8f3529f/e5715/image3.png 768w,\n/static/025350e3c90b15c5cbeb9adbf8f3529f/2bef9/image3.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>1. CCPA ensures improved data security.</strong></p>\n<p>The repercussions of not adhering to international compliance protocols aren’t limited to privacy issues. Apart from the apparent loss of customer trust, it results in revenue losses and possible fines. </p>\n<p>A data protection law as stringent as the CCPA gives consumers the confidence and trust to share their sensitive data online. Simply because consumers can easily find out what data is collected, stored, and disclosed to others.</p>\n<p><strong>2. CCPA builds trust with consent management.</strong></p>\n<p>With a plethora of cases on identity theft and data disclosure by big shot conglomerates, consumers find it challenging to trust enterprises with their personal data. </p>\n<p>Enterprises willing to build sustainable relations with their consumers need to understand the importance of privacy. </p>\n<p>Consumers should have the freedom to view or upgrade their consent approval. If the need arises, they should be allowed the right to withdraw their consent too.</p>\n<p>As such, CCPA requires enterprises to display easy-to-understand consent requests, so consumers know what they are getting into.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP The CCPA and Customer Identity Reaping the Benefits of Compliance\"\n        title=\"WP The CCPA and Customer Identity Reaping the Benefits of Compliance\"\n        src=\"/static/f33233280c3b9df57a5a3b7ae3a84b9e/e5715/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png\"\n        srcset=\"/static/f33233280c3b9df57a5a3b7ae3a84b9e/a6d36/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png 650w,\n/static/f33233280c3b9df57a5a3b7ae3a84b9e/e5715/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png 768w,\n/static/f33233280c3b9df57a5a3b7ae3a84b9e/2bef9/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>3. CCPA allows frictionless identity management.</strong></p>\n<p>When it comes to enterprise-class identity management, factors like compliance and security play a critical role. </p>\n<p>In the data-driven world, a CCPA-regulated customer identity and data management solution can seek consent and record permissions before processing any data.</p>\n<h2 id=\"how-loginradius-identity-solution-assists-enterprises-with-ccpa-compliance\" style=\"position:relative;\"><a href=\"#how-loginradius-identity-solution-assists-enterprises-with-ccpa-compliance\" aria-label=\"how loginradius identity solution assists enterprises with ccpa compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius’ Identity Solution assists enterprises with CCPA compliance</h2>\n<p>LoginRadius is a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> solution that provides a 360-degree view of customers for a seamless collection, storage, management, and protection of personal data.</p>\n<p>It helps companies meet CCPA regulatory requirements without compromising the user experience. Its one-of-a-kind data protection features include client registration, sign-in, authentication, single sign-on, data governance, and consent management, among others.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image4\"\n        title=\"image4\"\n        src=\"/static/8cb2999d48dae5d10fb01ad372737e9f/e5715/image4.png\"\n        srcset=\"/static/8cb2999d48dae5d10fb01ad372737e9f/a6d36/image4.png 650w,\n/static/8cb2999d48dae5d10fb01ad372737e9f/e5715/image4.png 768w,\n/static/8cb2999d48dae5d10fb01ad372737e9f/d0143/image4.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The following capabilities further help enterprises meet privacy compliance regulations.</p>\n<ul>\n<li>Clear and specific statement of consent.</li>\n<li>Registration and progressive profiling. </li>\n<li>Data record and access permissions. </li>\n<li>Deletion of data. </li>\n<li>User identity and access management. </li>\n<li>Management of centralized access control.</li>\n<li>Age verification mechanism.</li>\n</ul>\n<p>There’s more.</p>\n<p>LoginRadius enforces a set of policies, procedures, programs, and standards for effective security management. It aims to offer a risk-free organizational setup by safeguarding customer's data against potential breaches.</p>\n<p>The identity solution is designed with a cloud-native architecture and complies with the <a href=\"https://www.loginradius.com/compliances-list/\">major security assurance programs</a> including:</p>\n<ol>\n<li>OpenID - End-user identity verification supported by OAuth 2.0 protocol</li>\n<li>PCI DSS PCI SSC administered standard for payment transactions</li>\n<li>ISO 27001:2013 - Information security management system</li>\n<li>ISO 27017:2015 - Information security for cloud services</li>\n<li>AICPA SOC 2 (Type II) - System-level controls for Trust Services Criteria - security, availability, process integrity, confidentiality, and privacy </li>\n<li>ISAE 3000 - International attestation standard for assurance over non-financial information </li>\n<li>NIST Cybersecurity Framework - Standardized security framework to manage and reduce cybersecurity risk.  </li>\n<li>CSA CCM Level 1, Level 2 - STAR Self-Assessment, STAR Certification, STAR Attestation, and C-STAR Assessment.</li>\n<li>CIS Critical Security Controls Global standards for internet security</li>\n<li>US Privacy Shield Complaint resolution for EEA citizens</li>\n<li>ISO/IEC 27018:2019 - PII Protection</li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Consumers expect the privacy and security of their personal data, and it is the responsibility of enterprises to build and maintain a trusted relationship. Recent data breaches and identity thefts highlight the importance of data protection laws and compliance like <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">CCPA and GDPR</a>. </p>\n<p>With an identity solution like LoginRadius, you can eliminate lengthy processes that ruin the user experience, and still maintain international governance over data privacy. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 06, 2020","updated_date":null,"description":"As the risk of data misuse is rising, more and more enterprises are trying to comply with current data protection and regulatory enforcement.","title":"How LoginRadius Helps Enterprises Stay CCPA Compliant in 2020","tags":["data privacy","compliance","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/cf7af05a8ffbcaa4f6b55b5d2150738d/33aa5/ccpa-compliant.jpg","srcSet":"/static/cf7af05a8ffbcaa4f6b55b5d2150738d/f836f/ccpa-compliant.jpg 200w,\n/static/cf7af05a8ffbcaa4f6b55b5d2150738d/2244e/ccpa-compliant.jpg 400w,\n/static/cf7af05a8ffbcaa4f6b55b5d2150738d/33aa5/ccpa-compliant.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click…","fields":{"slug":"/identity/what-is-social-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click on a website or mobile application using their existing accounts from various social providers. It simplifies the sign-in and <a href=\"https://www.loginradius.com/authentication/\">registration experiences</a>, providing a convenient alternative method to create an account where it is mandatory.</p>\n<ul>\n<li>For consumers, social login is a single-click login method for accessing the website and mobile application—one that there is no need for excess credentials and allows consumers to skip traditional registration methods.</li>\n<li>Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.</li>\n</ul>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work?</h2>\n<p>You may be thinking about how does social login work? Well, social login is a quick and convenient way for users to log into websites using their existing social media accounts. Instead of creating a new account on the website, users can simply click a button to sign in with their Facebook, Google, or other social media account.</p>\n<p>When a user clicks on the social login button, the website will redirect the user to the chosen social media platform's login page. After the user logs in, the social media platform sends back the user's data to the website. This data can include the user's name, email address, profile picture, and any other information the user has authorized the website to access. Let’s understand more about  login with social media and its aspects. </p>\n<h2 id=\"how-do-popular-social-login-platforms-compare\" style=\"position:relative;\"><a href=\"#how-do-popular-social-login-platforms-compare\" aria-label=\"how do popular social login platforms compare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Popular Social Login Platforms Compare?</h2>\n<p>Some of the most popular social login platforms include Facebook, Google, Twitter, LinkedIn, and Microsoft. Each platform has its own strengths and weaknesses.</p>\n<p>Facebook is the most popular social login platform, with over 2 billion active users worldwide. It provides a wide range of user data, including the user's name, email address, profile picture, and interests.</p>\n<p>Google is also a popular social login platform, with over 1 billion active users. It provides similar data to Facebook, but also allows users to log in with their Google+ account.</p>\n<p>For detailed information about the login preferences, you can <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">download</a> our <strong>Consumer Digital Identity Trend Report 2022.</strong></p>\n<p>Twitter is popular among younger users, but it provides less user data than Facebook or Google. LinkedIn is popular among professionals, and it provides more detailed professional information about the user.</p>\n<h2 id=\"why-should-businesses-use-social-login\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-social-login\" aria-label=\"why should businesses use social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use Social Login?</h2>\n<p>Social login and registration provide benefits in various ways:</p>\n<ul>\n<li>Log in via a third-party web page or Facebook or Google accounts can be done with just a few clicks on the button. This is a much faster way to access the sites and mobile applications than filling out the complete registration form as in traditional login.</li>\n<li>Social login reduces the effort to remember passwords, which means people don’t need to create and keep track of more credentials, lessening password fatigue and login failure.</li>\n</ul>\n<p><a href=\"https://www.google.com/url?q=https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"sso\"\n        title=\"sso\"\n        src=\"/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png\"\n        srcset=\"/static/7458970eb16da6d73777c9db1781c155/a6d36/sso.png 650w,\n/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png 768w,\n/static/7458970eb16da6d73777c9db1781c155/63ff0/sso.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li>Consumers feel more comfortable sharing the data via the social platform on which they already have trust compared to unknown sites. Social login provides a recognizable, uniform method of account logging.</li>\n<li>Data collection can be automated. Each time a visitor logs in on the site, our APIs retrieve the consumer’s updated profile information.</li>\n</ul>\n<h2 id=\"how-is-social-login-useful-for-business\" style=\"position:relative;\"><a href=\"#how-is-social-login-useful-for-business\" aria-label=\"how is social login useful for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Social Login Useful for Business?</h2>\n<p>By providing the <a href=\"https://www.loginradius.com/social-login/\">social login on your site</a>, consumers and visitors can experience a better UX/UI. Almost everyone is perpetually logged in on their social accounts, especially to their Facebook and Google accounts, sites, and apps (ecommerce or otherwise).</p>\n<p>The following are a few benefits of social login for businesses:</p>\n<ol>\n<li>Visitors can save time by not requiring them to create yet another profile.</li>\n<li>Increase the chances of converting leads to consumers and speed up the business/sale by doing #1.</li>\n<li>Speed up consumer service and support.</li>\n<li>Data collection of visitors and consumers can be automated to build profiles and personas.</li>\n<li>Personalize the site for visitors and run future promotions using info gathered by doing automation.</li>\n<li>Trust can be created by showing visitors and consumers reviews of your product written by their friends/family on the social network they use to log in.</li>\n<li>Increase reach, generate brand awareness, and build communities by harnessing various social platforms.</li>\n<li>Also, businesses can run loyalty and referral programs with social invites.</li>\n</ol>\n<h2 id=\"how-to-implement-social-login\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login\" aria-label=\"how to implement social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login?</h2>\n<p>Social Login can be implemented with the following method:</p>\n<ul>\n<li>To implement the social login with the UI’s help, you need to configure the Social Provider. For more information on this, visit : <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partconfiguration1\">Social Login Configuration</a>.</li>\n<li>If you want to implement the Social Login with the JS interface’s help, the following URL will help you: <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partdeployment4\">Deployment</a>.</li>\n</ul>\n<h2 id=\"what-are-the-benefits-of-social-login\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-social-login\" aria-label=\"what are the benefits of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Social Login?</h2>\n<p>There are several benefits to using social login on your website. First, it provides a convenient and quick way for users to log in without having to create a new account. This can increase conversion rates and reduce the number of abandoned carts or forms.</p>\n<p>Second, social login can help you gather more data about your users. This data can be used to personalize the user experience, send targeted marketing messages, and <a href=\"https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/\">improve customer retention</a>.</p>\n<p>Third, when we talk about social security login, social login can increase the security of your website by reducing the number of passwords users have to remember. Users are more likely to choose weak or easy-to-guess passwords if they have to remember multiple passwords for different websites.</p>\n<h2 id=\"how-to-implement-social-login-and-is-it-worth-implementing\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login-and-is-it-worth-implementing\" aria-label=\"how to implement social login and is it worth implementing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login and Is It Worth Implementing?</h2>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\">Implementing social login</a> on your website is relatively easy, especially if you use a third-party service like LoginRadius. LoginRadius provides a range of social login options, including Facebook, Google, Twitter, LinkedIn, and more.</p>\n<p>To implement social login, you will need to add social login buttons to your website and integrate them with your existing login system. You may also need to make some changes to your website's privacy policy and terms of service.</p>\n<p>Whether or not social login is worth implementing depends on your website and your users. If your website is focused on e-commerce or requires users to log in frequently, social login can be a great way to increase conversion rates and improve user experience. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a Social Login on consumers websites and how it will enhance businesses. This feature allows consumers to login via social providers and removes the hassle to remember new passwords for different websites. However, before implementing any functionality on a website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p>1.<strong>Which is the most popular social login?</strong></p>\n<p>According to the <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">Consumer Identity Trend Report 2022</a>, 26.84% of users prefer social login. And Facebook login is the most popular social login method. </p>\n<p>2.<strong>What is a social login app?</strong></p>\n<p>Social login enables you to authenticate your users on your website or application using their existing social media profiles on your website or application. The most common login using social media are from platforms, including login include Facebook, Gmail, Instagram, etc. </p>\n<p>3.<strong>What data do you get with social login?</strong></p>\n<p>Social login provides you with a deep insight into your customer behavior and preferences that helps you create personalized customer journeys and aggressive <a href=\"https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/\">marketing campaigns</a>.</p>\n<p><strong>4. Who uses social login?</strong></p>\n<p>Social login is utilized by websites and applications to allow users to log in using their existing social media accounts.</p>\n<p><strong>5.  How to do social login?</strong></p>\n<p>Users can perform social login by clicking on the respective social media button on the website or application's login page and following the authentication prompts provided by the chosen social media platform.</p>\n<p><strong>6. How to use Facebook for social login?</strong></p>\n<p>Facebook login can be integrated with your website or mobile application for seamless login by using the <a href=\"https://www.loginradius.com/social-login/\">LoginRadius CIAM</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 28, 2020","updated_date":null,"description":"Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.","title":"What is Social Login?","tags":["social login","identity verification","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0f72c20c3978105eb6bcabdc4e0e06d3/33aa5/social-login.jpg","srcSet":"/static/0f72c20c3978105eb6bcabdc4e0e06d3/f836f/social-login.jpg 200w,\n/static/0f72c20c3978105eb6bcabdc4e0e06d3/2244e/social-login.jpg 400w,\n/static/0f72c20c3978105eb6bcabdc4e0e06d3/33aa5/social-login.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vaibhav Jain","github":null,"avatar":null}}}},{"node":{"excerpt":"The global media and entertainment industry is undergoing a massive transformation at the moment. Interestingly, it is adapting itself to…","fields":{"slug":"/growth/customer-experience-media-entertainment-industry/"},"html":"<p>The global media and entertainment industry is undergoing a massive transformation at the moment. Interestingly, it is adapting itself to improve customer experiences like never before. </p>\n<p>Today, enterprises know that if they want to stay ahead of their competitors, they need to keep their customers happy.</p>\n<p>So, how are they doing it? It's simple. They are focusing on generating more and more customer-centric content.</p>\n<p>2019 (for that matter) experienced an intensifying wave of popularity for on-demand streaming sites like Amazon and Netflix. The recently launched <a href=\"https://www.loginradius.com/press/loginradius-powers-britbox-launch-high-performance-ciam/\">BritBox</a> also primarily focuses on driving better media experience for their customers.</p>\n<p>LoginRadius explores these shifting expectations of the entertainment industry and tries to identify opportunities that are likely to drive popularity in 2020. Let's go through the top highlights.</p>\n<h2 id=\"over-the-top-content-will-take-a-new-turn\" style=\"position:relative;\"><a href=\"#over-the-top-content-will-take-a-new-turn\" aria-label=\"over the top content will take a new turn permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over-The-Top Content Will Take a New Turn</h2>\n<p>Over-the-top (OTT) content in the media industry refers to audio or video streaming services (like Netflix, Youtube, Amazon) that are delivered to customers over the Internet without the involvement of any third party provider (generally cable or satellite providers).</p>\n<p>Of late, the market has been witnessing a boost in mobile computing devices – leading to a disruption in the broadcast television era. It has been creating more opportunities for independent artists to leverage the technology and cast themselves in front of a wider audience.</p>\n<p>These independent artists decide how to use, sell, or distribute their content online. They are solely responsible for offering a more personalized, attention-grabbing, valuable, and relevant experience for their audience.</p>\n<p>Are you wondering how this sudden turn of events will influence the number game?</p>\n<p>According to an estimation by Strategy Analytics, revenue from OTT video in the US alone will exceed the <a href=\"https://www.strategyanalytics.com/strategy-analytics/blogs/tv-media-strategies/2016/03/31/subscription-vod-and-advertising-drive-ott-video-revenue-growth-in-the-u.s#.V7RJmph95hE\">$30 billion mark in 2020</a>.</p>\n<p>These figures grab attention and are hard to ignore.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 69.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"stats OTT video revenue and forecast\"\n        title=\"stats OTT video revenue and forecast\"\n        src=\"/static/5f0fc3d4f9461c9b292a0ea62c16ce96/e5715/Identity-blog-graphic-02-1024x709.png\"\n        srcset=\"/static/5f0fc3d4f9461c9b292a0ea62c16ce96/a6d36/Identity-blog-graphic-02-1024x709.png 650w,\n/static/5f0fc3d4f9461c9b292a0ea62c16ce96/e5715/Identity-blog-graphic-02-1024x709.png 768w,\n/static/5f0fc3d4f9461c9b292a0ea62c16ce96/2bef9/Identity-blog-graphic-02-1024x709.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Data source: Strategy analytics OTT video forecast</p>\n<h2 id=\"personalization-will-make-the-media-smarter\" style=\"position:relative;\"><a href=\"#personalization-will-make-the-media-smarter\" aria-label=\"personalization will make the media smarter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personalization Will Make the Media Smarter</h2>\n<p>Technology will make deeper connections and drive higher profitability through the personalization of content in the media industry.  </p>\n<p>Expect media houses to focus on creating <strong>smarter content</strong> that connects with audiences on a deeper level.</p>\n<p>Rather than offering free content to the audience in general, with the power of analytics, AI, and machine learning, the media industry will produce more content niches that resonate with viewers.</p>\n<h2 id=\"privacy-regulation-will-rebuild-trust-in-the-media-industry\" style=\"position:relative;\"><a href=\"#privacy-regulation-will-rebuild-trust-in-the-media-industry\" aria-label=\"privacy regulation will rebuild trust in the media industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Privacy Regulation Will Rebuild Trust in the Media Industry</h2>\n<p>There is still a constant fear of identity theft, unauthorized use of data, and financial loss among customers. No wonder, data privacy, and security will be the top priority for media companies in 2020. </p>\n<p>Speaking of securing data, the EU's General Data Protection Regulation (GDPR) was the first high profile regulation that the world came across. It rightfully set exemplary standards for media houses (and all organizations in general) and showed how to conduct business and <a href=\"https://www.loginradius.com/blog/2018/03/gdpr-will-affect-companies-use-data-target-customers/\">store customer data</a>. </p>\n<p>Following suit came the <a href=\"https://www.loginradius.com/blog/2019/05/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a> that officially took effect on January 1, 2020. CCPA, too, is expected to give individuals more control over how their data is being used. </p>\n<p>But will it hit the right chords among organizations and individuals? Only time will tell.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 69.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAOCAYAAAAvxDzwAAAACXBIWXMAAAsTAAALEwEAmpwYAAACz0lEQVQ4y2WUS0hUYRTHv7m6aJeLqE0SRC6KgloHtYjIkCBoG1QEtWihm1YWSZDmIx/U9FCpQIpCtKE2hlKhLVLvzKiJjxwf46jjzDTeec/cO91zOuebe3OqC3++w72c3/zP4xsRiOdwNZaVohjoNK24kSQodriDKSEaVCFavSUkPk+TtkgoHnhMedoqgslznaAU29AahmoZQxHNbhtWSRC0ZFrQbSCDWH4CBJM5mPuZwSUta1o/kCcdQkQhrgwxrJykMaCkzZsnMQT+AtoOIykdJ0IprOr3wWd/HMMp3fAXvnVJYM2wUNq8XeQUyzun9UBCx0sDfqBWQGlbkUt2sqJl8ctqHJ9MhPG8axE/+DSIZQ2T3xPUT8Ad4s7obkerN8qJBDZ9Wg5ezW6huDcuYQ679BVyEU3rEnasZxb3PP3OgvcLGoSSOpcPBNwvbn87qVASlyrqVTjnWuT36JyI4J+eMpSTPi7F8EzfAp7qXcAy5xSe7ffhTCQNazScZXJJz2FRN3pRKfQsLxNbPNiihvgbdnjCKOrHUfaUgYPLMeyeDGMglkHXfBTVjQRE0waQe1gpACvE3bHLSqGsPJUHssRGFSv7fNKAaHQXyubGh2ggWRMxoiOmqZCojgySkyaHYdnDBrXK0Wo5pMGIJjeQCj28r273MBDnSebQNeLB1wMj2O0aAtewG9eTBq8MD+xd01hQlDknDxAsyUkVz2fgaM8cHH/zAw++nPl/D/1aBm82P8MLN2qhpt6JtzpeQDCdN62VOiHXpnqY97CXk68Prhq1XzewaTwEDWObqBQvt31LfOEEzG9q7AyWt9KGtdgPSaL6U6CUhiCorCOU+GvX4ync2zlt7nw0yUOE0vZ/9pCha7SoDKOYp8vv3gp6KBaIIAhoX72rPGHZxxYPyNiG8Vl0j6FIdezM/nNIZA2xr2uaYQpDqcRrPGmrb1B8n38D8akiX7sDFwsAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GDPR and CCPA\"\n        title=\"GDPR and CCPA\"\n        src=\"/static/69a2c7cc9cf28b270bbd887aff439784/e5715/Identity-blog-graphic-03-1024x709.png\"\n        srcset=\"/static/69a2c7cc9cf28b270bbd887aff439784/a6d36/Identity-blog-graphic-03-1024x709.png 650w,\n/static/69a2c7cc9cf28b270bbd887aff439784/e5715/Identity-blog-graphic-03-1024x709.png 768w,\n/static/69a2c7cc9cf28b270bbd887aff439784/2bef9/Identity-blog-graphic-03-1024x709.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"5-technologies-that-will-impact-user-experience-in-media-and-entertainment-industry\" style=\"position:relative;\"><a href=\"#5-technologies-that-will-impact-user-experience-in-media-and-entertainment-industry\" aria-label=\"5 technologies that will impact user experience in media and entertainment industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Technologies That Will Impact User Experience in Media and Entertainment Industry</h2>\n<h3 id=\"1-blockchain\" style=\"position:relative;\"><a href=\"#1-blockchain\" aria-label=\"1 blockchain permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>1. Blockchain</strong></h3>\n<p>A market synopsis by America News Hour reports that the global blockchain media industry \"registered 32.94% CAGR during the forecast period between 2018 and 2024,\" and they predict it could reach USD 1.54 billion by 2024.</p>\n<p>So, if you think blockchain is only about cryptocurrency, think again!</p>\n<p>Within the media and entertainment industry, <a href=\"https://www.csoonline.com/article/3279006/4-reasons-blockchain-could-improve-data-security.html\">blockchain can be used to secure data transactions</a> and improve digital advertising efforts.</p>\n<h3 id=\"2-ar-and-vr\" style=\"position:relative;\"><a href=\"#2-ar-and-vr\" aria-label=\"2 ar and vr permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>2. AR and VR</strong></h3>\n<p>Pokémon Go is the <a href=\"https://www.forbes.com/sites/bernardmarr/2020/01/24/the-5-biggest-virtual-and-augmented-reality-trends-in-2020-everyone-should-know-about/#62543f5924a8\">perfect example</a> of a new medium of entertainment that lifts the spirit of AR and VR – leaving users wanting more. The combination of real-world elements in the game is truly immersive and magical.</p>\n<p>With the recent interest in AR and VR from Silicon Valley giants like Google and Facebook, it seems like innovations in mobility, pricing and accessibility are on the cards.</p>\n<p>Be it through story-driven content or experience-driven entertainment. They are expected to boost customer experience in the media industry like never before.</p>\n<h3 id=\"3-voice-search-technology\" style=\"position:relative;\"><a href=\"#3-voice-search-technology\" aria-label=\"3 voice search technology permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>3. Voice Search Technology</strong></h3>\n<p>Innovation in voice search technology is changing how we conduct our day-to-day activities. 2019 was the year of Alexa and Google Home that made <a href=\"https://www.digitaltrends.com/home/google-home-vs-amazon-echo/\">smart homes accessible</a> than ever.</p>\n<p>The combination of AI, machine learning, and advanced analytics will continue to optimize content making customer experiences more personalized, compelling, and transparent.</p>\n<h3 id=\"4-cloud-security-management\" style=\"position:relative;\"><a href=\"#4-cloud-security-management\" aria-label=\"4 cloud security management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>4. Cloud Security Management</strong></h3>\n<p>Cloud security management solutions will be back in the spotlight. The security of data will be a primary area of focus in 2020. Factors like data encryption and cloud workload security will take center stage as more and more media houses migrate to the cloud in the public environment.</p>\n<h3 id=\"5-facial-recognition\" style=\"position:relative;\"><a href=\"#5-facial-recognition\" aria-label=\"5 facial recognition permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>5. Facial Recognition</strong></h3>\n<p>Facial Recognition is swiftly turning into one of the most common forms of biometric authentication. The use of facial recognition in digital advertising and the media industry will <a href=\"https://www.gemalto.com/govt/inspired/biometrics\">continue to grow</a>. </p>\n<p>For instance, it will identify individuals in-store and offer purchasing recommendations based on their demographic.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFwABAQEBAAAAAAAAAAAAAAAAAAECBf/EABYBAQEBAAAAAAAAAAAAAAAAAAMAAf/aAAwDAQACEAMQAAAB5WFQoLf/xAAVEAEBAAAAAAAAAAAAAAAAAAARIP/aAAgBAQABBQJr/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPwE//8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQAGPwJf/8QAGRAAAgMBAAAAAAAAAAAAAAAAABABESEx/9oACAEBAAE/IcKSzq//2gAMAwEAAgADAAAAEGcP/8QAFhEBAQEAAAAAAAAAAAAAAAAAARAR/9oACAEDAQE/EAyf/8QAFREBAQAAAAAAAAAAAAAAAAAAERD/2gAIAQIBAT8QWf/EABkQAQADAQEAAAAAAAAAAAAAAAEAESEQMf/aAAgBAQABPxAAtIu3UQuFEUha55LVu5z/2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image4\"\n        title=\"image4\"\n        src=\"/static/a8427193f9b35624f0a983bda1e94222/212bf/image4.jpg\"\n        srcset=\"/static/a8427193f9b35624f0a983bda1e94222/6aca1/image4.jpg 650w,\n/static/a8427193f9b35624f0a983bda1e94222/212bf/image4.jpg 768w,\n/static/a8427193f9b35624f0a983bda1e94222/64175/image4.jpg 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-will-ciam-solutions-gain-momentum-in-the-media-and-entertainment-industry\" style=\"position:relative;\"><a href=\"#how-will-ciam-solutions-gain-momentum-in-the-media-and-entertainment-industry\" aria-label=\"how will ciam solutions gain momentum in the media and entertainment industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How will CIAM solutions gain momentum in the media and entertainment industry?</h2>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management\">Customer identity and access management (CIAM) solutions</a> will help companies in the media and entertainment industry understand their customer base and offer them a unique and engaging experience.</p>\n<p>As we enter 2020, here's what businesses can expect from a CIAM solution. </p>\n<h3 id=\"increase-in-subscription-rates\" style=\"position:relative;\"><a href=\"#increase-in-subscription-rates\" aria-label=\"increase in subscription rates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Increase in subscription rates.</strong></h3>\n<p>One of the biggest benefits of online media content is that it's available in different formats across multiple platforms. However, users dislike logging in to various platforms or filling in multiple registration forms. This can lead to abandonment or customer churn.</p>\n<p>By implementing <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">Single Sign-On</a> (SSO), media houses can create a connected user experience across all its platforms. Viewers can access multiple channels using a single identity, and turn more visitors into subscribers.</p>\n<h3 id=\"creation-of-relevant-content-with-user-profiling\" style=\"position:relative;\"><a href=\"#creation-of-relevant-content-with-user-profiling\" aria-label=\"creation of relevant content with user profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Creation of relevant content with user profiling.</strong></h3>\n<p>The digitization of media content has also changed the way companies earn revenue. Mostly, customers are looking for content that appeals to their interests and habits. A CIAM solution can help media platforms achieve that.</p>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/perfect-ciam-platform/\">CIAM platform like LoginRadius</a> can record the preferences of their audience in unified customer profiles and generate relevant content.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-media-and-publication-companies-use-loginradius-identity-platform/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"media and publication data sheet loginraidus\"\n        title=\"media and publication data sheet loginraidus\"\n        src=\"/static/46082b28a4475073580fe9f628de534f/e5715/image5.png\"\n        srcset=\"/static/46082b28a4475073580fe9f628de534f/a6d36/image5.png 650w,\n/static/46082b28a4475073580fe9f628de534f/e5715/image5.png 768w,\n/static/46082b28a4475073580fe9f628de534f/2bef9/image5.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"frictionless-customer-interaction\" style=\"position:relative;\"><a href=\"#frictionless-customer-interaction\" aria-label=\"frictionless customer interaction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Frictionless customer interaction.</strong></h3>\n<p>Audiences are no longer passive consumers. Instead, they are actively engaged in the content they read, watch, and even produce it themselves.</p>\n<p>LoginRadius’ industry-leading peak load capabilities, makes it an ideal CIAM provider for companies dealing with large amounts of customer engagement in a short period.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>With a large scale roll-out of the technology, 2020 promises to be the year of digital transformation in the media and entertainment industry.</p>\n<p>Amidst the ever-changing regulatory landscape, there are high chances that new opportunities are waiting to be capitalized. <em>Now</em> is your chance to reap the benefits.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 25, 2020","updated_date":null,"description":"The worldwide media and entertainment industry is going through a huge transformation at the moment. 2020 aims to be the year of digital change in the media and entertainment sector with a large-scale roll-out of technology.","title":"Digital Trends Transforming the Media and Entertainment Industry in 2020","tags":["digital transformation","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f9603a1db9ade0910c4e45a7ef98a4ac/33aa5/media-industry.jpg","srcSet":"/static/f9603a1db9ade0910c4e45a7ef98a4ac/f836f/media-industry.jpg 200w,\n/static/f9603a1db9ade0910c4e45a7ef98a4ac/2244e/media-industry.jpg 400w,\n/static/f9603a1db9ade0910c4e45a7ef98a4ac/33aa5/media-industry.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":798,"currentPage":134,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}