{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/29","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction As a developer, I like to work on the terminal. Many developers are the same way. Instead of scrolling, clicking the mouse…","fields":{"slug":"/engineering/loginradius-launches-cli-enterprise-dashboard/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As a developer, I like to work on the terminal. Many developers are the same way. Instead of scrolling, clicking the mouse, they prefer working with only keywords (through commands or shortcuts). The command-line interface (CLI) is a great tool for them.</p>\n<p>So, LoginRadius has launched a CLI for its enterprise dashboard. The CLI makes it easier by using some commands to perform different operations and manage the flow of the LoginRadius Enterprise dashboard.</p>\n<h2 id=\"the-idea-behind-loginradius-cli\" style=\"position:relative;\"><a href=\"#the-idea-behind-loginradius-cli\" aria-label=\"the idea behind loginradius cli permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Idea Behind LoginRadius CLI</h2>\n<p>We always look for ways to eliminate resistance from the process of working with LoginRadius. Therefore, we have taken this step to introduce LoginRadius CLI for a better developer experience.</p>\n<p>In the 1970s and 1980s, most users preferred to use command-line interfaces. As time passed, we shifted to graphical user interfaces. GUIs are user-friendly; however, CLIs are faster than GUIs. Here is an example of adding domain via Admin Console v/s CLI :</p>\n<p>To add a domain through LoginRadius Admin Console, you need to:  \\</p>\n<ol>\n<li>Navigate it to Web Apps in LoginRadius Admin Console</li>\n<li>Click on Add </li>\n<li>Enter the domain </li>\n<li>Click on Save</li>\n</ol>\n<p>On the flip side, you can do this by running a single command:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 489px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.01431492842536%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAHCAYAAAAIy204AAAACXBIWXMAABJ0AAASdAHeZh94AAABKklEQVQoz42R63KCMBCFeYDWUUAgXK0KyCWGKnfQtr5E3/9JTpNYRqbtj/74ZnNOdrI7J8opZ7iVDPWQY1dThFGC/YET/5cUYZLhZR+hu35AYcTBZxGgv1l4rmysFiqWmoalqmGl6Viu1DtCS0/cqd88+p4WC4SHFIpuEaiWA8Py4No+HJ/j+SCOC9204PoBvCCQ2iS2RNxP2K4nMQlBnFEoojmMIvTDgLbvZR0vF6Q5xWa75XrE9e1d6nNVoe16xEmKrh+kn3E/p0fQI7tvuNnuMIwXJGmGnJvDOIKygg+J0bQdwviAPR9YNQ33GcqqBiteee8Rp3OJsq7l1iKWiGepaGsDumFC1DmTJ+r8/LNPsObRiBzlhlMuAkNgzepfkN+Y/GPFwykt8AVZC8JRA+nkagAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-1\"\n        title=\"cl-1\"\n        src=\"/static/7f11c250ddbc8de781684571ea14f348/03e1f/cl-1.png\"\n        srcset=\"/static/7f11c250ddbc8de781684571ea14f348/03e1f/cl-1.png 489w\"\n        sizes=\"(max-width: 489px) 100vw, 489px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Here are some more of LoginRadius CLI Enterprise's commands:</strong></p>\n<p><strong>1. Login/Logout to your LoginRadius Dashboard</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 729px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 36.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-2\"\n        title=\"cl-2\"\n        src=\"/static/ffdfc7286c5e6e8f036abc5b8b24014d/b2982/cl-2.png\"\n        srcset=\"/static/ffdfc7286c5e6e8f036abc5b8b24014d/a6d36/cl-2.png 650w,\n/static/ffdfc7286c5e6e8f036abc5b8b24014d/b2982/cl-2.png 729w\"\n        sizes=\"(max-width: 729px) 100vw, 729px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This command (<em>lr login</em>) will help you to login to your LoginRadius Enterprise Dashboard. Once logged in, you can perform other operations and configure your LoginRadius Application through CLI.</p>\n<p><strong>2. Manage Application Credentials</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.92307692307693%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-3\"\n        title=\"cl-3\"\n        src=\"/static/34e18ed3bfd4b0b652b57859a93e640c/e5715/cl-3.png\"\n        srcset=\"/static/34e18ed3bfd4b0b652b57859a93e640c/a6d36/cl-3.png 650w,\n/static/34e18ed3bfd4b0b652b57859a93e640c/e5715/cl-3.png 768w,\n/static/34e18ed3bfd4b0b652b57859a93e640c/b5dee/cl-3.png 1237w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>You can get our App Credentials, reset Secret key, update account password and generate SOTT through LoginRadius CLI.</p>\n<p><strong>Set Schema for Your LoginRadius Application</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 87.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"4\"\n        title=\"4\"\n        src=\"/static/5d4ff2be787674cb2336d3f81c30c84f/e5715/4.png\"\n        srcset=\"/static/5d4ff2be787674cb2336d3f81c30c84f/a6d36/4.png 650w,\n/static/5d4ff2be787674cb2336d3f81c30c84f/e5715/4.png 768w,\n/static/5d4ff2be787674cb2336d3f81c30c84f/29007/4.png 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This command will help you set the schema for your application. We can get all the basic fields via <em>lr get schema</em> we can update the schema via lr set schema. </p>\n<p><strong>Theme Management (LoginRadius Page)</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-5\"\n        title=\"cl-5\"\n        src=\"/static/ae4f8c15a6b68f1854a276973dd4fd7a/e5715/cl-5.png\"\n        srcset=\"/static/ae4f8c15a6b68f1854a276973dd4fd7a/a6d36/cl-5.png 650w,\n/static/ae4f8c15a6b68f1854a276973dd4fd7a/e5715/cl-5.png 768w,\n/static/ae4f8c15a6b68f1854a276973dd4fd7a/f680b/cl-5.png 1108w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>You can update the LoginRadius IDX Page(Hosted Page) from the available themes through LoginRadius CLI commands.  </p>\n<p><strong>Learn More LoginRadius CLI Enterprise Commands</strong></p>\n<p>Run  lr – help for available commands. For more details about commands please check out the <a href=\"https://opensource.loginradius.com/cli/manual/\">documentation</a>.</p>\n<h2 id=\"try-it-out\" style=\"position:relative;\"><a href=\"#try-it-out\" aria-label=\"try it out permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Try It Out</h2>\n<p>The LoginRadius CLI is available for Windows, Linux, and MacOS. <a href=\"https://github.com/LoginRadius/lr-cli/tree/main#readme\">Check out the installation instructions for your Operating System on our README Page</a>.</p>\n<p>We hope you will love trying LoginRadius CLI for Enterprise Dashboard. We will add and explore more features in the future. Needless to say, for developers who like working with terminals and prefer to type commands, LoginRadius CLI will be a great experience.</p>\n<p>We are eager to know your feedback, test cases and also what we can bring up next in our CLI. If you have any suggestions, please create an issue on our <a href=\"https://github.com/LoginRadius/lr-cli/issues\">open source github repository</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 16, 2023","updated_date":null,"description":"We are happy to announce that we have launched LoginRadius CLI for enterprise dashboard.","title":"LoginRadius Launches a CLI for Enterprise Dashboard","tags":["enterprise","admin console","developers"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/1887b01a9c110cfa79272e2995bcd767/ee604/cli-1.png","srcSet":"/static/1887b01a9c110cfa79272e2995bcd767/69585/cli-1.png 200w,\n/static/1887b01a9c110cfa79272e2995bcd767/497c6/cli-1.png 400w,\n/static/1887b01a9c110cfa79272e2995bcd767/ee604/cli-1.png 800w,\n/static/1887b01a9c110cfa79272e2995bcd767/a8378/cli-1.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Kundan Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction With technology evolving by leaps and bounds and businesses always striving to deliver the best experience to their customers…","fields":{"slug":"/growth/ciam-minimizes-expenses-access-management/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With technology evolving by leaps and bounds and businesses always striving to deliver the best experience to their customers, the role of customer identity and access management can’t be overlooked.</p>\n<p>Whether we talk about delivering <a href=\"https://www.loginradius.com/authentication/\">a seamless authentication experience</a> or reinforcing the overall business and customer identity security, a CIAM solution leaves no stone unturned in scaling business growth. </p>\n<p>However, there’s much more than security and user experience when discussing a CIAM. Access management through a robust CIAM can help businesses save a lot of their money! </p>\n<p>Let’s uncover the aspects of leveraging a CIAM to minimize overall operational costs and why businesses must put their best foot forward in adopting a cutting-edge CIAM. </p>\n<h2 id=\"what-is-access-management-how-does-a-ciam-improve-access-management\" style=\"position:relative;\"><a href=\"#what-is-access-management-how-does-a-ciam-improve-access-management\" aria-label=\"what is access management how does a ciam improve access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Access Management? How Does a CIAM Improve Access Management?</h2>\n<p>Access management is a process that refers to the methods and tools used to control and monitor network access for both on-premises and cloud-based systems.</p>\n<p>Access management aims to ensure that only authorized individuals can access the information they need while also ensuring that unauthorized people cannot access data.</p>\n<p>CIAM (Customer Identity and Access Management) solution is a type of access management system that businesses can use to maintain a firm security policy. These solutions offer robust security for access management without compromising user experience.</p>\n<p>While most renowned organizations across the globe rely on a cutting-edge CIAM, many aren’t leveraging its true potential, especially when it comes to saving overall operational costs. </p>\n<p>Let’s look at some aspects depicting the role of access management in cost optimization. </p>\n<h3 id=\"1-cost-efficiency-while-onboarding-and-offboarding-users\" style=\"position:relative;\"><a href=\"#1-cost-efficiency-while-onboarding-and-offboarding-users\" aria-label=\"1 cost efficiency while onboarding and offboarding users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Cost Efficiency while Onboarding and Offboarding Users</h3>\n<p>Automating the <a href=\"https://blog.loginradius.com/growth/successful-saas-onboarding-process/\">onboarding</a> and offboarding process is the fastest way to make your IT more efficient and productive.</p>\n<p>But don't just take our word for it—here's why: when you automate these processes, you can streamline your user management, reducing costs in the long run.</p>\n<p>Do you know how your business is trying to automate everything? Well, it's not just about the cost—it's about the people. Automated onboarding and offboarding not only save time but also saves money.</p>\n<p>Even as every company is trying to get on board with automation, onboarding and offboarding employees are still done manually. But why? These activities are minor when considering how much they can affect your budget over time.</p>\n<p>The resources and labor costs associated with these tasks don't even factor in the overall price tag of making them happen manually! So by deploying an automated CIAM that supports these processes, you'll be able to speed up productivity and IT efficiency without breaking the bank.</p>\n<h3 id=\"2-reducing-fraud-and-risks\" style=\"position:relative;\"><a href=\"#2-reducing-fraud-and-risks\" aria-label=\"2 reducing fraud and risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Reducing Fraud and Risks</h3>\n<p>In today's world of digital business, you can't afford to take a risk with your identity management strategy.</p>\n<p>You need to authenticate users quickly, securely, and efficiently. That's where CIAM comes in. It uses multi-factor (MFA) and risk-based authentication that helps mitigate the risks of identity theft and prevents a breach.</p>\n<p>So how does CIAM work?</p>\n<p>CIAM is an integrated digital security platform combining advanced and user behavior analytics with cloud-based identity access management (IAM) solutions. The result is a comprehensive solution that lets you verify identities while providing the highest levels of security possible.</p>\n<p>And if you're wondering how it all fits together, here's how: CIAM incorporates MFA and risk-based authentication that helps mitigate the risks of identity theft and prevents a breach by gathering data about user behavior patterns for each employee or user account based on their specific role within your organization. </p>\n<p><a href=\"https://www.loginradius.com/resource/an-enterprises-guide-to-risk-based-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABhUlEQVQY00WROW8TURSFLaTEHo+j2BPLzuKFxDNeZDvGGW/MeAlMYju7EU0gKRKlCwpUqbI0VP4liIYCGqIUCCpo6Ggo+Csf7z1LUJyrq6tzz7mLT8u66PkeRsrEmI/hnV5weDUmVXUxbZdIsUMg20YTCJgOwaJHtPWMuVUPrbRBQPRqlkvAmnB8MgTzXYxkhmBIw4jHyFSq5FyP5bJNuND+R9YsB728QerJC4qbh+it5/hLfVVXhkLYJ4MuBdNZ9HCEqdAMhlmm0h+RzheIrq7jFxw5RXxtwMPHe8yv9VWeqA1ZcfZJNHeZKfT+C8qVEpU29vqQkuNR7Q1YtoVJvkasuqmIcgJpHLcHLDW2WaxvsVDfFmI7RMpPJ6ZqZZEEcx3iotHqHAiMsLojko0hs8WeIksh38IjXl2P+fX7Dx8+f+Hdxzvef7rn64+f3H37TljwpjPO5IbqjkLUb7oCDtMC8m4hsYasSzxIN2genHAuHnb0+oaXF9cKZ5dvOX5zK7hdNeVfDIjC2IX3+/4AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-RBA\"\n        title=\"GD-to-RBA\"\n        src=\"/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png\"\n        srcset=\"/static/d57f9c65049003fa8427fb6d0893f180/a6d36/GD-to-RBA.png 650w,\n/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png 768w,\n/static/d57f9c65049003fa8427fb6d0893f180/81501/GD-to-RBA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Risk assessments are performed based on this data to determine whether or not an unauthorized user should have access to sensitive information via an online portal or application portal. </p>\n<p>Once your organization is shielded from fraud and risks, you eventually save millions of dollars that otherwise would get squandered in containing breaches or paying the ransom. </p>\n<h3 id=\"3-meeting-the-compliances\" style=\"position:relative;\"><a href=\"#3-meeting-the-compliances\" aria-label=\"3 meeting the compliances permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Meeting the Compliances</h3>\n<p>A customer identity and access management (CIAM) platform help businesses comply with every data regulation and privacy compliance, including the <a href=\"https://blog.loginradius.com/identity/ccpa-vs-gdpr-the-compliance-war/\">GDPR and the CCPA</a>.</p>\n<p>A CIAM could be the best way to stay ahead of the competition since it offers endless business opportunities that help enhance leads and eventually improve conversion rates. As a leading GDPR-compliance-ready CIAM platform, LoginRadius works seamlessly for any business model.</p>\n<p>LoginRadius simplifies data compliance by bringing all the consumer data under a single roof, which enables complete profile management of an individual consumer in a single intuitive admin console.</p>\n<p>And this ensures your organization is saved from hefty fines imposed by data regulation agencies for non-compliance. </p>\n<p>Our platform ensures you remain compliant with GDPR and stay ahead of your competitors regarding securing essential consumer data. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>In short, implementing a good CIAM is essential to businesses. The task of choosing one wisely can be daunting and can take a significant amount of time. Finding the right one means you maximize security and minimize your expenses. </p>\n<p>Some critical factors to consider when choosing one are the scalability, expandability, upgrade flexibility, openness, and customer support of a CIAM vendor. </p>\n<p>LoginRadius' extensive experience in the identity and access management market will help you ensure robust security &#x26; user experience, meet compliance requirements, and minimize overall expenses. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 13, 2023","updated_date":null,"description":"Whether we talk about delivering a seamless authentication experience or reinforcing the overall business and customer identity security, a CIAM solution leaves no stone unturned in scaling business growth. This blog explains the aspects of leveraging the role of a CIAM’s access management in cost optimization.","title":"An Exclusive CIAM Benefit: The Role of Access Management in Cost Optimization","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/76bf55f6c38c2a67aff6afd834308970/49b36/access-managemt.jpg","srcSet":"/static/76bf55f6c38c2a67aff6afd834308970/f836f/access-managemt.jpg 200w,\n/static/76bf55f6c38c2a67aff6afd834308970/2244e/access-managemt.jpg 400w,\n/static/76bf55f6c38c2a67aff6afd834308970/49b36/access-managemt.jpg 512w","sizes":"(max-width: 512px) 100vw, 512px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction With the changing business landscape, cloud computing is undoubtedly broadening the horizons regarding the digital…","fields":{"slug":"/identity/multi-cloud-environment-optmization-challenges/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With the changing business landscape, cloud computing is undoubtedly broadening the horizons regarding the digital transformation of a business. </p>\n<p>However, while businesses think of leveraging the cloud, there remain specific challenges that may <a href=\"https://blog.loginradius.com/growth/5-ways-reduce-cloud-cost-optimization/\">increase operational costs</a> and could raise the need for more resources. </p>\n<p>And when it comes to multi-cloud environments, things are no different. The ideal scenario for any organization leveraging the cloud is to ensure they’re running the right workload on the right cloud with optimal capacity, performance, and cost that meets a business goal. </p>\n<p>Although some features of the cloud are pretty attractive, there exist some that aren’t so attractive but are add-on features that make it highly complex to manage the cloud regularly.  </p>\n<p>Let’s uncover some optimization aspects of multi-cloud environments and the challenges that can help businesses plan their cloud adoption smartly. </p>\n<h2 id=\"what-are-the-most-common-multi-cloud-environment-challenges\" style=\"position:relative;\"><a href=\"#what-are-the-most-common-multi-cloud-environment-challenges\" aria-label=\"what are the most common multi cloud environment challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Most Common Multi-Cloud Environment Challenges?</h2>\n<p>When it comes to multi-cloud environments, businesses aren’t aware of specific challenges that may impact overall performance, running costs, and efficiency. These challenges include: </p>\n<h3 id=\"1-application-complexibitlity\" style=\"position:relative;\"><a href=\"#1-application-complexibitlity\" aria-label=\"1 application complexibitlity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Application Complexibitlity:</h3>\n<p>Enterprises are rapidly moving towards a multi-cloud environment. Undoubtedly, it is a great move to do so, but it is essential to understand the challenges and risks associated with this shift.</p>\n<p>Many enterprises aren’t aware of the fact that the size, dependencies, and complexity of the applications may lead to specific challenges. And that, if not planned, could severely face the consequences of unplanned expenses and certain security risks.</p>\n<p>We suggest you take a proactive approach by planning well to overcome these challenges and risks. </p>\n<h3 id=\"2-handling-multiple-cloud-providers-and-environments\" style=\"position:relative;\"><a href=\"#2-handling-multiple-cloud-providers-and-environments\" aria-label=\"2 handling multiple cloud providers and environments permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Handling Multiple Cloud Providers and Environments</h3>\n<p>If you're running a business, you have a few different cloud providers. If you're like most businesses, you probably don't have four of them—you probably have one or two.</p>\n<p>But if you use the same self-service deployment for each provider and environment, keeping track of what's happening in each environment can be challenging. You may even accidentally expose sensitive data to the wrong audience when users log in to your application on one provider and then try to access it from another using the same credentials.</p>\n<p>This can happen because some providers store user information differently than others do. For example, some may store it as part of their <a href=\"https://blog.loginradius.com/identity/what-is-iam/\">identity management</a> system, while others store it as part of their collaboration system. </p>\n<p>If this happens, users might not realize they're logging in to a different environment because they're using the same credentials but seeing additional information depending on which provider they're accessing at any given time!</p>\n<h3 id=\"3-manual-analysis\" style=\"position:relative;\"><a href=\"#3-manual-analysis\" aria-label=\"3 manual analysis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Manual Analysis</h3>\n<p>Enterprises leveraging multi-cloud are often forced to correlate heaps of data manually from various tools across several clouds. </p>\n<p>And this is quite time-consuming. Since manually correlating a large amount of data can be overwhelming for enterprises that have chosen the cloud to streamline their processes.</p>\n<p>Here's where the problem comes in: Enterprises that rely on multiple cloud providers and environments are at risk of being unable to keep track of all their resources, which could lead to costly mistakes, security vulnerabilities, and other problems.</p>\n<h2 id=\"4-tips-to-reduce-your-cloud-bills\" style=\"position:relative;\"><a href=\"#4-tips-to-reduce-your-cloud-bills\" aria-label=\"4 tips to reduce your cloud bills permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4 Tips to Reduce Your Cloud Bills</h2>\n<p>Let’s uncover cloud cost optimization aspects and learn how to reduce your cloud bills.</p>\n<h3 id=\"1-choose-your-cloud-wisely\" style=\"position:relative;\"><a href=\"#1-choose-your-cloud-wisely\" aria-label=\"1 choose your cloud wisely permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Choose Your Cloud Wisely!</h3>\n<p>When choosing a reliable cloud architecture, most businesses aren’t sure whether they need a single-tenant cloud solution or a multi-tenant cloud.</p>\n<p>For startups and budding entrepreneurs, multi-tenant cloud deployment is the best as they need not spend much money on the services they don’t require. Instead, they just need to pay for the resources they need on shared cloud space.</p>\n<p><a href=\"https://www.loginradius.com/resource/overcome-the-nightmare-of-on-prem-deployment-move-to-cloud/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"wp-nightmare\"\n        title=\"wp-nightmare\"\n        src=\"/static/b25bb1b940ec51b981dfbb13fafcc517/e5715/wp-nightmare.png\"\n        srcset=\"/static/b25bb1b940ec51b981dfbb13fafcc517/a6d36/wp-nightmare.png 650w,\n/static/b25bb1b940ec51b981dfbb13fafcc517/e5715/wp-nightmare.png 768w,\n/static/b25bb1b940ec51b981dfbb13fafcc517/81501/wp-nightmare.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"2-analyze-unused-resources\" style=\"position:relative;\"><a href=\"#2-analyze-unused-resources\" aria-label=\"2 analyze unused resources permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Analyze Unused Resources</h3>\n<p>One of the easiest ways to begin your cloud cost optimization journey is to analyze unused resources on your cloud. Sometimes a temporary deployment over a server could be the reason for your unexpected cloud expenses. The IT administrators may deploy some temporary server and forget to turn it off.</p>\n<h3 id=\"3-use-heat-maps\" style=\"position:relative;\"><a href=\"#3-use-heat-maps\" aria-label=\"3 use heat maps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Use Heat Maps</h3>\n<p>Nothing could be as helpful as heat maps in reducing cloud storage costs. Heat maps are virtual tools that portray valleys and peaks whenever there’s a computing demand.</p>\n<p>Based on the data from heat maps, businesses can quickly analyze idle programs or storage and establish starting and stopping points to minimize overall costs.</p>\n<h3 id=\"4-choose-the-right-storage-size\" style=\"position:relative;\"><a href=\"#4-choose-the-right-storage-size\" aria-label=\"4 choose the right storage size permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Choose the Right Storage Size</h3>\n<p>Most businesses choose storage that is more excessive than their actual requirements. Hence, they must pay more for the extra storage they aren’t utilizing.</p>\n<p>It’s always a good idea to analyze your requirements and choose the cloud storage plan that meets your needs. Otherwise, you can select an <a href=\"https://www.loginradius.com/scalability/\">auto-scalable infrastructure</a> that scales with your needs, and you’re billed accordingly.</p>\n<h2 id=\"to-conclude\" style=\"position:relative;\"><a href=\"#to-conclude\" aria-label=\"to conclude permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Conclude</h2>\n<p>The multi-cloud challenge is difficult to solve without proper planning, and the same goes for enterprises. The days of putting all data in a single cloud storage facility are numbered as more firms are turning to hybrid cloud configurations. </p>\n<p>Businesses should carefully consider a number of points before moving forward: which cloud services best meet the needs of their applications? What is the solution's total cost of ownership? And will users be satisfied with that solution?</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 13, 2023","updated_date":null,"description":"Although some features of the cloud are pretty attractive, there exist some that aren’t so attractive but are add-on features that make it highly complex to manage the cloud regularly.  Let’s uncover some optimization aspects of multi-cloud environments and the challenges that can help businesses plan their cloud adoption smartly.","title":"A Lot Can Happen In The Cloud: Multi-Cloud Environment and its Optimization Challenges","tags":["multi cloud","cloud cost optimization\"","on prem"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8518518518518519,"src":"/static/2ff2a8c7df0b6ea8202b64f079ccb5d3/49b36/cloud-multi.jpg","srcSet":"/static/2ff2a8c7df0b6ea8202b64f079ccb5d3/f836f/cloud-multi.jpg 200w,\n/static/2ff2a8c7df0b6ea8202b64f079ccb5d3/2244e/cloud-multi.jpg 400w,\n/static/2ff2a8c7df0b6ea8202b64f079ccb5d3/49b36/cloud-multi.jpg 512w","sizes":"(max-width: 512px) 100vw, 512px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction The modern digital landscape is about delivering customers the best user experience at every touch point. However, it doesn’t…","fields":{"slug":"/identity/security-ux-can-coexist/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The modern digital landscape is about delivering customers the best user experience at every touch point. However, it doesn’t mean that security could be compromised while crafting the best user experiences. </p>\n<p>However, many organizations catering to clients online strongly believe that either they could deliver a great user experience or add multiple layers of security that would add more friction while users interact with their platform. </p>\n<p>So, does it mean that renowned brands that have established their business over the years aren’t concerned with the security and privacy of their customers? And do they have an excellent fortune in <a href=\"https://www.loginradius.com/security/\">safeguarding their customers’ identities</a>? </p>\n<p>Unfortunately, that is not true! </p>\n<p>Businesses have leveraged a robust customer identity and access management (CIAM) solution for years to secure customer identities and eventually deliver a seamless user experience across multiple touchpoints. </p>\n<p>Let’s figure out how a CIAM does wonders for a business while creating a perfect user experience and security harmony. </p>\n<h2 id=\"how-ciam-offers-a-great-user-experience-and-robust-security\" style=\"position:relative;\"><a href=\"#how-ciam-offers-a-great-user-experience-and-robust-security\" aria-label=\"how ciam offers a great user experience and robust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How CIAM Offers a Great User Experience and Robust Security?</h2>\n<p>With a customer identity and access management solution, businesses could leverage the true potential of <a href=\"https://www.loginradius.com/authentication/\">seamless authentication</a> in a number of ways. For example, users can sign in or sign up through their email, social media, or phone. And this gives them a seamless experience since the old-school user id password method doesn't work in today's era. </p>\n<p>On the other hand, when it comes to security, a cloud-based CIAM like LoginRadius offers MFA and RBA to ensure the highest level of customer data security, even in high-risk situations.</p>\n<p>In a nutshell, businesses need not compromise security while crafting the best user experience for their customers when they choose a reliable CIAM. </p>\n<p>Aside from playing a vital role in enhancing consumers' experience as they interact with brands, CIAM is also a seamless business enabler. The best CIAM platforms deliver seamless registration, secure consumer identity management, and control of consumer access to applications, systems, and services.</p>\n<p>Being a solution that simplifies the entire consumer experience - CIAM is now seen as a business enabler. It allows consumers to connect across devices and touchpoints in a way that suits them best.</p>\n<h2 id=\"what-if-a-business-is-already-using-a-legacy-iam-solution\" style=\"position:relative;\"><a href=\"#what-if-a-business-is-already-using-a-legacy-iam-solution\" aria-label=\"what if a business is already using a legacy iam solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What if a Business is Already Using a Legacy IAM Solution?</h2>\n<p>Many enterprises aren’t aware of the fact that most of the legacy IAM systems may support customer identity management but aren’t designed in a way to deliver security and user experience. </p>\n<p>As a result, most businesses fall prey to various data breaches leading to compromised customers’ identities and crucial business information. </p>\n<p>They have to understand that the conventional IAM systems were designed to function within an organization with a limited number of user identities. And thus, its security aspects were limited, and the user experience part was never emphasized. </p>\n<p>Hence, the one’s still relying on the conventional IAMs should immediately think about switching to a robust CIAM like LoginRadius if they wish to manage heaps of customer identities securely without compromising user experience. </p>\n<p><strong>Read More: Is Buying a CIAM Solution Better Than Building Your Own? <a href=\"https://www.loginradius.com/resource/ciam-build-vs-buy/\">Try Our Calculator</a></strong></p>\n<h2 id=\"why-choose-loginradius-ciam-for-seamless-and-secure-authentication-and-authorization\" style=\"position:relative;\"><a href=\"#why-choose-loginradius-ciam-for-seamless-and-secure-authentication-and-authorization\" aria-label=\"why choose loginradius ciam for seamless and secure authentication and authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Choose LoginRadius CIAM for Seamless and Secure Authentication and Authorization?</h2>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius' modern CIAM solution</a> is designed to be more flexible and intuitive. It addresses every subtle component that can improve consumers' experience while providing an unmatched safeguard for private data.</p>\n<p>What puts LoginRadius ahead of the curve are the three most fundamental aspects:</p>\n<ul>\n<li><strong>Seamless security:</strong> Strengthened security doesn't have to come at the cost of convenience. LoginRadius' modern CIAM solution, like MFA RBA, <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless login</a>, phone login, social login, etc., ensures there is no friction while authenticating.</li>\n<li><strong>Privacy management:</strong> Proficient privacy management is the key to winning the trust of consumers. Our new-age CIAM solution considers every subtle privacy concern related to international regulations like the GDPR and the CCPA.</li>\n<li><strong>Flawless integration:</strong> Another feature that sets LoginRadius' new-age CIAM apart from the rest is the flawless integration with modern tools that are geared to offer smooth and secure access.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>User experience plays a vital role in enhancing overall business growth in the digital landscape. However, security for customer identities and business data matters equally.</p>\n<p>Security is critical to any enterprise and an essential component of protecting data transmitted over the internet. This includes personal information such as credit card numbers and social security numbers and business data such as intellectual property or financial records.</p>\n<p>User experience is equally important to ensure users are comfortable and engaged while using your product or service. When it comes to authentication and authorization, this means being able to provide an intuitive user experience in which customers can easily sign up for an account or access their accounts on mobile devices without needing assistance from support staff members.</p>\n<p>With a new-age CIAM solution like LoginRadius CIAM, balancing security with user experience is a breeze. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 12, 2023","updated_date":null,"description":"Businesses have leveraged a robust customer identity and access management (CIAM) solution for years to secure customer identities and eventually deliver a seamless user experience across multiple touchpoints. Let’s figure out how a CIAM does wonders for a business while creating a perfect user experience and security harmony.","title":"Can Security and User Experience Co-Exist in the Authenticating and Authorizing Space?","tags":["security","user experience","customer identity"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.834862385321101,"src":"/static/041285e0d5185bcdd4190e836604b909/49b36/ux-security.jpg","srcSet":"/static/041285e0d5185bcdd4190e836604b909/f836f/ux-security.jpg 200w,\n/static/041285e0d5185bcdd4190e836604b909/2244e/ux-security.jpg 400w,\n/static/041285e0d5185bcdd4190e836604b909/49b36/ux-security.jpg 512w","sizes":"(max-width: 512px) 100vw, 512px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction CIAM migration can be challenging, but that doesn't mean it's impossible — thanks to just-in-time migrations. As part of…","fields":{"slug":"/identity/just-in-time-migrations-ciam-transitions/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>CIAM migration can be challenging, but that doesn't mean it's impossible — thanks to just-in-time migrations.</p>\n<p>As part of transitioning from an old Customer (IAM system to a new one, businesses eventually have to migrate their users from one IAM to another. </p>\n<p>Migrating several thousand users at once can be challenging for tech teams, resulting in possible errors and delayed access, which can adversely impact business operations.</p>\n<p>Just-in-time migrations are the latest buzz in the <a href=\"https://blog.loginradius.com/identity/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) industry. While most organizations still use bulk migrations, a growing segment of cloud services is implementing just-in-time (JIT).</p>\n<p>CIAM migrations as an alternative way to move users from their current IAM system to their new IAM. JIT moves one user at a time, which means that the risk of exposing personal data is minimal, and a seamless transition isn’t bothered. </p>\n<p>In a nutshell, just-in-time migrations move users one-by-one from their current IAM to a new IAM once a user logs in. This migration is entirely secure since it helps overcome the challenges of conventional bulk migrations that forces every user to create a new user id and password and eventually affect user experience.  </p>\n<h2 id=\"how-just-in-time-migrations-overcome-the-password-problems\" style=\"position:relative;\"><a href=\"#how-just-in-time-migrations-overcome-the-password-problems\" aria-label=\"how just in time migrations overcome the password problems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Just-in-Time Migrations Overcome the Password Problems?</h2>\n<p>Let's face it: <a href=\"https://blog.loginradius.com/identity/infographic-the-death-of-passwords/\">passwords are a pain</a>. They're complicated and hard to remember and take forever to enter into the right boxes.</p>\n<p>But they're also serious business when trying to migrate your databases. That's because encrypted passwords are often used as part of the security protections on your database—and when you migrate them, you increase the risk of security breaches exponentially.</p>\n<p>Undoubtedly, passwords are the problem that hinders bulk migrations since they’re encrypted for security reasons. And when these encrypted passwords are migrated, security risks increase exponentially.</p>\n<p>On the other hand, just-in-time migrations reduce password complexity as it temporarily keeps the current database in place. Whenever a user tries to log in, they are verified through orchestration, and if found authentic, they're securely migrated.</p>\n<p>Just-in-time migration is an effective solution to avoid the problem mentioned above associated with bulk migrations. Just-in-time migration is a process where sensitive information is captured only when required and then stored securely in a separate location until it's needed. </p>\n<p>This process allows organizations to impose strict controls on sensitive information access while allowing users to access their data when needed.</p>\n<h2 id=\"how-loginradius-ciam-paves-the-way-for-smooth-migrations-through-identity-import-manager\" style=\"position:relative;\"><a href=\"#how-loginradius-ciam-paves-the-way-for-smooth-migrations-through-identity-import-manager\" aria-label=\"how loginradius ciam paves the way for smooth migrations through identity import manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius CIAM Paves the Way for Smooth Migrations through Identity Import Manager?</h2>\n<p>The LoginRadius Identity Import Manager is a flexible tool that allows companies to import and manage multiple customer profile data from any different application, service, or database into the LoginRadius database via CSV files. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-identity-import-manager\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABc0lEQVQY0z2RO08CQRSFN4YILERNQHwBPhHigigou6KiKwsE0BhMDEGlMJbER2Xlo7HxjxgbTbRBKXwVhsrOxsQfoMaAhUDFcWYEJvnm3mTunHPvDKcdngGFp9hnoXMQWAywvH5O0Qz5wQsLMEoJGEaD0DoVaBxz0NimoanVcHUx03gY7WMhtDllhsGtwOSNopXk9AITJVHnUmCVUxhRkuDFFahdYfC1c1rH1d07vRHYAglYxUWYfXFYxDj0gowWYf6/AwLNLWIMXZ4wTASrL4peKQ6jO9Qw5erJEBFzR1IQiLMjmIRdXoUQSqHDE4GajEpraDSSKczE1CoRppbQPRljT9UQpJtqQMLlzT0qlQo+Pr/wXSiiUPxBqVyBspZBU58PXI8HmYNTvL694yJ7h7OrW5xf5/CYf0HuKc+eqXnQD46qq/olZB+eQddvqYxqtcqgK5LeBmeZYKbi8iYT3dg9wvrOIWNr/wTpvWPoySeqSZd/LurgGM1RIj8AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"etl-ds\"\n        title=\"etl-ds\"\n        src=\"/static/6145a82c0577f741827dd49620a87667/e5715/etl-ds.png\"\n        srcset=\"/static/6145a82c0577f741827dd49620a87667/a6d36/etl-ds.png 650w,\n/static/6145a82c0577f741827dd49620a87667/e5715/etl-ds.png 768w,\n/static/6145a82c0577f741827dd49620a87667/63ff0/etl-ds.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>With the new feature, companies can be confident about the consistency and accuracy of the imported data. Here are the LoginRadius’ identity import manager’s capabilities: </p>\n<ul>\n<li><strong>Data Migration Operation:</strong> It imports new data and updates and deletes existing data migration. It also supports automatic mapping with LoginRadius fields. </li>\n<li><strong>Data Integration:</strong> It offers a unified view with a real-time progress update and consolidated structured and unstructured data from multiple sources.</li>\n<li><strong>Data Compliance:</strong> It provides reliable <a href=\"https://www.loginradius.com/compliances-list/\">data protection capabilities</a> through alignment with the NIST SP 800-53 component. Other certifications include SOC2 Type ll, PCI DSS, ISO 27001, and 27018 with ISO 27001:2013.</li>\n<li><strong>ETL Optimization:</strong> It optimizes existing ETL processes to improve performance, reduce data points, and decrease resource usage.</li>\n<li><strong>Log File Protection:</strong> Log files can be protected with a password using the set log file password field.</li>\n<li><strong>Redundancy Verification:</strong> Redundancy is avoided using the Lookup Type, which locates the customer profile that needs to be added, modified, or deleted, to prevent duplicate profiles.</li>\n<li><strong>Data ETL Logs:</strong> It shows the history of migrated data requests and the log download links. Logs contain details such as the start date, the expiry date of downloaded files, the status of the data process, etc.</li>\n<li><strong>Flexible tools:</strong> It is equipped with state-of-the-art solutions that address the exponential growth of various data sources and is designed to work with structured and unstructured data.</li>\n</ul>\n<h2 id=\"to-conclude\" style=\"position:relative;\"><a href=\"#to-conclude\" aria-label=\"to conclude permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Conclude</h2>\n<p>Two of the most significant pain points of migrating to a CIAM are the resources required and managing multiple vendors with disparate technologies. </p>\n<p>Fortunately, there is an easier way to migrate customer data. Vendors like <a href=\"https://www.loginradius.com/\">LoginRadius</a> have developed a just-in-time migration solution that can cut costs over traditional approaches and significantly improve the customer experience. </p>\n<p>Moreover, LoginRadius provides a single unified platform for user authentication, user provisioning, and single sign-on for all applications throughout the enterprise. </p>\n<p>This dramatically reduces the number of systems and platforms involved in a migration project and eases the burden on IT teams and administrative responsibilities for end users.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 11, 2023","updated_date":null,"description":"Just-in-time migrations are the latest buzz in the customer identity and access management (CIAM) industry. While most organizations still use bulk migrations, a growing segment of cloud services is implementing just-in-time (JIT).","title":"Business On The Move: How Just-in-Time Migrations Are Making Smooth CIAM Transitions","tags":["ciam","data migration","identity import manager"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/d391259e42d970994b1abbc57e1959ec/33aa5/ciam-intime.jpg","srcSet":"/static/d391259e42d970994b1abbc57e1959ec/f836f/ciam-intime.jpg 200w,\n/static/d391259e42d970994b1abbc57e1959ec/2244e/ciam-intime.jpg 400w,\n/static/d391259e42d970994b1abbc57e1959ec/33aa5/ciam-intime.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"excerpt":"Introduction Cyber risk is one of the biggest issues facing businesses today, and it’s not going away anytime soon. As cyber security…","fields":{"slug":"/growth/cyberinsurance-2023-insurers-adapt-survive/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Cyber risk is one of the biggest issues facing businesses today, and it’s not going away anytime soon. As cyber security threats continue to evolve and grow in sophistication, so too must your approach to managing them.</p>\n<p>In this post, we’ll take a look at some of the most important takeaways from recent trends in cyber insurance, as well as how you can prepare for digital risk management in 2023.</p>\n<p>But first, a quick glance over cyber insurance.</p>\n<h2 id=\"what-is-cyber-insurance\" style=\"position:relative;\"><a href=\"#what-is-cyber-insurance\" aria-label=\"what is cyber insurance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cyber Insurance?</h2>\n<p>Cyber insurance is a type of insurance that helps protect businesses from the financial risks associated with online business. It's often called cyber liability insurance or cybersecurity insurance.</p>\n<p>The goal of <a href=\"https://blog.loginradius.com/identity/cyber-insurance-guide-2022/\">cybersecurity insurance</a> is to transfer some of the risks to the insurer. Businesses can purchase cybersecurity insurance for a monthly or quarterly fee, and they get certain protections in exchange. For example, they might get reimbursement for expenses related to a data breach if they can prove that the breach was not their fault.</p>\n<p>Businesses can also purchase insurance against specific types of losses, such as those related to ransomware attacks, denial-of-service attacks (DoS), or website defacement/hacking incidents.</p>\n<h2 id=\"how-will-cyber-insurance-evolve-in-2023\" style=\"position:relative;\"><a href=\"#how-will-cyber-insurance-evolve-in-2023\" aria-label=\"how will cyber insurance evolve in 2023 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Will Cyber Insurance Evolve in 2023?</h2>\n<p>The cyber insurance industry is expected to see some interesting changes in 2023. Some of these trends are already underway and others will accelerate soon. </p>\n<h3 id=\"1-cyber-insurance-is-still-new\" style=\"position:relative;\"><a href=\"#1-cyber-insurance-is-still-new\" aria-label=\"1 cyber insurance is still new permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Cyber insurance is still new.</h3>\n<p>The cyber insurance industry is still in its infancy, and many changes are yet to happen. Many of the current trends will evolve and develop over the coming years, whilst some completely new trends will emerge. The cyber insurance industry is a dynamic one that is constantly evolving, so it’s important to stay up-to-date with developments in order to understand how best to position your company or product in this market.</p>\n<h3 id=\"2-the-role-of-third-party-insurers-will-change\" style=\"position:relative;\"><a href=\"#2-the-role-of-third-party-insurers-will-change\" aria-label=\"2 the role of third party insurers will change permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. The role of third-party insurers will change.</h3>\n<p>Third-party insurers are likely to play a more significant role in this market as they take on more responsibilities and provide a wider range of services than previously seen. They will also adopt different business models depending on the type of risk they are insuring, so it’s important that you know who your insurer is and what they provide before signing up for insurance coverage.</p>\n<h3 id=\"3-cyber-insurance-will-become-more-accessible\" style=\"position:relative;\"><a href=\"#3-cyber-insurance-will-become-more-accessible\" aria-label=\"3 cyber insurance will become more accessible permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cyber insurance will become more accessible.</h3>\n<p>The cost of cyber insurance will continue falling as more people purchase cyber insurance policies at lower premiums than ever before due to competition between insurers fighting for market share within this growing sector. </p>\n<h3 id=\"4-stabilization-of-rates-and-underwriting-disciplines-will-continue\" style=\"position:relative;\"><a href=\"#4-stabilization-of-rates-and-underwriting-disciplines-will-continue\" aria-label=\"4 stabilization of rates and underwriting disciplines will continue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Stabilization of rates and underwriting disciplines will continue.</h3>\n<p>The cyber market has seen two trends over the last few years, both of which have had a major impact on underwriters: compound rates have increased and standards have become much stricter. As insurers struggle to deal with the growing range of ransomware threats, both trends have emerged as a response to increasing loss ratios.</p>\n<p>The effects of rate changes are beginning to take hold, and loss ratios are flattening out. New entrants are increasing as a result, which will bring competitive pressures on rates. As a result, rates are expected to stay flat or decline over the next 12 months.</p>\n<h3 id=\"5-regulators-will-focus-more-on-systemic-risk\" style=\"position:relative;\"><a href=\"#5-regulators-will-focus-more-on-systemic-risk\" aria-label=\"5 regulators will focus more on systemic risk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Regulators will focus more on systemic risk.</h3>\n<p>In order for the cyber insurance industry to be long-term stable, it must assess catastrophe risks as part of the components of cyber insurance pricing. This means that regulators will increase their attention on systemic cyber risks in 2023.</p>\n<h2 id=\"proactive-steps-to-take-to-maintain-cyber-insurance-renewals\" style=\"position:relative;\"><a href=\"#proactive-steps-to-take-to-maintain-cyber-insurance-renewals\" aria-label=\"proactive steps to take to maintain cyber insurance renewals permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Proactive Steps To Take To Maintain Cyber Insurance Renewals</h2>\n<p>When it comes to cyber insurance renewals, here are a few things insurers will want to see from you:</p>\n<h3 id=\"1-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#1-multi-factor-authentication\" aria-label=\"1 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Multi-factor authentication</h3>\n<p>Multi-factor authentication protection on all remote access to your network, including any remote desktop protocol connections, email server, cloud services, and backup data solutions. Ensure that all network administrator accounts and any other user accounts with elevated permissions have multi-factor authentication protection.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABkklEQVQY0zWQyy9jYRjGTwQ9vYlQpTrViJ7T0lZIpeq0TqN1mWSmBAuKxCVCIqQrEqEiqUjM7GYjwcaKjQUWkxmJhZmNlZ2NZP6V33znHBZPvuR7n/e5vJJdzeBS01SVT4me/eViYpfVVp363ApSewG3msMu5gZPDmk4onk8qUkau/PYY8PIkSyykkY25gKSQXQoGt6dH/gq9ywnF0koWRKfUsj+EdzhvCBqlqDgOeMjBIZmiQ7P4EhOYYuPiv13Q/FKspLBKRLUrVWQisdIsRmkYJ6GwCS1vgKukG65C7IzohPo/4K/7zNNvaP4E2MEU19pEGnld1FT0Kji3fpO1/4lkaUT/EMlGmNFatwaro5B7OGMSa7t0MzltoECASFkoEWIm5U/BK3KabxrRyjb56jFQ5rT63jC0zg9WepEfVenjuTrYbP8jde3f9z8fOTq9hfXd795en7h4c8z9fGcaWgJGpXEcatVnepQBptIbQsZ/4M4whaqgkn6x5fY2DthvlRmbmvfxMp2hYXSgWlqE8H+AywzymSbMN5UAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-MFA\"\n        title=\"EB-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"2-endpoint-security\" style=\"position:relative;\"><a href=\"#2-endpoint-security\" aria-label=\"2 endpoint security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Endpoint security</h3>\n<p>Cyber adversaries will target vulnerable endpoints regardless of a company’s size or sector. Don’t make the mistake of thinking your organization is too small to be noticed. Endpoint solutions provide businesses with the tools to identify more threats, enforce compliance and protect company policies, ultimately reducing the cost of potential attacks.</p>\n<h3 id=\"3-disaster-recovery-plan\" style=\"position:relative;\"><a href=\"#3-disaster-recovery-plan\" aria-label=\"3 disaster recovery plan permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Disaster recovery plan</h3>\n<p>Backup and <a href=\"https://blog.loginradius.com/identity/prevent-accidental-data-exposure-company/\">disaster recovery solutions</a> can provide peace of mind by ensuring that your data is never lost, damaged, or corrupted. In case of a widespread ransomware attack, your network's backups should be tested frequently and ideally be capable of restoring essential functions within 24 hours. All backups must be encrypted, and it is recommended there be at least three backups created and stored separately—ideally, two physically and one on the cloud.</p>\n<h3 id=\"4-employee-awareness-training\" style=\"position:relative;\"><a href=\"#4-employee-awareness-training\" aria-label=\"4 employee awareness training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Employee awareness training</h3>\n<p>Empower your employees to be part of your security solution by offering them a <a href=\"https://blog.loginradius.com/growth/7-tips-enjoy-cybersecurity-awareness-month/\">Security Awareness Training</a> program. To ensure that your data is secure, train your staff to take daily security measures, such as creating strong passwords and reporting phishing scams immediately.</p>\n<p>Research indicates that a great majority of company data breaches are caused by human error. A security awareness training program can help employees understand the value of protecting PII, IP, money, and a company’s brand reputation.</p>\n<h3 id=\"5-email-filtering-solution\" style=\"position:relative;\"><a href=\"#5-email-filtering-solution\" aria-label=\"5 email filtering solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Email filtering solution</h3>\n<p>One of the biggest challenges in fighting cybercrime is the ability to identify malicious code in emails. An email filtering solution helps protect your organization from phishing attempts, zero-day attacks, and other malicious attachments. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>The insurance industry is already undergoing an astonishing amount of change. New businesses are emerging, carriers are adapting, and technologies are being developed to cover the loss of physical and tangible assets. </p>\n<p>As cyber security threats continue to grow and evolve into a full-blown crisis, the insurance industry will come even closer together to combat these dangers. But we can only solve today's problems if we maintain a mass-adoption mindset and continually innovate to keep up with tomorrow's challenges. </p>\n<p>In 2023, we will have many more concrete innovations, propelling the insurance industry into a better place than it ever has before. This will put them in a prime position to meet the challenges of tomorrow with agility, not uncertainty.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 06, 2023","updated_date":null,"description":"As cyber risks continue to evolve and increase, it is no surprise that cyber insurance is becoming one of the fastest-growing insurance products in the market. Learn how it will shape the security space in 2023.","title":"Cyber Insurance in 2023: Takeaways For The Future And How To Prepare For It","tags":["cybersecurity","cyberinsurance","risk management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4492753623188406,"src":"/static/d64666c9950a54c3537d6023351e1326/33aa5/cyber-insurance.jpg","srcSet":"/static/d64666c9950a54c3537d6023351e1326/f836f/cyber-insurance.jpg 200w,\n/static/d64666c9950a54c3537d6023351e1326/2244e/cyber-insurance.jpg 400w,\n/static/d64666c9950a54c3537d6023351e1326/33aa5/cyber-insurance.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":168,"currentPage":29,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}