{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/17","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction Today, we're diving deep into the fascinating world of personalization and how it's being reshaped by a game-changer: Zero…","fields":{"slug":"/identity/zero-party-data-experience/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Today, we're diving deep into the fascinating world of personalization and how it's being reshaped by a game-changer: Zero-Party Data. Now, what on earth is Zero-Party Data, and why should we care? Well, buckle up because we're about to embark on a journey to revolutionize how you see your online experiences.</p>\n<p>Picture this: you're scrolling through your favorite online store, and voila! Suddenly, the website seems to understand your preferences magically. It recommends products that align perfectly with your taste. How does it do that? Enter Zero-Party Data, the secret sauce behind this seamless, personalized experience.</p>\n<p>Let’s explore what Zero-Party Data is and how it helps businesses enhance overall growth by improving lead generation and conversion rates. </p>\n<h3 id=\"what-exactly-is-zero-party-data\" style=\"position:relative;\"><a href=\"#what-exactly-is-zero-party-data\" aria-label=\"what exactly is zero party data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Exactly is Zero-Party Data?</h3>\n<p>Zero-Party Data is like a breath of fresh air in <a href=\"https://www.loginradius.com/blog/growth/how-to-make-personalized-marketing-effective-with-consumer-identity/\">digital marketing</a>. Unlike First-Party Data (data you willingly share with a company) or Third-Party Data (gathered from various sources without your direct involvement), Zero-Party Data is willingly shared directly by you. It's the information you intentionally provide, such as preferences, interests, and feedback.</p>\n<p>This information could be anything except your personal information. For instance, you can ask your customers what interests them, their expectations, and more. </p>\n<h3 id=\"the-power-of-zero-party-data-in-action\" style=\"position:relative;\"><a href=\"#the-power-of-zero-party-data-in-action\" aria-label=\"the power of zero party data in action permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Power of Zero-Party Data in Action</h3>\n<p>Imagine you're a fitness enthusiast visiting a sports apparel website. With Zero-Party Data, you might willingly share that you prefer sustainable, moisture-wicking fabrics, love running, and prefer vibrant colors. </p>\n<p>Armed with this information, the website can curate a personalized shopping experience just for you. You won't waste time scrolling through irrelevant products; instead, you'll discover items tailored to your interests.</p>\n<h3 id=\"the-era-of-empowered-consumers\" style=\"position:relative;\"><a href=\"#the-era-of-empowered-consumers\" aria-label=\"the era of empowered consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Era of Empowered Consumers</h3>\n<p>In the information age, consumers are more aware than ever about the value of their data. Zero-Party Data aligns perfectly with this growing consciousness. It signifies a shift from mere transactions to meaningful interactions. </p>\n<p>When you willingly share your preferences, you tell businesses what matters. This insight is invaluable because it allows companies to understand your needs deeply. It's like having a personal shopper who knows your style, size, and favorite colors, ensuring that every recommendation feels like it was handpicked just for you.</p>\n<h3 id=\"personalization-beyond-products\" style=\"position:relative;\"><a href=\"#personalization-beyond-products\" aria-label=\"personalization beyond products permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personalization Beyond Products</h3>\n<p>Zero-Party Data isn't limited to product recommendations; it's transforming how content is delivered to you. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/media-entertainment-use-loginradius-platform/\">Streaming platforms</a>, for instance, leverage your watch history and genre preferences to suggest movies and TV shows you're likely to enjoy. Imagine a Friday night where you don't waste hours scrolling but instead dive into a film that suits your mood perfectly. It’s all made possible by the information you willingly share, creating an entertainment experience tailored to your tastes.</p>\n<h3 id=\"building-trust-through-transparency\" style=\"position:relative;\"><a href=\"#building-trust-through-transparency\" aria-label=\"building trust through transparency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Building Trust Through Transparency</h3>\n<p>One of the most remarkable aspects of Zero-Party Data is the trust it builds between businesses and consumers. When companies respect your data privacy and use the information you provide responsibly, it fosters a sense of loyalty.</p>\n<p><a href=\"https://www.loginradius.com/resource/ciam-role-in-customer-trust/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-consumer-identity-theft\"\n        title=\"WP-consumer-identity-theft\"\n        src=\"/static/4056fdd7cb379686bedc48450d43c83b/e5715/WP-consumer-identity-theft.png\"\n        srcset=\"/static/4056fdd7cb379686bedc48450d43c83b/a6d36/WP-consumer-identity-theft.png 650w,\n/static/4056fdd7cb379686bedc48450d43c83b/e5715/WP-consumer-identity-theft.png 768w,\n/static/4056fdd7cb379686bedc48450d43c83b/81501/WP-consumer-identity-theft.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Imagine receiving a survey from your favorite streaming service asking about your favorite genres. You willingly share your preferences; in return, they recommend movies and shows tailored to your taste. It's a win-win situation that leaves everyone smiling.</p>\n<h3 id=\"zero-party-data-beyond-shopping\" style=\"position:relative;\"><a href=\"#zero-party-data-beyond-shopping\" aria-label=\"zero party data beyond shopping permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Zero-Party Data Beyond Shopping</h3>\n<p>The influence of Zero-Party Data isn't limited to the world of e-commerce. Think about personalized content on streaming platforms, customized workout routines on fitness apps, or even tailored travel recommendations. The possibilities are endless, thanks to the magic of the data you willingly share.</p>\n<h3 id=\"embracing-the-future\" style=\"position:relative;\"><a href=\"#embracing-the-future\" aria-label=\"embracing the future permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Embracing the Future</h3>\n<p>As we venture into the digital age, embracing Zero-Party Data is the way forward. It's a paradigm shift that puts the power back into your hands, giving you control over your online experiences. So, the next time a website politely asks for your preferences, don't hesitate to share. You're not just helping them personalize your experience; you're shaping the future of online interactions.</p>\n<p>In a nutshell, Zero-Party Data is revolutionizing personalization, making your online adventures more enjoyable and meaningful. So, go ahead, share your preferences, and get ready to be amazed by the tailored experiences that await you.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 10, 2023","updated_date":null,"description":"Unlock the secrets behind seamless online personalization with Zero-Party Data! This blog explores how your willingly shared preferences revolutionize digital experiences. From tailored shopping to personalized content, discover the magic of Zero-Party Data and embrace a future where your online adventures are truly yours.","title":"The Future of Personalization: Embracing Zero-Party Data","tags":["zero-trust security","cybersecurity","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0302c6a166f4a7355db075e718672029/33aa5/future-of-personalization.jpg","srcSet":"/static/0302c6a166f4a7355db075e718672029/f836f/future-of-personalization.jpg 200w,\n/static/0302c6a166f4a7355db075e718672029/2244e/future-of-personalization.jpg 400w,\n/static/0302c6a166f4a7355db075e718672029/33aa5/future-of-personalization.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Suppose you’re a business catering to a vast number of users online. In that case, you can’t escape from the fact that a…","fields":{"slug":"/identity/ciam-deployment-flexibility/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Suppose you’re a business catering to a vast number of users online. In that case, you can’t escape from the fact that a seamless user experience coupled with security is the minimum to ensure customer trust and satisfaction. </p>\n<p>And here’s where customer identity and access management (CIAM) solutions play a pivotal role in achieving these objectives. Let’s explore the diverse CIAM deployment options offered by LoginRadius, a leading provider in the field. </p>\n<p>Businesses can gain valuable insights into crafting a robust and flexible identity management strategy by delving into essential features such as social login, single sign-on (SSO), passwordless login, and cloud integrations.</p>\n<h3 id=\"understanding-ciam-deployment-a-brief-overview\" style=\"position:relative;\"><a href=\"#understanding-ciam-deployment-a-brief-overview\" aria-label=\"understanding ciam deployment a brief overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding CIAM Deployment: A Brief Overview</h3>\n<p>Customer Identity and Access Management (CIAM) deployment refers to implementing strategies and technologies that enable businesses to manage and authenticate user identities securely. </p>\n<p>With LoginRadius, businesses can choose from various flexible deployment options tailored to their needs.</p>\n<h3 id=\"1-social-login-enhancing-user-convenience-and-engagement\" style=\"position:relative;\"><a href=\"#1-social-login-enhancing-user-convenience-and-engagement\" aria-label=\"1 social login enhancing user convenience and engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Social Login: Enhancing User Convenience and Engagement</h3>\n<p><a href=\"https://www.loginradius.com/social-login/\">Social login</a> simplifies users' registration and login process by allowing them to access your platform using their existing social media credentials. This feature streamlines the user experience and significantly enhances engagement rates. </p>\n<p>LoginRadius offers seamless integration with popular social media platforms, ensuring a hassle-free experience for businesses and users.</p>\n<p>Businesses can add multiple social media authentication platforms, including Facebook, Google, and more, to ensure their customers can authenticate seamlessly. </p>\n<h3 id=\"2-single-sign-on-sso-streamlining-access-across-platforms\" style=\"position:relative;\"><a href=\"#2-single-sign-on-sso-streamlining-access-across-platforms\" aria-label=\"2 single sign on sso streamlining access across platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Single Sign-On (SSO): Streamlining Access Across Platforms</h3>\n<p>Single Sign-On (SSO) is a game-changer for businesses managing multiple applications and platforms. </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">With LoginRadius, businesses can seamlessly implement SSO</a>, enabling users to access various services with a single set of credentials. This reduces the complexity of managing multiple passwords and enhances security by centralizing access control.</p>\n<h3 id=\"3-passwordless-login-enhancing-security-and-user-experience\" style=\"position:relative;\"><a href=\"#3-passwordless-login-enhancing-security-and-user-experience\" aria-label=\"3 passwordless login enhancing security and user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Passwordless Login: Enhancing Security and User Experience</h3>\n<p>Passwordless login solutions are increasingly replacing traditional password-based authentication methods. By eliminating the need for passwords, businesses can enhance security and provide a frictionless user experience. </p>\n<p>LoginRadius offers robust passwordless login options, including biometric authentication and one-time passcodes, ensuring top-notch security while enhancing user satisfaction.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-passwordless-login\"\n        title=\"DS-passwordless-login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-pswrdless-login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/DS-pswrdless-login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-pswrdless-login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/DS-pswrdless-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-cloud-integrations-seamlessly-integrating-ciam-with-existing-systems\" style=\"position:relative;\"><a href=\"#4-cloud-integrations-seamlessly-integrating-ciam-with-existing-systems\" aria-label=\"4 cloud integrations seamlessly integrating ciam with existing systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Cloud Integrations: Seamlessly Integrating CIAM with Existing Systems</h3>\n<p>Integrating CIAM seamlessly with existing cloud-based systems is crucial for businesses. LoginRadius offers flexible cloud integrations that allow businesses to connect their CIAM solution with various cloud-based platforms and applications. </p>\n<p>This integration ensures data consistency, enhances efficiency, and provides a unified view of customer identities across the organization.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Incorporating flexible CIAM deployment options from LoginRadius empowers businesses to create a seamless and secure online environment for their users. By embracing features such as social login, single sign-on, passwordless login, and cloud integrations, businesses can enhance user convenience, streamline access management, and bolster overall security.</p>\n<p>In a world where user experience and security are paramount, investing in a robust CIAM solution like LoginRadius is not just a choice but a strategic necessity. Stay ahead of the curve by implementing these advanced CIAM deployment options and ensure your users enjoy a hassle-free, secure, and engaging online experience.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 06, 2023","updated_date":null,"description":"User experience and security are non-negotiable in the modern digital world. Dive into our guide on CIAM deployment options with LoginRadius, a leader in the CIAM landscape. Explore seamless features like social login, Single Sign-On (SSO), passwordless login, and cloud integrations. Elevate user engagement, streamline access control, and fortify online security. Discover the strategic necessity of investing in advanced CIAM solutions, ensuring your users enjoy a secure, hassle-free online experience.","title":"Comprehensive Guide to Flexible CIAM Deployment Options with LoginRadius","tags":["single sign-on","social login","passwordless login","ciam solutions"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/7c0555c17c998cca6cb653b765b0c211/33aa5/ciam-deployment.jpg","srcSet":"/static/7c0555c17c998cca6cb653b765b0c211/f836f/ciam-deployment.jpg 200w,\n/static/7c0555c17c998cca6cb653b765b0c211/2244e/ciam-deployment.jpg 400w,\n/static/7c0555c17c998cca6cb653b765b0c211/33aa5/ciam-deployment.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Welcome to the digital age, where every click, keystroke, and connection holds immense value. And as technology continues to…","fields":{"slug":"/identity/cybersecurity-awareness-month-2023/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Welcome to the digital age, where every click, keystroke, and connection holds immense value. And as technology continues to advance, so do the threats that lurk in the digital shadows. </p>\n<p>Cybersecurity Awareness Month 2023 serves as a crucial reminder for enterprises to fortify their defenses and educate their workforce about the evolving cyber threats. </p>\n<p>This October, at LoginRadius, we pledge to spread awareness about <a href=\"https://www.cisa.gov/cybersecurity-awareness-month\">National Cybersecurity Awareness Month (NCSAM)</a> through awareness campaigns to help individuals stay safe online.</p>\n<p>Initially started by the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM has grown into a global initiative supported by many countries.</p>\n<p>Various organizations and governments across the globe join hands in educating people regarding good cybersecurity hygiene and ensuring everybody is safe while using the internet.</p>\n<p>Since the global cybersecurity threat vector has increased exponentially, governments are encouraging people to take accountability and focus more on improving their data security and privacy online. </p>\n<p>This year’s theme is- “<strong>It’s Easy to Stay Safe Online</strong>”!</p>\n<p>This blog will explore essential strategies businesses can adopt to safeguard their operations effectively.</p>\n<h2 id=\"1-user-endpoint-security-fortifying-the-first-line-of-defense\" style=\"position:relative;\"><a href=\"#1-user-endpoint-security-fortifying-the-first-line-of-defense\" aria-label=\"1 user endpoint security fortifying the first line of defense permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. User Endpoint Security: Fortifying the First Line of Defense</h2>\n<p>The modern workplace is diverse, with employees using various devices and networks. Securing these endpoints is pivotal in safeguarding your organization. </p>\n<p>Regularly update and patch all software to shield against known vulnerabilities. Implement robust endpoint security solutions that include antivirus software, firewalls, and intrusion detection systems. </p>\n<p>Ensure every device accessing your network adheres to strict security policies, reducing the risk of unauthorized access and data breaches.</p>\n<p>Additionally, incorporating the true potential of the zero-trust mechanism can help reinforce overall authentication security.</p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-zero-trust-security\"\n        title=\"WP-zero-trust-security\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-security.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-zero-trust-security.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-security.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-zero-trust-security.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"2-train-your-employees-knowledge-is-power\" style=\"position:relative;\"><a href=\"#2-train-your-employees-knowledge-is-power\" aria-label=\"2 train your employees knowledge is power permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Train Your Employees: Knowledge is Power</h2>\n<p>Your employees are your greatest asset and your first defense against cyber threats. Conduct regular cybersecurity training sessions to educate them about the latest scams, phishing techniques, and social engineering tactics. </p>\n<p>Training should be engaging, interactive, and tailored to your organization's risks. Encourage employees to be vigilant and empower them to recognize and respond to potential threats effectively.</p>\n<h2 id=\"3-encourage-strong-passwords-and-password-managers-the-lock-and-key-of-digital-security\" style=\"position:relative;\"><a href=\"#3-encourage-strong-passwords-and-password-managers-the-lock-and-key-of-digital-security\" aria-label=\"3 encourage strong passwords and password managers the lock and key of digital security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Encourage Strong Passwords and Password Managers: The Lock and Key of Digital Security</h2>\n<p>Weak passwords are akin to leaving your organization's front door wide open. Encourage employees to create strong, unique passwords for each account and device. Avoid easily guessable information such as birthdays or names. </p>\n<p>Implement the use of <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless authentication mechanisms</a> or encourage the use of password managers, which not only generate complex passwords but also store them securely. This ensures that employees can have intricate, unique passwords for each service without the daunting task of memorizing them.</p>\n<h2 id=\"4-use-multi-factor-authentication-adding-an-extra-layer-of-security\" style=\"position:relative;\"><a href=\"#4-use-multi-factor-authentication-adding-an-extra-layer-of-security\" aria-label=\"4 use multi factor authentication adding an extra layer of security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Use Multi-Factor Authentication: Adding an Extra Layer of Security</h2>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication (MFA)</a> provides an additional layer of security by requiring users to verify their identity through multiple methods. This could include something they know (password), something they have (a security token), or something they are (biometric verification). </p>\n<p>By enabling MFA, even if a malicious actor gains access to a password, they would still be unable to breach the account without the second form of authentication. This simple step significantly enhances your organization's security posture.</p>\n<h2 id=\"5-recognize-and-report-phishing-building-a-human-firewall\" style=\"position:relative;\"><a href=\"#5-recognize-and-report-phishing-building-a-human-firewall\" aria-label=\"5 recognize and report phishing building a human firewall permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Recognize and Report Phishing: Building a Human Firewall</h2>\n<p>Phishing attacks are one of cybercriminals' most common and successful methods. Teach your employees to recognize phishing attempts by scrutinizing email addresses, checking for spelling errors, and verifying unexpected requests for sensitive information. </p>\n<p>Establish a clear protocol for reporting suspicious emails and incidents. A well-informed workforce is a robust human firewall, thwarting <a href=\"https://www.loginradius.com/blog/identity/real-time-techniques-detect-phishing-attacks/\">phishing attempts</a> and protecting your organization's sensitive data.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Enterprises must remain proactive and adaptable in the ever-evolving landscape of cybersecurity threats. Cybersecurity Awareness Month 2023 presents a valuable opportunity to reinforce your organization's defenses and empower your employees with the knowledge and tools to safeguard your digital assets. </p>\n<p>Investing in user endpoint security, comprehensive training programs, strong passwords, multi-factor authentication, and fostering a culture of vigilance against phishing attempts, your enterprise can take small steps that yield impenetrable shields. Together, these measures create a resilient cybersecurity posture, ensuring your organization's safety in the face of evolving cyber threats.</p>\n<p>Remember, in cybersecurity, every small step you take today can fortify your organization's future against potential threats. Stay safe, stay vigilant, and embrace the power of knowledge to navigate the digital landscape securely.</p>\n<p>Stay tuned for more insights and tips on bolstering your organization's cybersecurity defenses amid Cybersecurity Awareness Month 2023!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 03, 2023","updated_date":null,"description":"Cybersecurity Awareness Month 2023 is a crucial reminder in the digital age where every click matters. Join us at LoginRadius as we spread the word about the importance of user endpoint security, employee training, strong passwords, multi-factor authentication, and phishing prevention. Discover how these small steps can create impenetrable shields, safeguarding your organization amid evolving cyber threats. Stay safe, stay vigilant, and empower your team with knowledge during Cybersecurity Awareness Month 2023!","title":"Small Steps, Big Shields: Navigating Cybersecurity Awareness Month 2023 Safely","tags":["cybersecurity","passwordless authentication","multi-factor authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/ebb5c489281496eb23fe6dbd8df24616/33aa5/cybersecurity-awareness-2023.jpg","srcSet":"/static/ebb5c489281496eb23fe6dbd8df24616/f836f/cybersecurity-awareness-2023.jpg 200w,\n/static/ebb5c489281496eb23fe6dbd8df24616/2244e/cybersecurity-awareness-2023.jpg 400w,\n/static/ebb5c489281496eb23fe6dbd8df24616/33aa5/cybersecurity-awareness-2023.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Managing access to sensitive information and resources has become a daunting challenge for organizations of all scales in a…","fields":{"slug":"/identity/converged-identity-platforms/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Managing access to sensitive information and resources has become a daunting challenge for organizations of all scales in a world where we are all digitally interconnected. The rapid growth of cloud-based applications, remote work culture, and the increasing threat of cyberattacks demand a broader and safer Identity and Access Management (IAM) strategy. </p>\n<p>And to overcome the challenges and pain points related to identity and access management, the converged identity platform can be a transformative solution. This article will help you understand how the converged identity platforms streamline access management across organizations. </p>\n<h2 id=\"what-is-a-converged-identity-platform-cip\" style=\"position:relative;\"><a href=\"#what-is-a-converged-identity-platform-cip\" aria-label=\"what is a converged identity platform cip permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Converged Identity Platform (CIP)?</h2>\n<p>A Converged Identity Platform (CIP) is a highly advanced and combined system that integrates various Identity and Access Management (IAM) functions into a unified solution. The platform brings together essential IAM capabilities, like user authentication, user provisioning, authorization, and identity governance, under one digital application. A Converged Identity Platform's primary purpose is to facilitate managing user identities, access controls, and data security policies across businesses.</p>\n<p>Traditional IAM solutions usually rely on separate systems for different functions, which leads to complexities, repetition, and security issues. Converged Identity Platforms handle these challenges by centralizing IAM operations, simplifying access management, and improving overall security.</p>\n<h2 id=\"how-does-cip-streamline-access-to-a-system\" style=\"position:relative;\"><a href=\"#how-does-cip-streamline-access-to-a-system\" aria-label=\"how does cip streamline access to a system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does CIP Streamline Access to a System?</h2>\n<p>A Converged Identity Platform (CIP) simplifies access to a system by centralizing and streamlining the process of user authentication and authorization. It combines various Identity and Access Management (IAM) functionalities into a cohesive ecosystem, allowing efficient organizational access management.</p>\n<p>Mentioned below are approaches that CIP utilizes to streamline access management:</p>\n<ol>\n<li><strong>Single Sign-On (SSO)</strong>: One of the critical elements of a CIP is Single Sign-On. <a href=\"https://www.loginradius.com/single-sign-on/\">With SSO, users only need to verify themselves once</a> to access multiple platforms and systems within the organization. After the first login, the CIP safely stores login credentials and automatically uses them to authenticate the user for other applications. This process eradicates the need to remember multiple combinations of usernames &#x26; passwords, reducing the chances of password-related issues and enhancing overall user productivity.</li>\n<li><strong>Focused Authentication</strong>: CIP concentrates on user authentication, ensuring all user credentials are verified against a unified authentication service. This concentrated approach improves security by consolidating authentication policies lowering the risk of unauthorized access, misconfigurations, and system vulnerabilities.</li>\n<li><strong>Multi-Factor Authentication (MFA)</strong>: CIP typically supports Multi-Factor Authentication, requiring users to provide additional verification factors beyond their passwords. MFA can include passwords the user knows, a one-time code on their registered mobile number, or biometric methods like fingerprint or facial recognition. <a href=\"https://www.loginradius.com/multi-factor-authentication/\">MFA acts as added security</a>, making it a challenging experience for unauthorized users to acquire access even if they can decode passwords.</li>\n<li><strong>User Provisioning:</strong> CIP automates user provisioning and deprovisioning methods. It simplifies the onboarding and offboarding of users in an organization. When a new employee joins the organization, the CIP can automatically create their official user account, allocate appropriate access privileges, and provide them with the required applications and resources. In the same way, when an employee leaves the organization, the CIP can withdraw access rights across all systems in one go.</li>\n<li><strong>Identity Federation</strong>: CIP supports identity federation. This process allows the users to access resources across various domains and organizations using their home organization's credentials. This capability reduces the need for separate user accounts and passwords for each platform, making access management more efficient, easy, and less time-consuming. </li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/federated-identity-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-FIM\"\n        title=\"DS-FIM\"\n        src=\"/static/ef0c27dd7f9672e1684d62550b85a3ba/e5715/DS-FIM.png\"\n        srcset=\"/static/ef0c27dd7f9672e1684d62550b85a3ba/a6d36/DS-FIM.png 650w,\n/static/ef0c27dd7f9672e1684d62550b85a3ba/e5715/DS-FIM.png 768w,\n/static/ef0c27dd7f9672e1684d62550b85a3ba/81501/DS-FIM.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ol start=\"6\">\n<li><strong>Role-Based Access Control (RBAC)</strong>: CIP often includes Role-Based Access Control, enabling managers to assign access permissions based on users' tasks or job functions. RBAC facilitates access management by grouping users into predefined roles and giving them appropriate access privileges.</li>\n<li><strong>Centralized Auditing</strong>: CIP offers centralized reporting and auditing capabilities, enabling administrators to observe user activities, track access controls, and analyze suspicious or unauthorized behavior. These logs assist in maintaining compliance with regulations and recognizing potential security breaches.</li>\n</ol>\n<p>With the abovementioned elements, a Converged Identity Platform significantly lowers the administrative burden of managing access controls. It ensures that users have safe and hassle-free access to the platforms and resources they need to perform efficiently.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this rapidly evolving digital world, where security breaches and cyber attacks continue challenging an organization's information security, Converged Identity Platforms (CIPs) emerge as a unique resolution for efficient and protected access management. </p>\n<p>By integrating various Identity and Access Management (IAM) functionalities into a single ecosystem, CIPs facilitate identity management, authentication, and authorization complications. It offers a convenient user experience. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 29, 2023","updated_date":null,"description":"A Converged Identity Platform (CIP) is a unique solution that unifies the management of identities, access controls, and security policies across an organization. It brings together various components like Single Sign-On (SSO), Multi-Factor Authentication (MFA), User Provisioning, and Identity Governance and Administration (IGA) into a single digital ecosystem. CIP eliminates the need for numerous disjointed systems and offers a centralized process for identity management.","title":"Streamlining Access with Converged Identity Platforms","tags":["identity governance","user provisioning","sso","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/c0d1def0525322e8eb89e9442318120e/33aa5/streamlined-access.jpg","srcSet":"/static/c0d1def0525322e8eb89e9442318120e/f836f/streamlined-access.jpg 200w,\n/static/c0d1def0525322e8eb89e9442318120e/2244e/streamlined-access.jpg 400w,\n/static/c0d1def0525322e8eb89e9442318120e/33aa5/streamlined-access.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction At LoginRadius, corporate responsibility goes beyond the boardroom. It extends to the heart of our communities, where we can…","fields":{"slug":"/growth/sanitary-pad-donation-drive/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>At LoginRadius, <a href=\"https://www.loginradius.com/blog/growth/loginradius-csr-activities/\">corporate responsibility goes beyond the boardroom</a>. It extends to the heart of our communities, where we can make a meaningful difference. Recently, we initiated a Sanitary Pad Donation Drive in collaboration with the Hope Basket Foundation to support underprivileged girls and women in our community. This initiative is special because we raised funds from our dedicated employees, who understand the importance of giving back to society.</p>\n<h2 id=\"the-harsh-realities\" style=\"position:relative;\"><a href=\"#the-harsh-realities\" aria-label=\"the harsh realities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Harsh Realities</h2>\n<p>In our journey to support underprivileged girls and women in Jaipur, we uncovered some harsh realities highlighting the critical need for initiatives like ours. Despite living in an age of progress and technology, many women still use clothes as a makeshift alternative to sanitary pads. The reasons behind this choice often revolve around comfort and ingrained habits.</p>\n<h3 id=\"1-comfort-vs-hygiene\" style=\"position:relative;\"><a href=\"#1-comfort-vs-hygiene\" aria-label=\"1 comfort vs hygiene permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Comfort vs. Hygiene</h3>\n<p>Many women still prefer using clothes during their menstrual cycles due to concerns related to comfort and long-standing habits. This preference poses significant health risks, as using cloth instead of sanitary pads can lead to infections and other health complications.</p>\n<h3 id=\"2-inflated-market-prices\" style=\"position:relative;\"><a href=\"#2-inflated-market-prices\" aria-label=\"2 inflated market prices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Inflated Market Prices</h3>\n<p>The market prices of sanitary pads are often beyond the reach of underprivileged women and girls. The high cost of these essential hygiene products forces them to compromise their health and well-being.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAPABQDASIAAhEBAxEB/8QAFwAAAwEAAAAAAAAAAAAAAAAAAAMFAv/EABYBAQEBAAAAAAAAAAAAAAAAAAIAA//aAAwDAQACEAMQAAABYihk04pGa//EABsQAAMAAgMAAAAAAAAAAAAAAAABAgMSERMU/9oACAEBAAEFAuiS8GNLzM0HHJEax//EABcRAQADAAAAAAAAAAAAAAAAAAABERL/2gAIAQMBAT8BxKn/xAAXEQADAQAAAAAAAAAAAAAAAAAAARES/9oACAECAQE/AdqFR//EABwQAAICAgMAAAAAAAAAAAAAAAABAiEQURExYf/aAAgBAQAGPwK4WUuH6zeOxR0f/8QAHBABAAMAAgMAAAAAAAAAAAAAAQARQSFRMXGB/9oACAEBAAE/IXMdI7LEltwp8AO57J9i6V0sa+OFT//aAAwDAQACAAMAAAAQUP8A/8QAFxEAAwEAAAAAAAAAAAAAAAAAAAERYf/aAAgBAwEBPxBUosn/xAAXEQEBAQEAAAAAAAAAAAAAAAABABEh/9oACAECAQE/EHiCdL//xAAbEAEAAwEAAwAAAAAAAAAAAAABABEhMUGhsf/aAAgBAQABPxBBsNqx8qgihQESuvyDkuGAN9x2IY6WhmJStFzlgMT/2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"hope-basket\"\n        title=\"image_tooltip\"\n        src=\"/static/53645efdc66f7770cc75a278b0c527fa/212bf/hope-basket.jpg\"\n        srcset=\"/static/53645efdc66f7770cc75a278b0c527fa/6aca1/hope-basket.jpg 650w,\n/static/53645efdc66f7770cc75a278b0c527fa/212bf/hope-basket.jpg 768w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"3-stigma-and-shyness\" style=\"position:relative;\"><a href=\"#3-stigma-and-shyness\" aria-label=\"3 stigma and shyness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Stigma and Shyness</h3>\n<p>Women often feel uncomfortable discussing menstrual hygiene and their challenges when using cloth as an alternative. The stigma attached to menstruation prevents open conversations about these critical issues. Additionally, many women shy away from buying sanitary pads from medical stores, further complicating their access to proper menstrual hygiene products.</p>\n<h2 id=\"our-approach\" style=\"position:relative;\"><a href=\"#our-approach\" aria-label=\"our approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Our Approach:</h2>\n<p>In response to these findings, LoginRadius, in collaboration with Hope Basket Foundation, decided to launch the Sanitary Pad Donation Drive. Our goal is to break down the barriers that prevent underprivileged girls and women from accessing sanitary pads and raise awareness about the importance of proper menstrual hygiene. </p>\n<p>Our donation drive is being carried out in phases, targeting different underprivileged areas in Jaipur. In each step, we provide sanitary pads and educate women about their benefits. By shedding light on the potential health risks of using cloth instead of a sanitary pad, we encourage women to make safer and more informed choices.</p>\n<h2 id=\"acknowledging-the-heroes\" style=\"position:relative;\"><a href=\"#acknowledging-the-heroes\" aria-label=\"acknowledging the heroes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Acknowledging the Heroes:</h2>\n<p>None of this would have been possible without the dedication and commitment of our operations team and volunteers who stepped up to make a difference. We thank Naveen, Vikas, Shreya, Soniya, Sudhey, and Pankaj for their invaluable contributions to this noble cause.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LR-donation-drive\"\n        title=\"image_tooltip\"\n        src=\"/static/50008348f3afbc8ad372128e28b1d0aa/212bf/LR-donation-drive.jpg\"\n        srcset=\"/static/50008348f3afbc8ad372128e28b1d0aa/6aca1/LR-donation-drive.jpg 650w,\n/static/50008348f3afbc8ad372128e28b1d0aa/212bf/LR-donation-drive.jpg 768w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion:</h2>\n<p>At LoginRadius, we are not just a company but a community that cares. Our Sanitary Pad Donation Drive is a testament to our commitment to positively impacting the lives of underprivileged girls and women. We are working towards a future where all women and girls can experience their menstrual cycles with dignity, comfort, and safety.</p>\n<p>Join us in our mission to create a positive change in our community. We can empower women and girls to embrace better menstrual hygiene practices and lead healthier, happier lives.</p>\n<p>Stay tuned for updates on our Sanitary Pad Donation Drive and the impact we're creating in the lives of underprivileged girls. Together, we can make a difference.</p>\n<p><a href=\"https://www.loginradius.com/careers/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cta-careers\"\n        title=\"cta-careers\"\n        src=\"/static/48629a248f1828533d355cb340a92cf9/e5715/cta-careers.png\"\n        srcset=\"/static/48629a248f1828533d355cb340a92cf9/a6d36/cta-careers.png 650w,\n/static/48629a248f1828533d355cb340a92cf9/e5715/cta-careers.png 768w,\n/static/48629a248f1828533d355cb340a92cf9/63ff0/cta-careers.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 27, 2023","updated_date":null,"description":"Join LoginRadius in our mission to create a positive change in our community. Learn how we're providing sanitary pads, educating women, and making a difference in the lives of underprivileged girls. Together, we can ensure dignity, comfort, and safety for all during their menstrual cycles.","title":"Making a Difference: LoginRadius' Sanitary Pad Donation Drive","tags":["LoginRadius donation drive","women empowerment","hope basket foundation"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/a4110f53271e9834090c129f62a4373f/33aa5/social-cause.jpg","srcSet":"/static/a4110f53271e9834090c129f62a4373f/f836f/social-cause.jpg 200w,\n/static/a4110f53271e9834090c129f62a4373f/2244e/social-cause.jpg 400w,\n/static/a4110f53271e9834090c129f62a4373f/33aa5/social-cause.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Azharuddin Mohammad","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Customer identity and access management (CIAM) encompasses privacy regulations that protect your customers, regardless of…","fields":{"slug":"/identity/privacy-data-security-retail/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Customer identity and access management (CIAM) encompasses privacy regulations that protect your customers, regardless of whether they’re shopping online or visiting your store. </p>\n<p>So, how can you optimize customers’ privacy without overbearing authentication and security measures?</p>\n<p>Here, we’ll uncover what privacy in retail entails, plus give insights into the importance of compliance and fostering a positive customer experience. </p>\n<h2 id=\"what-is-privacy-in-retail\" style=\"position:relative;\"><a href=\"#what-is-privacy-in-retail\" aria-label=\"what is privacy in retail permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Privacy In Retail?</h2>\n<p>Privacy regulations apply to all businesses–physical stores, data-driven retailers, and ecommerce. Strategies aim to protect the following:</p>\n<ul>\n<li>Integrity of stored customer data, such as name, address, contact details, and financial information</li>\n<li>Physical privacy of payment cards</li>\n<li>Deletion rights, enabling customers to remove their details from stored databases</li>\n<li>Access from unauthorized third parties, like thieves and malicious hackers</li>\n<li>Confidence in ensuring retailers don’t share or sell customers’ information</li>\n</ul>\n<p>Policymakers must adjust their strategy to cater to their business model and vulnerabilities. For example, a retail store must consider physical measures to protect customers submitting payment details or email addresses. </p>\n<p>Meanwhile, an ecommerce site would revoke employee ID access to reduce phantom accounts opening vulnerabilities to hackers. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-retail-and-consumer-goods-companies-use-loginradius-identity-solution/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-retail-and-ecommerce\"\n        title=\"DS-retail-and-ecommerce\"\n        src=\"/static/1a79fcc72fbd8dbcc549ce424073c640/e5715/DS-retail-and-ecommerce.png\"\n        srcset=\"/static/1a79fcc72fbd8dbcc549ce424073c640/a6d36/DS-retail-and-ecommerce.png 650w,\n/static/1a79fcc72fbd8dbcc549ce424073c640/e5715/DS-retail-and-ecommerce.png 768w,\n/static/1a79fcc72fbd8dbcc549ce424073c640/81501/DS-retail-and-ecommerce.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"why-is-privacy-important-to-retailers\" style=\"position:relative;\"><a href=\"#why-is-privacy-important-to-retailers\" aria-label=\"why is privacy important to retailers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is Privacy Important to Retailers?</h2>\n<p>A pragmatic privacy strategy is paramount to protecting the retailer’s reputation and compliance with state and national privacy framework laws. Learn more below.</p>\n<ul>\n<li><strong>Regulatory compliance:</strong> According to the National Conference of State Legislatures, at least <a href=\"https://www.ncsl.org/technology-and-communication/2021-consumer-data-privacy-legislation\">38 states</a> enforced privacy bills.–for instance, the consumer’s right to understand and revoke personal details, such as an email address, for marketing purposes. Businesses, including retailers, should follow nationwide compliance by the CCPA. These regulations ensure customers’ deletion, access, and opt-out of sale rights.</li>\n<li><strong>Consumer trust and loyalty:</strong> Outlining a privacy strategy implementing modern physical and digital security measures improves customer’s confidence in the business. Data leaks raise apprehension among paying customers, cause long-term reputational damage, and impose hefty recovery costs.</li>\n<li><strong>Protection of a valuable asset:</strong> A large database is imperative for retailers. Confident customers are less likely to opt out of marketing emails if they feel their email addresses are safe. Retailers can use this data to maximize customer relationship management and analyze trends in consumer behavior to create further products and identify business development opportunities. </li>\n</ul>\n<h2 id=\"how-to-balance-customer-privacy-and-security\" style=\"position:relative;\"><a href=\"#how-to-balance-customer-privacy-and-security\" aria-label=\"how to balance customer privacy and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Balance Customer Privacy and Security</h2>\n<p>The following tips share actionable guidance on implementing privacy and safety measures with retail security system technologies that don’t hinder the customer’s experience.</p>\n<h3 id=\"introduce-cloud-integrations\" style=\"position:relative;\"><a href=\"#introduce-cloud-integrations\" aria-label=\"introduce cloud integrations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduce Cloud Integrations</h3>\n<p><a href=\"https://www.loginradius.com/cloud-integrations/\">Cloud integrations</a> offer retailers a safe and accessible way to manage sensitive data. Cloud-based solutions enable retailers to encrypt information, making it difficult for hackers to read confidential data. </p>\n<p>Improved security minimizes the risk of data theft, saving retailers considerable costs in recovering from the incident. For instance, the Harvard Business Review states that audit fees can be 13.5% higher than companies that don’t experience a data breach. </p>\n<p>As part of cloud integration, <a href=\"https://www.loginradius.com/customer-profiling/\">customer profiling</a> enables retailers to gather, store, and create personas. This information allows retailers to create targeted marketing campaigns and expand their product ranges.</p>\n<h3 id=\"avoid-overzealous-measures\" style=\"position:relative;\"><a href=\"#avoid-overzealous-measures\" aria-label=\"avoid overzealous measures permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Avoid Overzealous Measures</h3>\n<p>Overzealous measures include excessive authentication factors when logging into an ecommerce account or obstructive security tags on clothes or smaller, low-value items. </p>\n<p>Modern technology enables retailers to facilitate <a href=\"https://www.loginradius.com/blog/growth/authentication-tools-boost-sales/\">passwordless authentication</a>. Email magic links send a unique one-time passcode directly to their inbox, meaning customers can access commercial sites easily. Eliminating passwords diminishes the possibility of thieves intercepting log-in details to accounts where customers potentially store their payment and residential details, too.</p>\n<p>With ecommerce sales equating to a <a href=\"https://www.statista.com/topics/7868/online-checkout-behavior-and-e-commerce-conversions-worldwide/#topicOverview\">fifth of retail sales</a> globally, establishing smooth navigation to your site is paramount to driving conversion.</p>\n<h3 id=\"enhanced-data-governance\" style=\"position:relative;\"><a href=\"#enhanced-data-governance\" aria-label=\"enhanced data governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Data Governance</h3>\n<p>Implement adaptive security policies that allow teams to adapt to new threats in real-time and maintain compliance with updated regulations.</p>\n<p>Initiate internal practices such as a password policy involving routine password changes and specifications–such as case sensitivity and character, number, and special symbol combinations. Add complex security questions that update regularly to prevent older users from retaining access information. </p>\n<p>Field-level encryption enhances protection over single cells and fields within databases containing confidential customer data. Only users from authorized servers can decrypt the data, improving data retention and safety.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Modern measures such as passwordless authentication, cloud-based security, and field encryption are paramount to a sturdy privacy strategy. Ultimately, these measures work “in the background,” meaning they rarely disrupt the customer’s experience.</p>\n<p>In some ways, they enhance it–improving access to personal accounts and the ability to maintain control over their shopping experience. Similarly, these measures help retailers comply with state and national laws, preventing financial loss through fines or breaches. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 27, 2023","updated_date":null,"description":"In the world of retail, finding the balance between privacy and security is paramount. This delicate equilibrium ensures compliance with evolving regulations and builds trust and loyalty among customers. By embracing modern technologies like passwordless authentication and robust data governance, retailers can safeguard privacy while enhancing the customer experience.","title":"How Retailers Can Balance Privacy While Foiling Thieves","tags":["data privacy","compliance","data security","ciam solutions","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/825c9fad0c4713004bf07db6b04c68a9/33aa5/privacy-balancing.jpg","srcSet":"/static/825c9fad0c4713004bf07db6b04c68a9/f836f/privacy-balancing.jpg 200w,\n/static/825c9fad0c4713004bf07db6b04c68a9/2244e/privacy-balancing.jpg 400w,\n/static/825c9fad0c4713004bf07db6b04c68a9/33aa5/privacy-balancing.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Jackson Maven","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":96,"currentPage":17,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}