{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/36","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction Identity-first security is revolutionizing the way businesses protect themselves. It's a new approach to protecting data and…","fields":{"slug":"/identity/decoding-ethics-identity-first-security/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Identity-first security is revolutionizing the way businesses protect themselves. It's a new approach to protecting data and devices that increases productivity, preserves trust, drives compliance, and helps your business grow.</p>\n<p>And <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">identity management</a> is undoubtedly the new leadership model for data protection and business growth. It helps businesses drive better security outcomes, ensuring business growth while improving customer experiences.</p>\n<p>Whether we talk about overall user experience or customer identity security, organizations are now concerned about every aspect of their business that may affect customer acquisition. </p>\n<p>The world witnessed a paradigm shift amid the outburst of the COVID-19 pandemic. And business leaders learned a crucial lesson — to invoke the potential of remote opportunities with the next level of agility and security. </p>\n<p>However, the pandemic era also resulted in a sudden increase in cyberattacks on businesses that adopted poor lines of defense while offering remote access to employees. </p>\n<p>Hence, an identity-first security mechanism became the need of the hour to mitigate the risks and offer a seamless user experience. </p>\n<p>Let’s uncover the aspects of incorporating identity-first security and how businesses can seamlessly navigate their digital success. </p>\n<h2 id=\"what-is-identity-first-security-why-does-it-matter-now-more-than-ever-before\" style=\"position:relative;\"><a href=\"#what-is-identity-first-security-why-does-it-matter-now-more-than-ever-before\" aria-label=\"what is identity first security why does it matter now more than ever before permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity-First Security? Why does it Matter Now More Than Ever Before?</h2>\n<p>Organizations have offered far more freedom to their employees than ever before. The hybrid working environments and remote-first job opportunities have drastically changed how businesses handle security. </p>\n<p>However, the sudden shift to remote working environments and dynamic business landscape has increased the threat vectors since the conventional network firewalls aren’t potent to offer robust security. </p>\n<p>On the other hand, secure access to critical business information and resources has become the utmost priority for businesses amid the <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">rising data breaches</a>. </p>\n<p>Hence, a robust identity and access management system became necessary for businesses to secure their networks. </p>\n<p>Here’s where the crucial role of identity-first security came into play. </p>\n<p>Identity-first security can help mitigate risks and ensure strong identity controls. Security is a top concern for organizations as they work to protect their data, systems, and customers. </p>\n<p>Identity-first security helps mitigate risks and ensure strong identity controls by setting the stage for secure access across managed or unmanaged devices powered by automated lifecycle management activities. </p>\n<p>With an identity-first security approach, businesses can:</p>\n<ul>\n<li>Ensure that only those people who are authorized to access your data can do so.</li>\n<li>Automate lifecycle management activities to help you keep up with the ever-changing nature of employee roles, responsibilities, and devices.</li>\n<li>Ensure access is granted to the right person at the right time via automated processes without compromising security.</li>\n<li>Offer stringent layers of security through <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a> (MFA) and risk-based authentication (RBA)</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-mod-cust-id\"\n        title=\"EB-GD-to-mod-cust-id\"\n        src=\"/static/e8ca49370e6ab28514cbd05ef77951af/e5715/EB-GD-to-mod-cust-id.png\"\n        srcset=\"/static/e8ca49370e6ab28514cbd05ef77951af/a6d36/EB-GD-to-mod-cust-id.png 650w,\n/static/e8ca49370e6ab28514cbd05ef77951af/e5715/EB-GD-to-mod-cust-id.png 768w,\n/static/e8ca49370e6ab28514cbd05ef77951af/81501/EB-GD-to-mod-cust-id.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"the-crucial-role-of-an-identity-management-platform\" style=\"position:relative;\"><a href=\"#the-crucial-role-of-an-identity-management-platform\" aria-label=\"the crucial role of an identity management platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Crucial Role of An Identity Management Platform</h2>\n<p>Invoking the true potential of identity-first security requires modern businesses to leverage a robust identity management platform offering several security features. </p>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) solution can be the best thing that can help mitigate the risks of identity thefts or sensitive business data breaches. </p>\n<p>Moreover, a CIAM solution also helps meet all the necessary security and privacy compliances, ensuring the highest data security and privacy level. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Delivering a rich and secure login authentication experience is paramount for your business's success, and a new-age CIAM is undoubtedly the key to providing a flawless user experience.</p>\n<p>LoginRadius CIAM platform is designed to help businesses reach their targeted goals by enhancing the user experience, improving overall data security, and meeting regulatory compliance through an identity-first security approach. </p>\n<p>If you wish to experience how LoginRadius works for your business, reach us today to schedule a free personalized demo.</p>\n<p>Our product experts will show you the power of the LoginRadius Identity Platform, discuss your use cases, and explain how our cloud-based identity management solution ensures robust security for your business.  </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 19, 2022","updated_date":null,"description":"Identity management is undoubtedly the new leadership model for data protection and business growth. And an identity-first security mechanism is swiftly becoming the need of the hour. This blog highlights the aspects of incorporating identity-first security and how businesses can navigate their digital success.","title":"What Brands Need to Know for Building the Future of Data Compliance?","tags":["identity management","mfa","ciam","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/d0e9a3fe75f78f518e3cd9783f8fe7bf/33aa5/id-first.jpg","srcSet":"/static/d0e9a3fe75f78f518e3cd9783f8fe7bf/f836f/id-first.jpg 200w,\n/static/d0e9a3fe75f78f518e3cd9783f8fe7bf/2244e/id-first.jpg 400w,\n/static/d0e9a3fe75f78f518e3cd9783f8fe7bf/33aa5/id-first.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction With brands swiftly inclining toward modern cloud solutions, the need to optimize the cost of cloud adoption is increasingly…","fields":{"slug":"/growth/5-ways-reduce-cloud-cost-optimization/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With brands swiftly inclining toward modern cloud solutions, the need to optimize the cost of cloud adoption is increasingly becoming a global concern. </p>\n<p>Cloud cost optimization can be defined as minimizing overall cloud spending by carefully assessing and identifying mismanaged resources and then planning resource spending accordingly.</p>\n<p>Although <a href=\"https://www.loginradius.com/blog/identity/what-is-cloud-computing/\">cloud computing</a> has offered endless opportunities to businesses embarking on a digital transformation journey, the cost associated with the number of unused resources could be a worrying aspect.  </p>\n<p>Many businesses leveraging the cloud aren’t aware of the fact that around <a href=\"https://www.statista.com/statistics/1252987/cloud-spend-wasted-vs-efficient-spend/\">30% of the total cloud spent</a> is wasted worldwide. And the numbers are rising exponentially. </p>\n<p>Hence, businesses must identify and analyze their exact requirements and then opt for the right cloud vendor to ensure they aren’t squandering their finances. </p>\n<p>Let’s uncover the aspects of cloud cost optimization and learn how you can reduce your cloud bills. </p>\n<h3 id=\"1-analyze-unused-resources\" style=\"position:relative;\"><a href=\"#1-analyze-unused-resources\" aria-label=\"1 analyze unused resources permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Analyze unused resources</h3>\n<p>One of the easiest ways to begin your cloud cost optimization journey is to analyze unused resources on your cloud. Sometimes a temporary deployment over a server could be the reason for your unexpected cloud expenses. </p>\n<p>The IT administrators may deploy some temporary server and forget to turn it off. Also, in many instances, the administrator may forget to detach any additional storage used to run a specific test program. Analyzing and optimizing these areas could help reduce cloud storage costs to a great extent. </p>\n<h3 id=\"2-leverage-the-true-potential-of-heat-maps\" style=\"position:relative;\"><a href=\"#2-leverage-the-true-potential-of-heat-maps\" aria-label=\"2 leverage the true potential of heat maps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Leverage the true potential of heat maps</h3>\n<p>Nothing could be as helpful as heat maps in <a href=\"https://www.loginradius.com/blog/engineering/cloud-cost-optimization/\">reducing cloud storage costs</a>. Heat maps are virtual tools that portray valleys and peaks whenever there’s a computing demand. </p>\n<p>Based on the data from heat maps, businesses can quickly analyze idle programs or storage and establish starting and stopping points to minimize overall costs.</p>\n<p>Several cloud monitoring and optimization tools can help schedule instances for starting and stopping programs/applications for cost optimization. </p>\n<h3 id=\"3-multi-cloud-vs-single-cloud---choose-wisely\" style=\"position:relative;\"><a href=\"#3-multi-cloud-vs-single-cloud---choose-wisely\" aria-label=\"3 multi cloud vs single cloud   choose wisely permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Multi-cloud vs. single cloud - Choose wisely!</h3>\n<p>When choosing a reliable cloud architecture, most businesses aren’t sure whether they need a single-tenant cloud solution or a multi-tenant cloud. </p>\n<p>For startups and budding entrepreneurs, <a href=\"https://www.loginradius.com/blog/engineering/saas-single-tenancy-vs-multi-tenancy/\">multi-tenant cloud deployment </a>is the best as they need not spend heaps of money on the services they don’t require. Instead, they just need to pay for the resources they need on shared cloud space. </p>\n<p>On the other hand, businesses with colossal storage or computing requirements must always consider relying on a single-tenant cloud architecture, which can help them leverage the true potential of robust performance, security, and scalability. </p>\n<h3 id=\"4-choose-the-right-storage-size\" style=\"position:relative;\"><a href=\"#4-choose-the-right-storage-size\" aria-label=\"4 choose the right storage size permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Choose the right storage size</h3>\n<p>Most businesses choose storage that is more excessive than their actual requirements. Hence, they must pay more for the extra storage they aren’t utilizing. </p>\n<p>It’s always a good idea to analyze your requirements and choose the cloud storage plan that meets your needs. Otherwise, you can select an <a href=\"https://www.loginradius.com/scalability/\">auto scalable infrastructure</a> that scales with your needs, and you’re billed accordingly. </p>\n<p>The auto scalable infrastructure can deliver peak performance without any hassle and can eventually expand and shrink according to your business needs in real-time without latency. </p>\n<h3 id=\"5-regular-auditing\" style=\"position:relative;\"><a href=\"#5-regular-auditing\" aria-label=\"5 regular auditing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#5. Regular auditing</h3>\n<p>Lastly, regular auditing of your cloud usage could help shrink your cloud bills. Most organizations increase their cloud spending every year but don’t perform an audit for their cloud usage. This is where they are lagging. </p>\n<p>Depending on the demands, you can identify areas where you’re overpaying or underpaying and reduce your needs and spending accordingly. </p>\n<p>Moreover, sometimes an organization has multiple cloud deployments performing the same tasks. Auditing and reducing the number of clouds could be the best way for cloud cost optimization. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With the increasing adoption of the cloud worldwide, most organizations are worried about cost optimization since most applications are currently deployed on the cloud. </p>\n<p>The above tips could help organizations manage cloud storage and deployments and eventually reduce costs. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 15, 2022","updated_date":null,"description":"Although cloud computing has offered endless opportunities to businesses embarking on a digital transformation journey, the cost associated with the number of unused resources could be a worrying aspect. This blog covers the aspects of cloud cost optimization with tips to reduce your cloud bills.","title":"How to Reduce Your Cloud Bills Without Compromising Security","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f18c1415f79629b82216e6afc70478f8/33aa5/cloud-cost.jpg","srcSet":"/static/f18c1415f79629b82216e6afc70478f8/f836f/cloud-cost.jpg 200w,\n/static/f18c1415f79629b82216e6afc70478f8/2244e/cloud-cost.jpg 400w,\n/static/f18c1415f79629b82216e6afc70478f8/33aa5/cloud-cost.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Our digital lives are expanding into more devices, interactions, environments, and experiences every day. Delivering rich…","fields":{"slug":"/growth/what-advanced-identity-means-for-cx/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Our digital lives are expanding into more devices, interactions, environments, and experiences every day. Delivering rich customer experiences to build trust and loyalty isn’t a luxury anymore; it’s an absolute necessity. </p>\n<p>And the ultimate objective of any online platform today is to deliver a personalized and differentiated customer experience that strengthens customer loyalty while <a href=\"https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/\">reducing customer churn</a>.</p>\n<p>Since customer journeys are becoming increasingly complex as more digital touchpoints are added, brands should focus more on improving their identity management infrastructure. </p>\n<p>A terrible authentication experience or a little friction in switching between applications is the worst thing that none of our customers would ever tolerate. And they eventually switch!</p>\n<p>Here’s where the typical and crucial role of advanced identity management solutions comes into play. </p>\n<p>Let’s understand the aspects of identity management and how it paves the path for delivering a rich and secure customer experience across multiple touchpoints. </p>\n<h2 id=\"identity-strategy-for-today-tomorrow-and-beyond\" style=\"position:relative;\"><a href=\"#identity-strategy-for-today-tomorrow-and-beyond\" aria-label=\"identity strategy for today tomorrow and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Strategy for Today, Tomorrow, and Beyond</h2>\n<p>Gone are the days when <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">identity management</a> was only limited to a specific organization or a limited number of customers; it’s now at a new level. </p>\n<p>Billions of identities are now being managed, stored, and secured every second, and that’s how identity management works in the 21st century. </p>\n<p>However, some businesses aren’t yet leveraging the true potential of a robust identity management system that can thrive business success by accelerating user experience. </p>\n<p>We’re constantly interacting with multiple brands and platforms from a user perspective. However, most of these platforms are already authenticated with a single identity. No one favors creating numerous identities across multiple platforms and remembering complex passwords. </p>\n<p>On the other hand, with great identity and access management features, including <a href=\"https://www.loginradius.com/single-sign-on/\">single sign-on</a> (SSO) and social login, switching between multiple applications without re-authenticating feels like a breeze. </p>\n<p>So, what’s the biggest lesson that brands should learn? </p>\n<p>A rich customer experience begins when users interact with their platform for the first time! And to ensure it’s fabulous, brands must leverage a customer identity and access management solution. </p>\n<p>Besides, global data privacy and security compliances, including the GDPR and CCPA, are more stringent than ever. Hence, to comply with these regulations, brands should adopt a robust identity management solution to continue delivering services to their customers. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-ccpa-compliance\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"lr-ccpa\"\n        title=\"lr-ccpa\"\n        src=\"/static/1b4c890938c2e43d6067ee716ec32ffc/e5715/lr-ccpa.png\"\n        srcset=\"/static/1b4c890938c2e43d6067ee716ec32ffc/a6d36/lr-ccpa.png 650w,\n/static/1b4c890938c2e43d6067ee716ec32ffc/e5715/lr-ccpa.png 768w,\n/static/1b4c890938c2e43d6067ee716ec32ffc/63ff0/lr-ccpa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"your-customers-know-what-to-share-what-not\" style=\"position:relative;\"><a href=\"#your-customers-know-what-to-share-what-not\" aria-label=\"your customers know what to share what not permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Your Customers Know What to Share What Not</h2>\n<p>As we already discussed, global data privacy and security compliances are becoming more stringent; they’re also spreading awareness among customers regarding how brands collect, store, and manage their data. </p>\n<p>Users don’t wish to share their personal data with platforms they aren’t familiar with or applications they don’t trust. </p>\n<p>Again, the trust factor begins with the first interaction. And if it isn’t a seamless interaction, users won’t give consent to use their personal details. Moreover, they won’t share their details. </p>\n<p>Hence, delivering personalized customer experiences becomes an uphill battle for brands since they cannot collect crucial information. </p>\n<p>However, things completely change when businesses have incorporated a robust customer identity and access management platform. </p>\n<p>With a CIAM, businesses can gradually and consistently collect crucial information about users through progressive profiling. </p>\n<p><a href=\"https://www.loginradius.com/progressive-profiling/\">Progressive profiling</a> ensures a rich customer experience where customers can share their details gradually over time since they’re not bombarded with complicated registration forms at their first interaction. </p>\n<p>This helps build trust over time and ensures customers share their complete details, including preferences, to help brands deliver a rich and customized experience. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>The power of identity management is helping brands navigate their digital transformation journey. However, many businesses yet have to witness its true potential since they’re relying on conventional modes of collecting and storing user information and authentication. </p>\n<p>With a reliable customer identity and access management solution, brands can ensure they stand ahead of the curve by delivering rich customer experiences backed with robust security. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 08, 2022","updated_date":null,"description":"Since customer journeys are becoming increasingly complex, brands should focus more on improving their identity management infrastructure. This blog explains the aspects of identity management and how to deliver a rich and secure CX across multiple touchpoints.","title":"The Future of Customer Experience is All About Advanced Identity","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.36986301369863,"src":"/static/39e6dd7e321a7b7eaf60cda7f6af2833/33aa5/cx-identity.jpg","srcSet":"/static/39e6dd7e321a7b7eaf60cda7f6af2833/f836f/cx-identity.jpg 200w,\n/static/39e6dd7e321a7b7eaf60cda7f6af2833/2244e/cx-identity.jpg 400w,\n/static/39e6dd7e321a7b7eaf60cda7f6af2833/33aa5/cx-identity.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Though we often hear news about cyberattacks or identity thefts, big brands falling victim to these cyberattacks is quite rare.  A similar…","fields":{"slug":"/identity/oktapus-phishing-targets-okta-identity-credentials/"},"html":"<p>Though we often hear news about cyberattacks or identity thefts, big brands falling victim to these cyberattacks is quite rare. </p>\n<p>A similar incident happened recently where cybersecurity researchers revealed the latest phishing campaign that targeted identity and access management giant Okta. </p>\n<p>The phishing campaign, Oktapus, targeted many renowned companies that also became victims of various phishing attempts. </p>\n<p>As per the experts, the cybercriminals sent text messages to the company's employees with a link to the phishing sites mimicking the Okta authentication page for their website. </p>\n<p>Moreover, the report revealed that once the users landed on the phishing page, they were asked for a 2FA code. And once the user entered their credentials to log in, their credentials were forwarded to the malicious actors that started the attack. </p>\n<p>Group-IB, the company that conducted the analysis, also confirmed that once the cybercriminals could pivot and launch various attacks, including supply chain attacks. And this was a clear indicator that these attacks were carefully planned and executed. </p>\n<p>As per the report, 169 unique domains were identified involved in the Oktapus phishing campaign. And Group-IB analyzed the resources used by fraudsters to create fake websites. </p>\n<p>Furthermore, the targetted organization were majorly from the U.S., followed by the U.K. and Canada. Most of them were I.T. companies offering cloud and software development services, and few were dealing with finance-related work. </p>\n<p>The incident portrays the importance of proper cybersecurity training for employees and customers since various <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/\">cybersecurity best practices</a> are useless if the end-user isn’t aware of the risks. </p>\n<p>As per Group-IB, the end users, especially with admin rights, must always double-check the URL of a website where they share their login credentials to ensure maximum security. Moreover, the company officials also advised businesses to invoke the true potential of a FIDO2-compliant security key for MFA. </p>\n<p>Also, businesses must identify various loopholes that can help cybercriminals to exploit crucial information about customers and companies. Once the loopholes are identified, the best security practices must be implemented soon. </p>\n<p>However, brands need to focus on educating their employees, IT staff, and end users to ensure they’re well-prepared for any cybersecurity challenge and can quickly identify phishing attempts. </p>\n<p>The right combination of cybersecurity best practices and employee/customer awareness works flawlessly in mitigating the risks associated with data breaches and identity thefts. </p>\n<p>Looking for an <a href=\"https://www.loginradius.com/\">Okta alternative</a>? Learn more about the highest rated, most secure CIAM technology in the world. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 08, 2022","updated_date":null,"description":"The phishing campaign, Oktapus, targeted Okta who recently became victim of its phishing attempts. 169 unique domains were identified that fraudsters used to create fake websites.","title":"Okta Identity Credentials on the Radar of Oktapus Phishing Campaign","tags":["Phishing","Oktapus","Okta"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.36986301369863,"src":"/static/227008014a59ffcba9991e13b404c872/33aa5/oktapus.jpg","srcSet":"/static/227008014a59ffcba9991e13b404c872/f836f/oktapus.jpg 200w,\n/static/227008014a59ffcba9991e13b404c872/2244e/oktapus.jpg 400w,\n/static/227008014a59ffcba9991e13b404c872/33aa5/oktapus.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction One of the leading municipalities known for biking and trekking in British Columbia is set to take off on its journey to…","fields":{"slug":"/identity/loginradius-secures-identity-management-bc-municpality/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>One of the leading municipalities known for biking and trekking in British Columbia is set to take off on its journey to digitize its citizenship services. </p>\n<p>The moment of truth came when the City decided to digitize its citizen services; it could never have predicted how valuable this modernization project would become. The City provides a wide range of services to its citizens, including recreational facilities, community building, etc. They join the dots to meet the needs of their residents to ensure a safe and livable community. Other services include taxes and utilities, garbage and waste diversion, and transportation. </p>\n<h2 id=\"managing-the-identities\" style=\"position:relative;\"><a href=\"#managing-the-identities\" aria-label=\"managing the identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Managing the Identities</h2>\n<p>The City’s IT team started looking for a CIAM solution to help secure the identities and streamline the <a href=\"https://www.loginradius.com/blog/identity/what-is-login-authentication/\">authentication process</a> for all their citizens across applications. After exploring multiple providers, they decided to try LoginRadius for managing the identities. </p>\n<p>After a detailed discussion which included platform demonstrations and requirement gathering sessions, the client gained confidence and awarded the project to LoginRadius.</p>\n<p>Being the preferred choice by many other municipalities and with the experience LoginRadius brings to the table in similar projects, the choice was relatively easy for the City’s management team. </p>\n<h2 id=\"easy-roll-out\" style=\"position:relative;\"><a href=\"#easy-roll-out\" aria-label=\"easy roll out permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Easy Roll-Out</h2>\n<p>It was a straightforward implementation for the City as there were no legacy applications that needed to be replaced, which meant no data migration. It took less than four weeks for the City’s IT team to implement the solution on their end. With all the resources and pre-built SDKs, it was a smooth implementation for them. </p>\n<p>The City went on to implement the <a href=\"https://www.loginradius.com/identity-experience-framework/\">LoginRadius Identity Experience Framework</a> (IDX) - an out-of-the-box solution with pre-built user account flows. This solution had all major customer flows, including registration, login, forgotten password, account verification, and profile management. </p>\n<p>LoginRadius Identity Experience Framework pages are JavaScript, HTML, and CSS driven, meaning most of the logic is implemented using JavaScript. Hence, the city developer had to modify the design and script per their UI/UX requirements.</p>\n<p>Even though it is hosted on LoginRadius, the solution is also entirely white label, which means that the City could customize the URL of the portal as well as all the UI elements of it. </p>\n<h2 id=\"perfectmind-integration\" style=\"position:relative;\"><a href=\"#perfectmind-integration\" aria-label=\"perfectmind integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>PerfectMind Integration</h2>\n<p>One of the key integrations the City has is with the PerfectMind application, a membership management software that uses cloud-based technology to help cities connect with their communities. </p>\n<p>The LoginRadius PerfectMind SSO connector is an out-of-the-box solution that provides a seamless single sign-on experience between LoginRadius and the PerfectMind platform by creating contacts on-the-fly during SSO workflow. </p>\n<p>Whenever any citizen logs into the City’s website, they will be automatically logged into the PerfectMind site. The LoginRadius SSO connector will check if a corresponding contact exists on the PerfectMind site or not. If there is no contact in the PerfectMind application, LoginRadius will create the corresponding contact in the PerfectmInd application and let the customer log in to the PerfectMind application. </p>\n<p>With this integration, citizens are able to access recreational services to search and register for programs with a single account giving them the best experience while surfing the City’s website.</p>\n<p><a href=\"https://www.loginradius.com/resource/perfectmind-integration\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-perfectmindint\"\n        title=\"DS-perfectmindint\"\n        src=\"/static/9dfd5053b2cf5348ba48bca7ef31cb14/e5715/DS-perfectmindint.png\"\n        srcset=\"/static/9dfd5053b2cf5348ba48bca7ef31cb14/a6d36/DS-perfectmindint.png 650w,\n/static/9dfd5053b2cf5348ba48bca7ef31cb14/e5715/DS-perfectmindint.png 768w,\n/static/9dfd5053b2cf5348ba48bca7ef31cb14/81501/DS-perfectmindint.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"support\" style=\"position:relative;\"><a href=\"#support\" aria-label=\"support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Support</h2>\n<p>Right from the <a href=\"https://www.loginradius.com/blog/identity/loginradius-streamlines-user-onboarding-harry-rosen/\">customer onboarding</a>, the City had access to a customer success manager and multiple support channels to ensure the success of the project every step of the way. The LoginRadius team continues to work closely with the city to ensure project success.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 06, 2022","updated_date":null,"description":"A city in BC was looking for a CIAM solution that would secure the identities and streamline the authentication process for its citizens. Here's why they decided to try LoginRadius and the decision worked in their favor.","title":"BC Municipality Digitizes its Citizen Services. LoginRadius Brings Identity to the Table.","tags":["digital identity","authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4492753623188406,"src":"/static/cc6812ad48dd362d4162d1727acc181a/33aa5/bc-municipal.jpg","srcSet":"/static/cc6812ad48dd362d4162d1727acc181a/f836f/bc-municipal.jpg 200w,\n/static/cc6812ad48dd362d4162d1727acc181a/2244e/bc-municipal.jpg 400w,\n/static/cc6812ad48dd362d4162d1727acc181a/33aa5/bc-municipal.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Saikiran Babladi","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction In a fast-paced digital business landscape, digital agility is undeniably becoming the backbone of enterprises striving to stay…","fields":{"slug":"/identity/role-of-customer-authentication-digital-first-cx/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In a fast-paced digital business landscape, digital agility is undeniably becoming the backbone of enterprises striving to stay ahead of the curve. </p>\n<p>And when we talk about overall business growth, we can’t overlook the role of <a href=\"https://www.loginradius.com/authentication/\">customer authentication</a> in reinforcing digital agility for thriving business success. </p>\n<p>With digital agility, businesses can easily and rapidly update, change, or adapt their processes to meet current and future customer needs and opportunities. </p>\n<p>Just like agility is the way to move quickly and easily, digital agility is now the means to adopt digital transformation quickly and easily through the right tools and processes. And customer authentication plays a vital role in incorporating digital agility. </p>\n<p>Let’s understand the aspects of digital agility and how businesses can ensure they’re on the right path to achieving digital agility through the right customer authentication tools and technologies. </p>\n<h2 id=\"what-is-digital-agility-whats-the-role-of-customer-authentication-in-invoking-the-potential-of-digital-agility\" style=\"position:relative;\"><a href=\"#what-is-digital-agility-whats-the-role-of-customer-authentication-in-invoking-the-potential-of-digital-agility\" aria-label=\"what is digital agility whats the role of customer authentication in invoking the potential of digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Agility? What’s the Role of Customer Authentication in Invoking the Potential of Digital Agility?</h2>\n<p>Digital agility is the ease with which any organization can adapt to changing business needs – by enabling or changing their business processes. </p>\n<p>And for a <a href=\"https://www.loginradius.com/blog/growth/4-things-consider-starting-digital-transformation/\">successful digital transformation</a>, organizations need to invest in resilient business operations, consumer experience initiatives, and technology. </p>\n<p>And how do you go about achieving your business objectives in digital agility? Among its primary building blocks, identity and access management (or IAM) can help in bringing business agility into any organization.</p>\n<p>Traditionally, IAM has always been viewed as an effective security solution necessary for software applications and mobile apps. In short, it has been used solely to ensure the right person has access to the right resource. This is true, but IAM is now much more than simply acting as an authentication tool.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Customer identity and access management</a> (CIAM) has changed how businesses leverage customer insights and provide authentication to users without hampering the overall user experience. </p>\n<h2 id=\"how-a-ciam-solution-helps-paving-the-way-for-digital-agility\" style=\"position:relative;\"><a href=\"#how-a-ciam-solution-helps-paving-the-way-for-digital-agility\" aria-label=\"how a ciam solution helps paving the way for digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How a CIAM Solution Helps Paving the Way for Digital Agility?</h2>\n<p>For effective digital transformation, technology-enabled companies must move from a fixed and rigid IT infrastructure – to a more flexible and component-based API architecture, which can easily be reconstructed or reused. </p>\n<p>And, we shall see how an API-based consumer identity and access management (or CIAM) can be the foundation of digital agility and transformation.</p>\n<p>A robust CIAM solution helps businesses stay ahead of the competition by offering valuable insights that help invoke the true potential of digital agility, including:</p>\n<ul>\n<li>Which users or identities require access rights to the applications?</li>\n<li>How can they go about utilizing these applications?</li>\n<li>What resources do they need for access?</li>\n<li>How can you prevent unauthorized access to the applications?</li>\n<li>How many times does a user access the application?</li>\n</ul>\n<p>This information helps businesses quickly understand user demands and can eventually prepare strategies for future requirements. </p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ciam-ds\"\n        title=\"ciam-ds\"\n        src=\"/static/5585e9b7c984efdccda767c38763e342/e5715/ciam-ds.png\"\n        srcset=\"/static/5585e9b7c984efdccda767c38763e342/a6d36/ciam-ds.png 650w,\n/static/5585e9b7c984efdccda767c38763e342/e5715/ciam-ds.png 768w,\n/static/5585e9b7c984efdccda767c38763e342/63ff0/ciam-ds.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-the-loginradius-ciam-solution-can-help-in-your-digital-agility\" style=\"position:relative;\"><a href=\"#how-the-loginradius-ciam-solution-can-help-in-your-digital-agility\" aria-label=\"how the loginradius ciam solution can help in your digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How the LoginRadius CIAM Solution Can Help in Your Digital Agility</h2>\n<p>As a leading provider of CIAM solutions that works for any business model, LoginRadius ensures digital agility and a seamless consumer experience. </p>\n<p>With the LoginRadius identity management platform, you can achieve digital transformation by connecting your consumer data to a host of API-driven tools in analytics, business intelligence (BI), and consumer relationship management (CRM).</p>\n<p>Using the LoginRadius <a href=\"https://www.loginradius.com/blog/identity/digital-agility/\">consumer identity APIs</a>, you can quickly validate and automate your consumer identification process and prevent spam or fraudulent accounts.</p>\n<p>With its preconfigured integration with third-party tools and applications, you can pull your latest consumer data – thus eliminating data silos and generating valuable insights.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With businesses quickly stepping towards digital transformation, the role of digital agility remains unmatched. </p>\n<p>Businesses can leverage the true potential of digital agility by incorporating a reliable CIAM solution like LoginRadius CIAM that helps thrive agility and overall business growth. </p>\n<p>Reach us if you wish to see the future of digital agility through a robust cloud-based CIAM solution. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 06, 2022","updated_date":null,"description":"Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies.","title":"The Role of Customer Authentication in Paving the Way for Digital Agility","tags":["customer authentication","digital transformation","ciam"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4184397163120568,"src":"/static/2314b7626fb020000bafa287a12e12f7/33aa5/digital-cx.jpg","srcSet":"/static/2314b7626fb020000bafa287a12e12f7/f836f/digital-cx.jpg 200w,\n/static/2314b7626fb020000bafa287a12e12f7/2244e/digital-cx.jpg 400w,\n/static/2314b7626fb020000bafa287a12e12f7/33aa5/digital-cx.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":210,"currentPage":36,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}