{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/34","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction With the changing cybersecurity landscape and increasing threat vectors, businesses are now more concerned about the severity…","fields":{"slug":"/identity/what-is-mitre-att-ck-framework/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With the changing cybersecurity landscape and increasing threat vectors, businesses are now more concerned about the severity of attacks.</p>\n<p>Whether we talk about incorporating <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/\">cybersecurity best practices</a> or spreading employee awareness regarding new vulnerabilities, most businesses are already putting their best efforts into mitigating the risks. </p>\n<p>However, if a business can describe and categorize diverse behaviors of cybercriminals based on specific observations, it can be helpful for various defensive measures. And here’s where the critical role of MITRE ATT&#x26;CK comes into play. </p>\n<p>Introduced in 2013 by MITRE, the ATT&#x26;CK (Adversarial Tactics, Techniques &#x26; Common Knowledge) is a way to describe adversarial behaviors expressed in matrices. </p>\n<p>The matrices contain different techniques and tactics associated with the usual behavior of attackers before they try to sneak into a network. </p>\n<p>In a nutshell, the MITRE ATT&#x26;CK framework could be defined as the collection of cybercriminal goals and techniques, which can be leveraged to understand the treat vectors and minimize the loss. </p>\n<h2 id=\"how-to-use-mitre-attck\" style=\"position:relative;\"><a href=\"#how-to-use-mitre-attck\" aria-label=\"how to use mitre attck permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Use MITRE ATT&#x26;CK?</h2>\n<p>ATT&#x26;CK is a foundational framework for cyber defenders. The taxonomy is used for threat modeling and defensive activities such as intrusion detection, investigation, and containment. </p>\n<p>Wherever you see attackers or their behaviors in your organization’s environment, you can apply the ATT&#x26;CK framework to help limit their impact.</p>\n<p><strong>Attacker Tactics</strong>, <strong>Techniques</strong>, <strong>and</strong> <strong>Common Knowledge</strong> (ATT&#x26;CK) provides a structured, everyday language that can be used across the security ecosystem to communicate about cyber attacks. </p>\n<p>By mapping defensive controls against ATT&#x26;CK, the organization can better understand its current state of play regarding defenses and gaps. An organization can map its defensive controls to ATT&#x26;CK to identify various threat vectors and areas that can be compromised if its network is on the radar of cybercriminals. </p>\n<p>ATT&#x26;CK is a helpful way to map security controls to threat actor behaviors, but it can be dangerous if used alone. It is a great starting point for mapping controls but should be considered when determining which rules should be implemented. </p>\n<p>Many of the ATT&#x26;CK techniques are performed in multiple ways, so trying to apply a single method of detection may not necessarily prevent all variations of the technique.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-trade-zone-threats-cybersecurity-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABfUlEQVQY01WQO0/bUBiGnUgQG+ciSggKwSERSWwghghKEjvYgRCaQiqgYqi4DFTdQIiJicvSqf0hSCxIVQcECxJTu7CxMPBXHo5NADE8+s7l0/O950hKYRaPHoFqOIQNV+D4qLrDy72HnLPpGV8gXv1K3+QCSrGJbNSR8zXkTo/ky3SXWHYUeSBJ8EM/AUF3f5JYOkfUsF+blbyNajZJNzYYa35DrawTMlvivPY8UFTpZaEVp5myqkxULUqOS6qgEwxHiRYqQugQEun6JptolTaD0y2SH5fQZj6Tsb6QKi+/F3rN2Smb+tIyVquNMf+JjFmiK54gIoSK9/ROinhpkSEhzdZWhajtyyJjdUKde8mzquLflLSONJhBSuWR4qImcwQGNKJ6lfDonNiX2Dv5zf3DIxeXN5z9ueL87zW3/++4vv1Hr9mge8R+E8qZcaQRk1hjncTad0LuGgGtIISWnzA4XKayssPu0S+2Dk7Y3D/2+XH4k+2DUzHU9VM+AQ7uvqsQ2iiRAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Dig-Trade-Zone\"\n        title=\"WP-Dig-Trade-Zone\"\n        src=\"/static/b345c95b262e355d5e3f3a7d99d71e2b/e5715/WP-Dig-Trade-Zone.png\"\n        srcset=\"/static/b345c95b262e355d5e3f3a7d99d71e2b/a6d36/WP-Dig-Trade-Zone.png 650w,\n/static/b345c95b262e355d5e3f3a7d99d71e2b/e5715/WP-Dig-Trade-Zone.png 768w,\n/static/b345c95b262e355d5e3f3a7d99d71e2b/81501/WP-Dig-Trade-Zone.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"using-attck-with-cyber-threat-intelligence\" style=\"position:relative;\"><a href=\"#using-attck-with-cyber-threat-intelligence\" aria-label=\"using attck with cyber threat intelligence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Using ATT&#x26;CK With Cyber Threat Intelligence</h2>\n<p>Advanced Threat Tactics &#x26; Techniques (ATT&#x26;CK) is a framework for understanding adversarial behavior and can be useful to cyber threat intelligence. </p>\n<p>ATT&#x26;CK can track actors by their known behaviors, allowing defenders to apply operational controls in areas where they have weaknesses against their threat actors and strengthen those controls where there are no identified issues. </p>\n<p>ATT&#x26;CK is also available as a STIX/TAXII 2.0 feed, making it easy to ingest into existing tools that support those technologies.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Organizations that are concerned about their cybersecurity hygiene shouldn’t ignore the true potential of ATT&#x26;CK to identify threat vectors and alter their cybersecurity posture accordingly. </p>\n<p>Globally, brands are using this framework to analyze cybersecurity vulnerabilities and to create adequate action plans for robust security. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 28, 2022","updated_date":null,"description":"Introduced in 2013 by MITRE, the ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is a way to describe adversarial behaviors expressed in matrices. The matrices contain different techniques and tactics associated with the usual behavior of attackers before they try to sneak into a network.","title":"Understanding MITRE ATT&CK Framework?","tags":["mitre attack","cyberattack","cybersecurity"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/d515a97d08a87602f5a88de7c3eb2486/33aa5/mitre.jpg","srcSet":"/static/d515a97d08a87602f5a88de7c3eb2486/f836f/mitre.jpg 200w,\n/static/d515a97d08a87602f5a88de7c3eb2486/2244e/mitre.jpg 400w,\n/static/d515a97d08a87602f5a88de7c3eb2486/33aa5/mitre.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction It’s no secret that identity management has been a challenge for businesses. With the increase in the number of devices and…","fields":{"slug":"/identity/difference-between-identity-fabrics-zero-trust/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>It’s no secret that <a href=\"https://www.loginradius.com/blog/identity/identity-management-in-cloud-computing/\">identity management</a> has been a challenge for businesses. With the increase in the number of devices and services that need to be accessed, it’s become increasingly difficult to manage user identities and maintain security.</p>\n<p>Although there are several options available to address this issue, two competing models are gaining traction: Zero Trust and Identity Fabric.</p>\n<p>While these two approaches may seem similar on the surface, they are quite different in their approach to securing your network, and each may be better suited for different environments.</p>\n<p>In this article, we'll examine how Zero Trust and Identity Fabric work, and which is right for your organization.</p>\n<h2 id=\"what-is-identity-fabric\" style=\"position:relative;\"><a href=\"#what-is-identity-fabric\" aria-label=\"what is identity fabric permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Fabric?</h2>\n<p>An Identity Fabric is a centralized system that allows you to share information about employees and other stakeholders across your organization. It's essentially a way to make sure that the information you use to make decisions is accurate and consistent, but it also means that if that data source gets compromised, all of your applications are vulnerable.</p>\n<p>Identity fabrics is designed to offer a new approach to security by providing a more efficient way to protect information at the application layer. It can be applied at several levels, that include:</p>\n<ul>\n<li>At the edge, where the Identity Fabric sits between the perimeter firewall and your servers or applications, protecting against threats that try to bypass perimeter defenses.</li>\n<li>In the data center itself, where it sits between your servers or applications and network traffic from outside sources such as customers or partners</li>\n<li>In addition, identity fabrics are also deployed as part of an overall strategy that also includes other types of controls such as encryption and tokenization.</li>\n</ul>\n<h2 id=\"what-is-zero-trust\" style=\"position:relative;\"><a href=\"#what-is-zero-trust\" aria-label=\"what is zero trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Zero Trust?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/beginners-guide-zero-trust-security/\">Zero Trust</a> is an approach to security in which every interaction between two parties must be authenticated and authorized. This means no one has access to any data unless they've been granted permission by an administrator—and even then, only the parts of it they're allowed access to. </p>\n<p>Zero Trust works well for organizations that want to ensure their sensitive information isn't vulnerable when it leaves their servers—but it can be challenging to implement on a large scale.</p>\n<p>By using the Zero Trust strategy, you:</p>\n<ul>\n<li>Reduce business and organizational risks</li>\n<li>Gain control over cloud and container environments</li>\n<li>Reduce the risk of a data breach by creating perimeters around sensitive data</li>\n<li>Inspect users and devices for authentication, and permissions are assessed before any trust is gained.</li>\n</ul>\n<h2 id=\"what-are-the-critical-differences-between-identity-fabric-and-zero-trust\" style=\"position:relative;\"><a href=\"#what-are-the-critical-differences-between-identity-fabric-and-zero-trust\" aria-label=\"what are the critical differences between identity fabric and zero trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Critical Differences Between Identity Fabric and Zero Trust?</h2>\n<table>\n  <tr>\n   <td><strong>Identity Fabric</strong>\n   </td>\n   <td><strong>Zero Trust</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is a term used to describe the composition of an individual’s identity, which could be any one or combination of things such as a username, a password, an email address, a phone number, etc.\n   </td>\n   <td>Zero Trust focuses on establishing an explicit trust relationship between two parties by requiring credentials (i.e., credentials are required to access data).\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is used at the application layer within a network, and it can be deployed on top of existing authentication technologies such as Active Directory or LDAP.\n   </td>\n   <td>Zero Trust applies to the entire organization’s infrastructure and can be implemented without modifying existing applications or systems.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is based on user behavior analytics that uses machine learning techniques to identify anomalies in user behavior which can then be used for authorization decisions.\n   </td>\n   <td>Zero Trust uses <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive access control</a> policies that are designed by human analysts who evaluate risk factors such as location, device type and other attributes associated with each user session before granting access rights.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric provides automatic user provisioning, so you don't have to manually create and maintain new users on your network.\n   </td>\n   <td>Zero Trust requires manual management of user accounts, which increases the workload of your IT team and may cause security vulnerabilities if not done correctly.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric offers end-to-end encryption at rest and in transit for all data stored within its platform—including sensitive information like SSNs—ensuring that no one can access it without proper authorization (i.e., through an encrypted key).\n   </td>\n   <td>Zero Trust does not offer this type of encryption for all data stored within its platform—only critical data, such as credit card numbers, are encrypted at rest.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric doesn't take that into account when determining how to enforce policies.\n   </td>\n   <td>Zero Trust is designed with the idea that users will be able to access multiple systems on a single device.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is less secure because the federated model can be compromised by hackers.\n   </td>\n   <td>Zero Trust is more secure than Identity Fabric because every interaction is governed by a policy that establishes what actions are allowed for specific users based on their role within the organization and their location at any given time (on or off premises).\n   </td>\n  </tr>\n</table>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABqElEQVQY0z2R20tUURTGD1p5zpnTMKCRtyRv42V0vNKZi6WOM0zghVHE0GIYDEQKHZDqwdSKHirBDJ+CEEGRDCR0IrwhCaKoUMxbL4F/yq81c7KHDzZ7re+3vr22ojlbSEmvbMVW3Y5R3Yatqg1DZJO7i3pKapkP3RUgx9NLtrsDrSaIKj1quR/1X4+ShpX7cAzPoT3bIHNkmczoJ9SBBeyRN9gbegTktaBiNGpDFAUGcQXvoZt9qO4wutNvDZS6Yk32UvRkCffHX7jeHVDxYourD1dQut9jb4xI3SPNLeTUBclvvkt+U5hr9SEKmsPkyfl6YxhbxW0LmIqqC1CPL6LN/0Sb2UedSHA5JkkjH7A39aKlE1oGXYyFZieFtzq54enCURvgSqn3/1rSCTXZTf/sF1oX9nHPHXBz/oyMyV2U0TUMcwDD6UPJa+Dx9Cy//5zzdesHnzd3WEvscniWZO/wFEeNgIWj6AK8VOpj+/s3jrcTrCSOeLV+QujlKoOrSXIDUbJKTDKKPZg9MR49f8v9+DRDY1MMjU8x/PQ1D+Iz8ol3yJIX/AWAmtsQou9SjQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Zero-Trust-Security-1\"\n        title=\"WP-Zero-Trust-Security-1\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-Zero-Trust-Security-1.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-Zero-Trust-Security-1.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-Zero-Trust-Security-1.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-Zero-Trust-Security-1.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"identity-fabric-vs-zero-trust-which-is-better\" style=\"position:relative;\"><a href=\"#identity-fabric-vs-zero-trust-which-is-better\" aria-label=\"identity fabric vs zero trust which is better permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Fabric vs Zero Trust: Which is Better?</h2>\n<p>The short answer to choosing identity fabrics vs zero trust totally depends on businesses.</p>\n<p>Identity Fabric is a platform that manages user identities across multiple cloud services so users can access them with a single username and password. An Identity Fabric architecture helps manage identity-related tasks like authentication, access control, and integration. </p>\n<p>Zero Trust is an access control model where users are only granted access when they prove they should have it—and not before. Who you are, where you are coming from, and your permission to access a resource are the basis of a Zero Trust strategy.</p>\n<p>Therefore, both identity fabric and zero trust are two different ways of managing business resources, one focusing on identity and the other on data. The debate over which is better has been going on for years, but the reality is that both have strengths and weaknesses, so no single solution is suitable for every organization.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 27, 2022","updated_date":null,"description":"Identity fabric and zero trust are two different ways of managing business resources, one focusing on identity and the other on data. This blog will help you understand the difference between the two approaches and their benefits for your organization's security strategy.","title":"Identity Fabric vs. Zero Trust: Is One a Better Alternative Than The Other?","tags":["identity fabric","zero trust","identity management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/9bc6fdc6e479afff0266bb2f61407c59/33aa5/id-fabrics.jpg","srcSet":"/static/9bc6fdc6e479afff0266bb2f61407c59/f836f/id-fabrics.jpg 200w,\n/static/9bc6fdc6e479afff0266bb2f61407c59/2244e/id-fabrics.jpg 400w,\n/static/9bc6fdc6e479afff0266bb2f61407c59/33aa5/id-fabrics.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction We’re all surrounded by an invisible aura of numerous interconnected devices consistently improving our lifestyles.   However…","fields":{"slug":"/identity/role-of-ciam-in-iot-security/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We’re all surrounded by an invisible aura of numerous interconnected devices consistently improving our lifestyles.  </p>\n<p>However, when we see things through the lens of information security experts, the IoT landscape is one of the most vulnerable networks on cybercriminals' radar. </p>\n<p>In a network, more often than not, IoT devices exchange data for a specific purpose. It could be in emails or transferred files, or even instructions and commands exchanged between connected devices. </p>\n<p>And to facilitate this communication between devices and carry out their required instructions, the network's different components need to recognize each other and <a href=\"https://www.loginradius.com/provisioning/\">authorize access</a>. Also, they need to detect any attempt at unauthorized access or malicious intrusion by hackers trying to steal personal information such as credit card details, user identities, or traffic data.</p>\n<p>Hence, <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity &#x26; access management</a> (CIAM) has become a necessary component of infrastructure protection and services because of the increasing malware attacks on connected IoT devices. </p>\n<p>You might have read about high-profile security breaches involving millions of internet-connected devices. And with this increase in IoT security concerns,  a CIAM has become a necessary component of infrastructure protection and services because of the growing malware attacks. </p>\n<p>Let’s understand how a CIAM helps IoT networks and devices offer a seamless and secure experience. </p>\n<h2 id=\"understanding-the-risks-of-internet-of-things\" style=\"position:relative;\"><a href=\"#understanding-the-risks-of-internet-of-things\" aria-label=\"understanding the risks of internet of things permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding The Risks of Internet-Of-Things</h2>\n<p>The IoT landscape is quite vulnerable to various security threats. Many times cybercriminals gain access to user accounts by bypassing poor authentication mechanisms. </p>\n<p>The physical devices are connected to the internet and can be controlled remotely from a web browser or another application. Here, we only include devices that users directly use, not those used for communications between machines. </p>\n<p>There are huge security risks well documented in the cyber world that affect various interconnected systems and networked things—the corresponding set of IoT devices forms networks or groups to complete tasks. The internet of things landscape is vulnerable to several security threats due to poor authentication implementation, insufficient isolation, lack of data encryption, insecure remote access protocols, weak configuration management, etc.</p>\n<p>And what’s worrisome is the fact that the <a href=\"https://www.loginradius.com/blog/identity/rise-of-machine-identity-m2m-authorization-role/\">machine-to-machine communication</a> and authentication in the IoT landscape isn’t secure and can be easily compromised by cybercriminals. Hence, a more robust authentication is required, and brands can’t rely on conventional methods.</p>\n<p><a href=\"https://www.loginradius.com/resource/ciam-in-iot-security-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABkklEQVQY002O30tTARTHF8Pt3jtX4nXWLC/Sbm7pdGJl6u62nEMbM3/MH6NfRpEvscoMVjS2iBRW0J567y18EWIg+QOEPdVTT7300N/y8eyW1sOHA+d7zucch9pt8YcomuAJWjbNoZhd/+UWijmK1ptEH55Fj4yjhlMooQTqhShKIxccjUEtGKezux+j0+CsoPvacXlO4dVP4zWHZDB2LPSIxEjepCeVQxvK4u6bsPvq/0K3GSUxkeHerRxLC1mmM2nMLgO38wTe84MoclCRL7RgDL0/if/SJP7L1zkndAjenoSdq0dCl1yYWbxN4fkaT/KPmZuewudrxeyLoIdjMmzZCydlsX1wko4raYyRG/ilnhFh20DKzhvYwqbACOVKlU8fq1TLL3nz6gUP0ha5+VlaI2N4QnEc/gEeFd/x89dvtr4e8PnLDpu1Perff7Bb/0ZLeAxXYPTvhyIsvq2wtpzlw8YGtdo2+5VV1lcWCF6bsw86u64yPHOffOk9d1fL3HlaEso8LKyz/Ow1zRfjuOXDQ01VztyQkOVaAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ciam-paradox-wp\"\n        title=\"ciam-paradox-wp\"\n        src=\"/static/7f3f1450d602812a63990e5790ae6ebc/e5715/ciam-paradox-wp.png\"\n        srcset=\"/static/7f3f1450d602812a63990e5790ae6ebc/a6d36/ciam-paradox-wp.png 650w,\n/static/7f3f1450d602812a63990e5790ae6ebc/e5715/ciam-paradox-wp.png 768w,\n/static/7f3f1450d602812a63990e5790ae6ebc/63ff0/ciam-paradox-wp.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Here’s where the critical role of a reliable CIAM comes into play. Let’s understand how CIAM paves the way for a secure IoT environment. </p>\n<h2 id=\"how-ciam-is-securing-the-internet-of-things\" style=\"position:relative;\"><a href=\"#how-ciam-is-securing-the-internet-of-things\" aria-label=\"how ciam is securing the internet of things permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How CIAM is Securing the Internet of Things?</h2>\n<h3 id=\"1-secure-machine-to-machine-communication\" style=\"position:relative;\"><a href=\"#1-secure-machine-to-machine-communication\" aria-label=\"1 secure machine to machine communication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Secure machine-to-machine communication</h3>\n<p>One of the most significant advantages of leveraging a CIAM solution for IoT networks is that it ensures seamless, secure, and quick authentication between multiple apps, devices, and humans. </p>\n<p>Once a CIAM is incorporated into an IoT system, it reinforces authentication through multi-factor authentication and risk-based authentication, even between apps and machines. </p>\n<p>Hence, businesses developing IoT devices and applications or serving as IoT vendors can ensure their overall security posture once they incorporate CIAM. </p>\n<h3 id=\"2-compliance-with-data-privacy-and-security-regulations\" style=\"position:relative;\"><a href=\"#2-compliance-with-data-privacy-and-security-regulations\" aria-label=\"2 compliance with data privacy and security regulations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Compliance with data privacy and security regulations</h3>\n<p>Another benefit of incorporating a CIAM for your IoT applications/devices is compliance with data and privacy regulations, including the GDPR and CCPA. </p>\n<p>Most businesses dealing in the IoT landscape aren’t aware of the basic regulations and privacy laws they must comply with. And this could be pretty fatal, mainly when they collect a vast amount of customer details. </p>\n<p>With a reliable CIAM, businesses need not worry about compliance since cloud-based CIAMs like <a href=\"https://www.loginradius.com/compliances/\">LoginRadius offer compliance</a> with CCPA, GDPR, and other regulations. </p>\n<p>Organizations need to incorporate the CIAM and forget the rest, as it helps secure billions of identities, including that of humans and machines. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>While businesses offer users a great experience and convenience, ignoring the security aspects could be the worst. </p>\n<p>Businesses need to understand that IoT environments are always on the radar of cybercriminals, and a little loophole could cause financial and reputational losses.  And getting a CIAM is the best way to ensure secure and seamless authentication and authorization that mitigates security risks up to a great extent. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 27, 2022","updated_date":null,"description":"Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies.","title":"The Role of Customer Identity Management in IoT Security: How It's a Must!","tags":["ciam","iot security","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.0408163265306123,"src":"/static/868ebfd69ded36420ef3f2d58655ef3f/33aa5/iot-ciam.jpg","srcSet":"/static/868ebfd69ded36420ef3f2d58655ef3f/f836f/iot-ciam.jpg 200w,\n/static/868ebfd69ded36420ef3f2d58655ef3f/2244e/iot-ciam.jpg 400w,\n/static/868ebfd69ded36420ef3f2d58655ef3f/33aa5/iot-ciam.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Digital identities have become an indispensable part of the modern digital lifestyle, and businesses have started seeing…","fields":{"slug":"/growth/identity-management-critical-revenue-generation/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Digital identities have become an indispensable part of the modern digital lifestyle, and businesses have started seeing identity management for revenue generation.</p>\n<p>Today, we use our digital identities more than physical ones. Take for everyday instances like, you’re always asked to present your digital identity proof when booking a flight or a movie ticket. </p>\n<p>And organizations collecting heaps of user data couldn’t afford to leave a single potential customer just because they couldn’t cater it with the services/products they were looking for. </p>\n<p>Besides this, organizations consider <a href=\"https://www.loginradius.com/blog/identity/digital-identity-management/\">digital identity management</a> a crucial aspect of compliance and customer identity security.</p>\n<p>Undoubtedly, compliance management and identity security are essential aspects of identity management, but we can’t ignore the true potential of digital identity management in fostering overall business growth. </p>\n<p>Modern businesses quickly realize that leveraging digital identities as fuel for driving their organizational growth through personalization and robust identity security is becoming the need of the hour. </p>\n<p>Let’s look at some aspects depicting how identity management paves the way for organizational growth. </p>\n<h2 id=\"building-personalized-customer-journeys-with-identity-management\" style=\"position:relative;\"><a href=\"#building-personalized-customer-journeys-with-identity-management\" aria-label=\"building personalized customer journeys with identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Building Personalized Customer Journeys with Identity Management</h2>\n<p>It has been observed that the more personalization a website can offer, the more likely you are to convert your visitors into customers. And, with identity management, it's easy to get that level of personalization.</p>\n<p>In the past, many companies used to rely on manual processes to <a href=\"https://www.loginradius.com/profile-management/\">manage their customer</a> data. This led to many problems, like slow response times and inaccurate information.</p>\n<p>Identity management helps improve this situation by automating the entire process of managing customer data and providing accurate information at an affordable cost.</p>\n<p>Whether a product suggestion or a service demo, personalization experiences are always way better than anything that generates quality leads that further convert.</p>\n<p>Your users always expect personalization from the moment they interact with your platform. This means when your potential customers land on your website/app; they must be catered to the right thing at the right spot. </p>\n<p>With a customer identity and access management (CIAM) solution for identity management, organizations can ensure they remain ahead of their competitors by leveraging the true potential of personalization. </p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-Mod-Cust-Id\"\n        title=\"EB-GD-to-Mod-Cust-Id\"\n        src=\"/static/e8ca49370e6ab28514cbd05ef77951af/e5715/EB-GD-to-Mod-Cust-Id.png\"\n        srcset=\"/static/e8ca49370e6ab28514cbd05ef77951af/a6d36/EB-GD-to-Mod-Cust-Id.png 650w,\n/static/e8ca49370e6ab28514cbd05ef77951af/e5715/EB-GD-to-Mod-Cust-Id.png 768w,\n/static/e8ca49370e6ab28514cbd05ef77951af/81501/EB-GD-to-Mod-Cust-Id.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>As a brand, one could utilize customer-related details in a way that helps automatically generate suggestions based on a user’s interest and past behavior on your platform. This means you have a greater chance of lead generation and conversion. </p>\n<h2 id=\"rich-customer-experience-to-cement-long-lasting-relationships\" style=\"position:relative;\"><a href=\"#rich-customer-experience-to-cement-long-lasting-relationships\" aria-label=\"rich customer experience to cement long lasting relationships permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Rich Customer Experience to Cement Long-lasting Relationships</h2>\n<p>In the world of business, identity management is not just about compliance. It's about ensuring your customers have a great experience interacting with your brand.</p>\n<p>This makes sense when you think about it: people want to feel like they're being treated as individuals, not just numbers. They want to feel valued, respected, and understood—and that's exactly what identity management provides.</p>\n<p>With so much competition in the market today, ensuring your site offers all of the latest features to keep up with competitors is essential. With an identity management solution, you'll be able to provide your customers with an experience they won't forget—and one they'll want to come back for again and again!</p>\n<p>When managing people's identities, you're creating an environment where they feel safe and welcome and where they can feel good about <a href=\"https://www.loginradius.com/blog/growth/consumer-management-to-consumer-engagement/\">engaging with your brand</a>.</p>\n<p>It's also crucial to ensure that your customers' experience with your brand is personalized and consistent—and that they feel like they're talking to a person rather than a company.</p>\n<h2 id=\"identity-management-as-a-pillar-of-privacy\" style=\"position:relative;\"><a href=\"#identity-management-as-a-pillar-of-privacy\" aria-label=\"identity management as a pillar of privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Management as a Pillar of Privacy</h2>\n<p>Today's modern users are concerned about their privacy and data security. They don't want to share their personal information with anyone, including businesses they transact with. This is because they know that the data they share can be used to track them, leading to unwanted consequences like identity theft or spamming.</p>\n<p>The solution? Identity management!</p>\n<p>Identity management ensures that customer data is collected gradually over time through progressive profiling. This means customers aren’t bombarded with long registration forms when interacting with the brand. </p>\n<p>Also, with identity management, a platform complies with various <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">data and privacy regulations</a>, including the GDPR and CCPA. These regulations ensure customer data is collected, managed, and stored securely. And hence, increasing customer loyalty and trust. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Identity management is a critical part of the revenue generation process. In today's modern world, where users are concerned about their privacy and data security, it's more important than ever to keep up with identity management best practices.</p>\n<p>A modern CIAM solution can help you manage your customers' information, enhance user experience, and ensures you build better-personalized experiences to convert your targetted audience into customers. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 17, 2022","updated_date":null,"description":"Modern businesses quickly realize that leveraging digital identities as fuel for driving their organizational growth through personalization and robust identity security is becoming the need of the hour. This blog outlines the major depicting how identity management paves the way for organizational growth.","title":"Demystifying Identity Management For Revenue Generation - Going Beyond Compliance","tags":["digital identity management","ciam","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/7be5d965a7313daea716ebf63448e558/33aa5/revenue-generation.jpg","srcSet":"/static/7be5d965a7313daea716ebf63448e558/f836f/revenue-generation.jpg 200w,\n/static/7be5d965a7313daea716ebf63448e558/2244e/revenue-generation.jpg 400w,\n/static/7be5d965a7313daea716ebf63448e558/33aa5/revenue-generation.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Centralized access management is swiftly becoming the need of the hour as we adopt a fully digital lifestyle that demands…","fields":{"slug":"/identity/secure-centralized-access-management-without-compromising-cx/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Centralized access management is swiftly becoming the need of the hour as we adopt a fully digital lifestyle that demands robust security at every touchpoint. </p>\n<p>We are surrounded by several applications and devices that simplify our daily lives and eventually become integral to our modern lifestyles. </p>\n<p>And we’re always on a hunt for better experiences that impact our lives through several connected devices and apps working flawlessly to help streamline various aspects of our daily routine. </p>\n<p>However, when we see things through the lens of an information security professional, security could be the least prioritized thing while embarking on a <a href=\"https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/\">digital transformation journey</a>. </p>\n<p>While most platforms offer stringent security measures across their devices or applications, many businesses cannot provide a seamless user experience and security when a user switches from one app to another or device to another. </p>\n<p>A little glitch in the overall experience or security threat while accessing services from one device to another or a bad cross-platform experience could lead to a situation where businesses lose consumer trust. </p>\n<p>So, what could be the ideal way to enhance centralized access security without compromising user experience? Let’s figure it out. </p>\n<h3 id=\"1-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#1-single-sign-on-sso\" aria-label=\"1 single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Single Sign-On (SSO)</h3>\n<p>Single Sign-On (SSO)  is a method of authentication that allows websites to use other trustworthy sites to verify users. Single sign-on enables users to log in to any independent application with a single ID and password.</p>\n<p>SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. Verifying user identity is essential when it comes to knowing which permissions a user will have. The <a href=\"https://www.loginradius.com/\">LoginRadius Identity platform</a> is one example of managing access that combines user identity management solutions with SSO solutions.</p>\n<p>Enhanced user experience is one of the most valuable benefits of SSO. As repeated logins are no longer required, customers can enjoy a modern digital experience. The benefits for enterprises include increased customer loyalty and higher conversion rates.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"SSO-DS\"\n        title=\"SSO-DS\"\n        src=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/SSO-DS.png\"\n        srcset=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/a6d36/SSO-DS.png 650w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/SSO-DS.png 768w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/81501/SSO-DS.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Hence, SSO is undeniably the perfect solution to improve centralized access between devices or applications without compromising security and user experience since users can jump from one app to another without friction. </p>\n<p>Apart from this, cross-platform integration and authentication are other reasons businesses must put their best foot forward in adopting a single sign-on solution for their platforms. </p>\n<h3 id=\"2-go-passwordless\" style=\"position:relative;\"><a href=\"#2-go-passwordless\" aria-label=\"2 go passwordless permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Go Passwordless</h3>\n<p>When it comes to secure and streamlined authentication, nothing beats a passwordless authentication mechanism. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-passwordless-login/\">Passwordless login</a> verifies consumer identities without using passwords or any other memorized credentials.</p>\n<p>The consumer is confirmed with the help of a possession factor, which can be an object that uniquely identifies the user with an email (link) or SMS (OTP) sent to the registered email address or phone number, respectively.</p>\n<p>Once the link or OTP is verified, the consumer will be logged into the account.</p>\n<p>More and more businesses are now leveraging the true potential of going passwordless since it minimizes authentication friction, and users can quickly authenticate in a number of devices or applications hence improving centralized access. </p>\n<h3 id=\"3-federated-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#3-federated-single-sign-on-sso\" aria-label=\"3 federated single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Federated Single Sign-On (SSO)</h3>\n<p><a href=\"https://www.loginradius.com/federated-sso/\">Federated single sign-on</a> (SSO) establishes inter-organizational trust that helps seamless authorization and authentication of each others’ users.</p>\n<p>Fed SSO generates an authentication URL, and when the user clicks on the URL, the cloud identity service makes a digitally signed token to verify the partner platform. And this token is further submitted by the web browser to the partner’s SSO during a new session.</p>\n<p>The federated SSO works by offering a partnership role involving two parties, including the service provider (SP) and identity provider (IdP). The identity provider provides a digital token, and the service provider validates the digital token and creates a new session offering access to the program/application.</p>\n<p>With federated SSO, businesses can overcome the hassle of resetting passwords and ensure their customers can flawlessly switch between applications/platforms of different service providers without worrying about their security.</p>\n<p>Businesses requiring higher peak load management and an identity management system to provide real-time load management should choose a reliable CIAM solution offering federated SSO capabilities.</p>\n<p>In a nutshell, fed SSO bridges the centralized access and authentication gap between multiple platforms and enables users with cloud identity services to access services offered by one or more partner businesses/media without needing a separate login at the partner platform.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Robust authentication security coupled with a great user experience is what it takes to build long-lasting customer relationships. And businesses that aren’t offering seamless centralized access would surely lag behind their competitors. </p>\n<p>With secure centralized access through single sign-on and passwordless login, businesses can quickly win customer trust and stand ahead of their competitors. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 17, 2022","updated_date":null,"description":"While most platforms offer stringent security measures across their devices or applications, many businesses cannot provide a seamless user experience and security when a user switches from one app to another or device to another. Let’s understand how to enhance customer experience without compromising security.","title":"Securing Centralized Access Without Compromising User Experience","tags":["centralized access management","sso","passwordless"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.3529411764705883,"src":"/static/386cd8c19cefa24a51df6d65878d27df/33aa5/centralized-access.jpg","srcSet":"/static/386cd8c19cefa24a51df6d65878d27df/f836f/centralized-access.jpg 200w,\n/static/386cd8c19cefa24a51df6d65878d27df/2244e/centralized-access.jpg 400w,\n/static/386cd8c19cefa24a51df6d65878d27df/33aa5/centralized-access.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Your business is your most valuable asset. Ensuring that you are sensitive to the security of your customers and their…","fields":{"slug":"/growth/authentication-mainstream-marketers-benefit/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Your business is your most valuable asset. Ensuring that you are sensitive to the security of your customers and their information is essential to building a stable and healthy relationship with them.</p>\n<p>Customer Authentication and Email Authentication are the two security provisions we will discuss in this blog. </p>\n<h2 id=\"what-is-customer-authentication\" style=\"position:relative;\"><a href=\"#what-is-customer-authentication\" aria-label=\"what is customer authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Customer Authentication?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-authentication/\">Customer authentication</a> includes various methods aimed to verify an identity of a person. This is particularly important during digital interaction between the customer and business. </p>\n<p>If you are a customer, the authentication of your identity could contain various methods. You are either asked for something only you know, such as a password; something you have, such as an encryption token; or something you are, like the identity (User ID). </p>\n<p>When one of these methods is used in combination with the User ID, it is referred to as Single Factor Authentication. Single Factor Authentication is not bullet-proof, yet security professionals and regulators recognize the need to balance out security and convenience to match the mutual satisfaction between the business and the consumer. </p>\n<p>Using two of the above-mentioned three methods is called Dual Factor Authentication and is considered to provide far more security, yet is not considered cost-effective. Single Factor Authentication can be nonetheless strong, if the method is selected properly. </p>\n<p>Let us briefly discuss the above-mentioned three methods of customer authentication.</p>\n<ul>\n<li><strong>Password-based Authentication</strong></li>\n</ul>\n<p>Password is the most common Single Factor Authentication method. Evidently, customers prefer to recall their passwords quickly, therefore often neglect complexity, which is a requirement to keep your account safe. </p>\n<p>It is recommended to keep the password case-sensitive with at least six characters long, while including at least two numbers and symbols. That kind of complexity ensures the security of your account, since the password will require the calculated amount of ten trillion attempts to crack, in case of an attack. This is why the debates are still being hold, whether customer-generated or provider-generated passwords are a better warrant of security.</p>\n<ul>\n<li><strong>Knowledge-based Authentication</strong></li>\n</ul>\n<p>KBA, or Knowledge-based Authentication is a common method for securely aiding a customer in the recovery of their password. Since the challenge in this case lies in authentication, that the request of a password recovery was indeed submitted by the holder of the User ID. KBA asks a customer one or more questions to verify their identity.</p>\n<ul>\n<li><strong>Single Sign-On</strong></li>\n</ul>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">Single sign-on</a> or SSO, is mostly used by services using password as their main authentication method. SSO allows a customer to authenticate themselves once to use various accounts or systems. This provides comfort, as it eliminates the need to remember various passwords for various applications.</p>\n<p><a href=\"https://www.loginradius.com/resource/securing-user-authentication-understanding-the-basics-best-practices/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-sec-user-auth\"\n        title=\"WP-sec-user-auth\"\n        src=\"/static/e130ed60ec0f6921525da1a512669fcc/e5715/WP-sec-user-auth.png\"\n        srcset=\"/static/e130ed60ec0f6921525da1a512669fcc/a6d36/WP-sec-user-auth.png 650w,\n/static/e130ed60ec0f6921525da1a512669fcc/e5715/WP-sec-user-auth.png 768w,\n/static/e130ed60ec0f6921525da1a512669fcc/81501/WP-sec-user-auth.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>All of the three above-mentioned customer authentication methods present a challenge, where a business must determine a common ground between comfort and security.</p>\n<h2 id=\"what-is-email-authentication\" style=\"position:relative;\"><a href=\"#what-is-email-authentication\" aria-label=\"what is email authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Email Authentication?</h2>\n<p>Email authentication is also a collection of techniques to keep customers’ messages secure. The main aim of email authentication is to provide verifiable information about the email message the recipient received. That information verifies the ownership of the domain of any Message Transfer Agent who participated in the email exchange. This reassures your recipients of the <a href=\"https://www.loginradius.com/blog/identity/secure-email-address-website/\">authenticity of your email messages</a>, that you are indeed who you claim to be.</p>\n<p>Originally, the Simple Mail Transfer Protocol had no solution to validate email messages. This was taken as an advantage by spammers, scammers, and spoofers to conduct various kinds of fraudulent activities. </p>\n<p>Evidently, many customers would leave businesses due to their affiliation with such activities. If I subscribe to a service providing the best deals for summer vacations, for example, shall a Nigerian prince email me the next day with a similar domain, urgently requesting my credit card credentials to bring fortune to his kingdom and my family?</p>\n<p>To reduce the possibility of either of these fraudulent activities, many email authentication protocols have been developed. The ones used most are SPF, DKIM, and DMARC. They all serve a different purpose, but overall warrant email authentication.</p>\n<h2 id=\"authentication-customer-acquisition--retention\" style=\"position:relative;\"><a href=\"#authentication-customer-acquisition--retention\" aria-label=\"authentication customer acquisition  retention permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication, Customer Acquisition &#x26; Retention</h2>\n<p>You can already see how these authentication methods greatly benefit customer acquisition and retention. If your customers have a guarantee, that by registering for your services and providing your servers with their contact information no spoofer, attacker,  or scammer shall reach them, that improves the business relationship. </p>\n<p>But as we were brief, how else can email authentication help customer acquisition and retention? </p>\n<p>With email authentication and email validation, you also greatly impact your email reputation. That in return directly affects your email deliverability rate. Of course, that is not the sole determining factor of your email deliverability rate. </p>\n<p>However, if your emails are authenticated and have less affiliation with fraudulent activities, that has a significant impact on the deliverability on its own. With a positive email reputation and email deliverability, your email campaigns reach your customers. And your emails have various objectives in terms of <a href=\"https://www.loginradius.com/blog/growth/improve-customer-relation-brand-identity/\">customer acquisition and retention</a>.</p>\n<p>Are you sending an email to present your customer with an exclusive offer to encourage them to prolong the business partnership, inform of a new feature, or simply aid them in updating their password? In this example, emails serve a different purpose, yet are united under the same aim - to retain a customer. With that in mind, how do we improve our email deliverability?</p>\n<h3 id=\"email-deliverability\" style=\"position:relative;\"><a href=\"#email-deliverability\" aria-label=\"email deliverability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Email Deliverability</h3>\n<p>Internet Service Providers enforce restrictions on reaching the recipients' main inboxes to fight the ongoing spam and scam. This works in favor of recipients, yet at times might work against them. They might miss important emails to update their password or check their product delivery status, however, that is a mistake on the sender’s end, not the recipient’s.</p>\n<p>To improve your email reputation with ISP and therefore impact your email deliverability, consider the following points:</p>\n<ul>\n<li>Send emails only to users who want to receive them</li>\n<li>Make the unsubscription option easy to reach</li>\n<li>Remove emails with high bounce rates</li>\n<li>Be consistent with your email campaigns</li>\n<li>Integrate email authentication and email validation</li>\n</ul>\n<p>These points do not summerize the entire <a href=\"https://mailtrap.io/blog/email-deliverability/\">guide on email deliverability</a>, yet do overview them very briefly. Email authentication increases email deliverability, since it prevents fraudulent email activities, like spoofing, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing</a>, and more. Customers will receive your emails in their main inboxes and will know, that your emails are safe to interact with, as a legitimate source sends them.</p>\n<p>In an otherwise scenario, not integrating email authentication and email validation results in poor email deliverability. To your customers, this is:</p>\n<ul>\n<li>Preventing them from regaining immediate access to their account</li>\n<li>Preventing them from being reminded of your existence</li>\n<li>Preventing from being notified of a new feature</li>\n</ul>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>We briefly overviewed the importance of customer authentication and email authentication. We learned what is customer authentication and email authentication, and mainly - how it impacts customer acquisition and retention.</p>\n<p>Email campaigns certainly can be tricky, a lot of resources are invested in strategizing their content and delivery. With a good email reputation and email authentication, those emails will reach the main inboxes and fulfill their objective. Customer authentication, on the other hand, is a vital part in ensuring the safety of any sensitive data the customer entrusts with your business. </p>\n<p>With digital businesses taking over the entire industry, improving customer authentication and email communication with customers has never been more important to maintaining a successful business.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 12, 2022","updated_date":null,"description":"With digital businesses taking over the entire industry, improving customer authentication and email communication with customers has never been more important to maintaining a successful business. This blog explains how authentication can help you increase your customer acquisition.","title":"How Authentication Leads The Way in Strategic Customer Acquisitions?","tags":["passwordless authentication","digital identity","sso","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9230769230769231,"src":"/static/fe81b5d6f6152f144c291b8f7cb7883a/33aa5/auth-benefit.jpg","srcSet":"/static/fe81b5d6f6152f144c291b8f7cb7883a/f836f/auth-benefit.jpg 200w,\n/static/fe81b5d6f6152f144c291b8f7cb7883a/2244e/auth-benefit.jpg 400w,\n/static/fe81b5d6f6152f144c291b8f7cb7883a/33aa5/auth-benefit.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Grigori Monaselidze","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":198,"currentPage":34,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}