{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/39","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction When we think of customer-centric marketing, we tend to imagine a brand with a website that’s easy to navigate and use, or a…","fields":{"slug":"/growth/lead-era-customer-centric-marketing/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>When we think of customer-centric marketing, we tend to imagine a brand with a website that’s easy to navigate and use, or a mobile app that is responsive and intuitive, or in-store displays that are informative and engaging.</p>\n<p>But what if there were an even more important aspect to consider? What if the way a company treats its customers on social media was as important as any other aspect of customer experience?</p>\n<p>Today, retailers need to look beyond just the one aspect of their customer experience. They also need to think about: </p>\n<ul>\n<li>customer’s <a href=\"https://www.loginradius.com/blog/growth/what-is-omnichannel-cx/\">omnichannel fulfillment</a> (including web sales),</li>\n<li>personalized product recommendations based on purchase history,</li>\n<li>friction-free checkout processes (so people don't leave because of check-out errors),</li>\n<li>better pricing models that make sense for consumers (you know, like buying something online instead of at the store),</li>\n<li>and so much more!</li>\n</ul>\n<p>That's why customer-centric marketing is so important in this time of uncertainty—and why retailers should be focusing on it now.</p>\n<p>In this blog post, we'll dive into <a href=\"https://www.loginradius.com/blog/growth/consumer-management-to-consumer-engagement/\">how retailers can truly make their customers happy</a> by advocating customer-centric marketing. </p>\n<h2 id=\"breaking-down-your-business-model-4-strategies-to-master-customer-centricity\" style=\"position:relative;\"><a href=\"#breaking-down-your-business-model-4-strategies-to-master-customer-centricity\" aria-label=\"breaking down your business model 4 strategies to master customer centricity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Breaking Down Your Business Model: 4 Strategies to Master Customer-Centricity</h2>\n<p>When it comes to customer-centric marketing, you should always be thinking about how your brand fits into your customers' lives—and not just at the point of sale. Here are some tips to help you out! </p>\n<h3 id=\"1-prefer-customer-performance-indicators-cpis-over-traditional-marketing-kpis\" style=\"position:relative;\"><a href=\"#1-prefer-customer-performance-indicators-cpis-over-traditional-marketing-kpis\" aria-label=\"1 prefer customer performance indicators cpis over traditional marketing kpis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Prefer customer performance indicators (CPIs) over traditional marketing KPIs.</h3>\n<p>You need to start thinking about your customer's needs from a new perspective. For example, take into account how they want to be treated and what their goals are. Next, you need to figure out how to help them achieve those goals through your <a href=\"https://www.loginradius.com/blog/growth/customize-marketing-programs-on-consumer-journey/\">marketing campaigns</a>.</p>\n<p>The rise of customer performance indicators (CPIs) is a game-changer for traditional marketing. While traditional KPIs are merely an indicator of whether a company is succeeding or failing, CPIs take a more holistic approach to understanding what customers want from their companies.</p>\n<p>Moreso, CPIs help understand how customers use their products or services and make real-time adjustments based on those insights. They also allow companies to figure out the impact of their marketing efforts and make strategic decisions about how best to spend their limited resources.</p>\n<h3 id=\"2-invest-in-infrastructure\" style=\"position:relative;\"><a href=\"#2-invest-in-infrastructure\" aria-label=\"2 invest in infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Invest in infrastructure.</h3>\n<p>One of the most important things you can do to become customer-centric is invest in infrastructure that will help you serve your customers better.</p>\n<ul>\n<li>Get a clear picture of who your customers are, what they care about and why they buy from you.</li>\n<li>Study how customers interact with your products or services and identify pain points.</li>\n<li>Create a new way of thinking about how to serve your customers by focusing on their needs and buying patterns instead of just trying to sell them something new every time they need something new!</li>\n<li>Focus on continually <a href=\"https://www.loginradius.com/blog/growth/how-to-improve-the-customer-xperience/\">improving the user experience</a> (UX) by investing in research, testing, learning and providing feedback loops that keep everyone involved in a state of constant improvement.</li>\n<li>Build empathy into your own business processes by listening carefully to what your customers say about their experiences, then using that information to build better versions.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/making-customers-feel-seen-in-an-omnichannel-world/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABiElEQVQY00WQvU9aYRTGbxzkXrC2AqXe6EVjwFs+xQ+4fIOAIAU1xsFUTWy6NGqqk4NRuzQO9p+om+3SpOnSkiZNTAed3BwcHPqP/PryEnB43nc45/zOcx5Fm8xiN7M8n6lRPL1g+/NfxhrvGJ5ZQBdyTZVR/RnafaovjT1Uxp1cxRUto4UrqC8Lsq76s7JH6QI98Qa1s68c/f6H0dzBEy3i9M9JoM3XAWpi0C4g3vnXhCrrOKw1bJEq9u5C8SvtxyG2uIMZ9Pw63pV9PNYST80UntgCzmipB9Tn6hhWQ7iv8kJcZCTqjMbrjCReMRgsPgJV0WyEk8zmFwll6kQKS0wmyuihFIMCrJm5jkMh11RFAoxkk1GrKZc8CRR6sciT2wO6OYsZiROcThOYFm79MdzjYYaCORxiQNFj7J184u7+gW8//3D5/RdffrS4urmldXXNs3CJfpFxJ0OZT5r+CasnzZdiwGznm5PqG0tgLb9h9/iczf1TNt6fSL09/MjWwQcGAnlswuV/YOLISvipXtQAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-omnichannel\"\n        title=\"EB-omnichannel\"\n        src=\"/static/9c10ee07ea3f0659f165bfe4811166fe/e5715/EB-omnichannel.png\"\n        srcset=\"/static/9c10ee07ea3f0659f165bfe4811166fe/a6d36/EB-omnichannel.png 650w,\n/static/9c10ee07ea3f0659f165bfe4811166fe/e5715/EB-omnichannel.png 768w,\n/static/9c10ee07ea3f0659f165bfe4811166fe/81501/EB-omnichannel.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-a-seamless-customer-onboarding\" style=\"position:relative;\"><a href=\"#3-a-seamless-customer-onboarding\" aria-label=\"3 a seamless customer onboarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. A seamless customer onboarding.</h3>\n<p>The most important thing to remember when designing an onboarding flow is to make sure that it's simple and easy. You don't want to confuse your new customers—or even frustrate them!</p>\n<p>The sign-up process is often the starting point for a <a href=\"https://www.loginradius.com/blog/growth/smooth-onboarding-positive-user-impression/\">seamless customer onboarding</a> experience, and it's an area where businesses often fall short. Here's what you can do to make the process as seamless as possible.</p>\n<ul>\n<li>Keep it short. Think about how many steps you can take without losing users. If you can have them \"sign up\" with just a few clicks and they're ready to go, that's great!</li>\n<li>If you have too much information to gather, split them into multiple interactions throughout their lifecycle. That's <a href=\"https://www.loginradius.com/blog/identity/progressive-profiling/\">how progressive profiling works</a>.</li>\n<li>Make it easy for people to sign up with their social login. That takes the pain away from remembering passwords. </li>\n</ul>\n<h3 id=\"4--optimize-every-possible-customer-touchpoint\" style=\"position:relative;\"><a href=\"#4--optimize-every-possible-customer-touchpoint\" aria-label=\"4  optimize every possible customer touchpoint permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4.  Optimize every possible customer touchpoint.</h3>\n<p>The key to customer-centric marketing is to optimize every customer touchpoint. Optimizing means making sure that the customers' experience with your business is as easy and pleasurable as possible. </p>\n<p>It doesn't mean that you have to be perfect at everything all the time. But it does mean that you need to think about how every single bit of your business affects the customer experience.</p>\n<p>So, here's what you can do:</p>\n<ul>\n<li>Start with the basics. What do you think is the first thing a customer sees when they visit your website? Your home page? Your landing page? Well, the first thing they see doesn't matter! Rather, you want them to be able to find what they're looking for quickly and easily.</li>\n<li>Make it easy. How can you make sure that everything on your website is simple and easy to navigate? That could mean adding more images or videos than text, and using bold colors instead of subtle ones.</li>\n<li>Make it fast. How fast can a customer find what they're looking for on your website? If it takes too long, they might leave before even getting started with an order. </li>\n</ul>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>A customer-centric approach to marketing means that businesses are no longer focused on the products and services themselves, but instead prefer to understand the needs and wants of their customers. And that’s exactly what you need to do to lead this era of customer-centric marketing. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 26, 2022","updated_date":null,"description":"A customer-centric approach to marketing means that businesses are no longer focused on the products themselves, but instead prefer to understand customer demands. This blog explains how retailers can make their customers happy by advocating customer-centricity.","title":"How To Win the Era Of Customer-Centric Marketing?","tags":["customer onboarding","cx","progressive profiling"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7094017094017093,"src":"/static/ee203bfe806962ecdc0390715d890a1e/33aa5/customer-centric.jpg","srcSet":"/static/ee203bfe806962ecdc0390715d890a1e/f836f/customer-centric.jpg 200w,\n/static/ee203bfe806962ecdc0390715d890a1e/2244e/customer-centric.jpg 400w,\n/static/ee203bfe806962ecdc0390715d890a1e/33aa5/customer-centric.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction In a world where data breaches are becoming the new normal, businesses are exploring new ways to protect customer identities…","fields":{"slug":"/identity/what-is-out-of-band-authentication/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In a world where data breaches are becoming the new normal, businesses are exploring new ways to protect customer identities. At the same time, cybercriminals are finding new ways to sneak into a business network. </p>\n<p>Although identity theft isn’t a new challenge that businesses face every day, the outburst of COVID-19 has increased the number of attacks that can’t be overlooked. </p>\n<p>Hence, <a href=\"https://www.loginradius.com/blog/growth/how-businesses-approach-customer-security/\">securing customer information</a> is becoming more challenging, especially in a remote-first working environment with a poor line of defense. </p>\n<p>However, multi-factor authentication (MFA) and two-factor authentication have been safeguarding customer identities and sensitive information for a long time. And now it’s time for businesses to think about out-of-band-authentication (OOBA) to reinforce security. </p>\n<p>OOB authentication is used as a part of multi-factor authentication (MFA) or 2FA that verifies the identity of a user from two different communications channels, ensuring robust security. </p>\n<p>Let’s look at some aspects of OOBA and why businesses should put their best foot forward in adopting a stringent identity security mechanism in 2022 and beyond. </p>\n<h2 id=\"what-is-out-of-band-authentication-why-is-its-becoming-the-need-of-the-hour\" style=\"position:relative;\"><a href=\"#what-is-out-of-band-authentication-why-is-its-becoming-the-need-of-the-hour\" aria-label=\"what is out of band authentication why is its becoming the need of the hour permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Out-of-Band Authentication? Why is it's Becoming the Need of the Hour?</h2>\n<p>Out-of-band authentication refers to multi-factor authentication requiring a secondary verification mechanism through a different communication channel along with the conventional id and password. </p>\n<p>Cybersecurity experts recommend OOB authentication for high-security requirements where enterprises can’t compromise on consumer identity security and <a href=\"https://www.loginradius.com/blog/identity/corporate-account-takeover-attacks/\">account takeover</a> risks. </p>\n<p>Generally, OOB authentication is a part of MFA, requiring users to verify their identity through two communication channels. The goal is to offer maximum security for customers and businesses in high-risk scenarios.</p>\n<p>Now let’s understand why OOB authentication is swiftly becoming the need for enterprises. </p>\n<p>Since the COVID-19 pandemic has changed how organizations operate and offer access to their critical resources, cyber threats have substantially increased. </p>\n<p>Whether we talk about loopholes in access management or frail lines of defense, businesses have faced losses worth millions in the past couple of years. </p>\n<p>Hence, a robust authentication mechanism is what every business organization needs. And OOB authentication fulfills their security requirements since it works on a dual means of verifying identity through different communication mechanisms. </p>\n<p><a href=\"https://www.loginradius.com/resource/mfa-evolution-ebook/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-MFA\"\n        title=\"WP-MFA\"\n        src=\"/static/d59def8e20e0bca426a84ca47d4f6803/e5715/WP-MFA.png\"\n        srcset=\"/static/d59def8e20e0bca426a84ca47d4f6803/a6d36/WP-MFA.png 650w,\n/static/d59def8e20e0bca426a84ca47d4f6803/e5715/WP-MFA.png 768w,\n/static/d59def8e20e0bca426a84ca47d4f6803/81501/WP-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-does-oob-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-oob-authentication-work\" aria-label=\"how does oob authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does OOB Authentication Work?</h2>\n<p>OOB authentication works on the principle of multi-factor authentication and ensures that business data and user information remains secure even if one line of defense is compromised. </p>\n<p>Let’s learn this through a real-life example. Suppose you’re about to purchase your favorite stuff online and need to pay through internet banking. </p>\n<p>You’ve entered your user id and password for completing the transaction, and now the bank sends a one-time password (OTP) to your phone to complete the transaction. Once you provide the right combination of user id, password, and OTP, your order gets completed. </p>\n<p>However, the essential thing you need to understand is that even if a cybercriminal has access to your user id or password, it cannot complete the transaction without the OTP, which is either sent to your smartphone or through email. </p>\n<p>Hence, the risks for account takeover and fraud are minimized up to a great extent with OOB as attackers couldn’t bypass multiple layers of authentication. </p>\n<p>Some great examples of out-of-band (OOB) authentication include:</p>\n<ul>\n<li>QR codes with encrypted data</li>\n<li>Phone calls for voice authentication</li>\n<li>One-time passwords</li>\n<li>Biometrics, including Face ID and Touch ID</li>\n</ul>\n<h2 id=\"advantages-of-out-of-band-authentication\" style=\"position:relative;\"><a href=\"#advantages-of-out-of-band-authentication\" aria-label=\"advantages of out of band authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Out-of-Band Authentication</h2>\n<p>Out-of-Band Authentication (OOBA) offers several advantages that make it a popular choice for enhancing security in various applications. Firstly, OOBA adds an extra layer of protection by leveraging different communication channels for authentication. </p>\n<p>By utilizing separate channels, such as SMS, email, or phone calls, to verify user identity, it becomes significantly more challenging for attackers to compromise both the primary channel and the out-of-band channel simultaneously.</p>\n<p>Another advantage of OOBA is its ability to detect and prevent various forms of attacks, including phishing, man-in-the-middle attacks, and account takeover attempts.</p>\n<p>By leveraging a secondary channel, users receive authentication codes or confirmations that are distinct from the primary communication channel. This separation reduces the risk of malicious interception and ensures the integrity of the authentication process.</p>\n<p>Furthermore, OOBA enhances user experience by minimizing the need for complex and hard-to-remember passwords. With OOBA, users can rely on simpler passwords and receive secure, one-time authentication codes or prompts through a separate device or communication channel. </p>\n<p>This approach not only increases convenience for users but also mitigates the risk of password-related vulnerabilities, such as weak passwords or password reuse.</p>\n<h2 id=\"challenges-and-limitations-of-out-of-band-authentication\" style=\"position:relative;\"><a href=\"#challenges-and-limitations-of-out-of-band-authentication\" aria-label=\"challenges and limitations of out of band authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges and Limitations of Out-of-Band Authentication</h2>\n<p>While Out-of-Band Authentication offers numerous benefits, it is not without its challenges and limitations. One primary challenge is the dependence on reliable communication channels. </p>\n<p>Since OOBA relies on secondary channels, such as SMS or email, the availability and speed of these channels can affect the user experience. Delays in receiving authentication codes or messages can frustrate users and potentially hinder the authentication process.</p>\n<p>Additionally, OOBA can introduce complexities for users who may be less tech-savvy or have limited access to secondary devices or communication channels. This can be especially true for certain demographics, such as elderly users or individuals in remote areas with limited internet connectivity. </p>\n<p>In such cases, alternative authentication methods or additional support may be necessary.</p>\n<p>Another limitation is the potential vulnerability of the out-of-band channel itself. While using a separate communication channel provides an extra layer of security, it also introduces a new attack surface. </p>\n<p>Attackers may exploit vulnerabilities in the secondary channel, such as intercepting SMS messages or compromising email accounts. Implementers of OOBA must ensure the security and integrity of both the primary and out-of-band channels to mitigate these risks effectively.</p>\n<h2 id=\"examples-of-out-of-band-authentication\" style=\"position:relative;\"><a href=\"#examples-of-out-of-band-authentication\" aria-label=\"examples of out of band authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of Out-of-Band Authentication:</h2>\n<p>Out-of-Band Authentication is widely implemented across various industries and applications. One common example is the two-factor authentication (2FA) process used by many online platforms.</p>\n<p>In this scenario, after entering their username and password, users receive a one-time authentication code via SMS or email. By requiring users to provide this secondary code, the platform ensures an additional layer of verification and minimizes the risk of unauthorized access.</p>\n<p>Another example is the use of out-of-band channels for transaction verification in financial services. When users perform certain high-value transactions, they may receive a phone call to confirm the transaction details or receive a unique authorization code through a separate communication channel.</p>\n<p>This ensures that the user authorizes the transaction securely and protects against fraudulent activities.</p>\n<h2 id=\"use-cases-for-out-of-band-authentication\" style=\"position:relative;\"><a href=\"#use-cases-for-out-of-band-authentication\" aria-label=\"use cases for out of band authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use Cases for Out-of-Band Authentication</h2>\n<p>Out-of-Band Authentication finds applications in a wide range of use cases where enhanced security and identity verification are crucial. One prominent use case is in online banking and financial services. </p>\n<p>By implementing OOBA, banks can protect customer accounts from unauthorized access and fraudulent transactions. Users may receive authentication codes or transaction confirmations via SMS or email, providing an additional layer of security for sensitive financial activities.</p>\n<p>Another use case is in e-commerce platforms and online marketplaces. OOBA can be employed during the checkout process to authenticate users and prevent fraudulent purchases. </p>\n<p>By requiring users to confirm their transactions through an out-of-band channel, such as SMS or email, the platform can verify the legitimacy of the purchase and protect against unauthorized credit card use or account takeover.</p>\n<p>Additionally, OOBA is valuable in remote access scenarios, such as virtual private networks (VPNs) or remote desktop services. Users connecting to corporate networks from outside the office may be required to provide authentication codes received through a separate communication channel, ensuring secure access and preventing unauthorized entry to sensitive systems.</p>\n<h2 id=\"best-practices-for-implementing-out-of-band-authentication\" style=\"position:relative;\"><a href=\"#best-practices-for-implementing-out-of-band-authentication\" aria-label=\"best practices for implementing out of band authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices for Implementing Out-of-Band Authentication:</h2>\n<p>To ensure the effective implementation of Out-of-Band Authentication, several best practices should be followed. Firstly, organizations should carefully select and secure the out-of-band channel. </p>\n<p>This involves encrypting communication, monitoring for potential attacks or anomalies, and keeping software and systems up to date to prevent vulnerabilities.</p>\n<p>Furthermore, it is crucial to provide clear instructions and guidance to users regarding the OOBA process. User education plays a vital role in ensuring smooth authentication and minimizing user confusion or frustration. </p>\n<p>Organizations should communicate the purpose of OOBA, explain the steps involved, and offer support channels for users who may encounter difficulties.</p>\n<p>Regular monitoring and analysis of authentication logs can help detect and respond to suspicious activities promptly. Organizations should establish comprehensive logging mechanisms to capture authentication events, monitor for anomalies or potential breaches, and implement protocols for incident response.</p>\n<p>Lastly, organizations should consider implementing multi-factor authentication (MFA) in conjunction with OOBA. MFA combines multiple authentication factors, such as passwords, biometrics, and out-of-band codes, to provide an even higher level of security. By incorporating MFA, organizations can bolster their security posture and protect against various types of attacks.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Adding multiple authentication layers is now becoming the need of the hour, especially in the most unpredictable times when <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">hackers find new ways to sneak into a business network</a>. </p>\n<p>With out-of-band authentication, businesses can ensure robust security for their customers and their sensitive information, which is always at risk if multiple authentication factors aren’t incorporated. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is the difference between in-bound and out-bound authentication?</strong></p>\n<p>In-bound authentication verifies within the primary channel, while out-bound authentication uses a separate channel for verification.</p>\n<p><strong>2. Is out-of-band secure?</strong></p>\n<p>Yes, out-of-band authentication is secure due to the added layer of protection using a separate communication channel.</p>\n<p><strong>3. Why do you need out-of-band authentication?</strong></p>\n<p>Out-of-band authentication enhances security and protects against attacks by leveraging a secondary channel for verification.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 22, 2022","updated_date":null,"description":"Securing customer information is becoming more challenging, especially in a remote-first working environment with a poor line of defense. OOB authentication is used as a part of multi-factor authentication (MFA) or 2FA that verifies the identity of a user from two different communications channels, ensuring robust security.","title":"What is Out-of-Band Authentication?","tags":["authentication","MFA","customer data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5748031496062993,"src":"/static/011b8497871c09433fcf8812d29a2fe8/33aa5/oob-auth.jpg","srcSet":"/static/011b8497871c09433fcf8812d29a2fe8/f836f/oob-auth.jpg 200w,\n/static/011b8497871c09433fcf8812d29a2fe8/2244e/oob-auth.jpg 400w,\n/static/011b8497871c09433fcf8812d29a2fe8/33aa5/oob-auth.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction In this digital age, data is more critical than ever before. Businesses rely on the right data to make decisions, understand…","fields":{"slug":"/identity/sso-leverage-for-data-collection/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In this digital age, data is more critical than ever before. Businesses rely on the right data to make decisions, understand customers, and improve their products and services. </p>\n<p>But collecting accurate and reliable data can be challenging, especially if you have a large customer base across multiple platforms and devices. Single sign-on (SSO) can be a helpful tool as it allows customers to use one set of credentials to access multiple applications.</p>\n<p>This article will discuss all you need to know about SSO and how it can benefit your data collection efforts. Let's get started.</p>\n<h2 id=\"what-is-single-sign-on\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on\" aria-label=\"what is single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">Single sign-on</a> (SSO) is an authentication method that allows users to access multiple applications with one set of credentials.</p>\n<p>Meaning, with SSO, users can sign in once with their username and password to gain access to all the applications they have permission to use. This eliminates the need to remember multiple credentials and makes it easier to access the applications they need.</p>\n<p>SSO can be used to authenticate users across a variety of devices, including laptops, smartphones, and tablets.</p>\n<p>There are two types of SSO:</p>\n<ol>\n<li><strong>Internal SSO:</strong> Internal SSO allows employees to access multiple applications with a single credential. This is often used in businesses where employees need to access various applications, such as email, file sharing, and customer relationship management (CRM) systems.</li>\n<li><strong>External SSO:</strong> External SSO allows customers to access multiple applications with one set of credentials. This is often used by businesses that offer a suite of online services, such as social media, e-commerce, and webmail.</li>\n</ol>\n<p>In general, SSO can also provide a<a href=\"https://www.loginradius.com/blog/growth/4-tips-secure-frictionless-ux/\"> more secure and frictionless user experience</a>. If you have different applications, it can be difficult for users to set and remember passwords for all of them. With SSO, users would only have to remember one set of credentials. This would make it easier for them to access the applications they need and reduce the chance of forgetting their password.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-SSO\"\n        title=\"DS-SSO\"\n        src=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png\"\n        srcset=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/a6d36/DS-SSO.png 650w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png 768w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/81501/DS-SSO.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"the-importance-of-sso-tokens\" style=\"position:relative;\"><a href=\"#the-importance-of-sso-tokens\" aria-label=\"the importance of sso tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Importance of SSO Tokens</h2>\n<p>An SSO token is a piece of data that allows a user to be authenticated across multiple applications. The token is typically generated by an identity provider (IdP), and then passed to the application the user is trying to access.</p>\n<p>The application will use the information in the token to verify the user's identity and then allow them access to the application.</p>\n<h2 id=\"how-data-collection-fits-in-with-sso\" style=\"position:relative;\"><a href=\"#how-data-collection-fits-in-with-sso\" aria-label=\"how data collection fits in with sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Data Collection Fits in With SSO?</h2>\n<p>Data collection is essential to any business, and leveraging SSO can help make the process more efficient. By using SSO, companies can reduce the number of login credentials that need to be managed, making it easier to collect and store data. </p>\n<p>Some common methods for collecting data include:</p>\n<ul>\n<li><strong>Logging</strong>: This method involves recording events that occur within the system, such as login attempts, resource accesses, and so on. Log data can be used to track user behavior and identify trends.</li>\n<li><strong>Auditing</strong>: This method involves tracking changes made to data within the system. Audit logs can be used to investigate suspicious activity or track down errors.</li>\n<li><strong>Reporting</strong>: This method generates reports on system usage, performance, etc. Reports can be used to monitor trends and identify areas for improvement.</li>\n</ul>\n<h2 id=\"sso-use-cases-in-data-collection\" style=\"position:relative;\"><a href=\"#sso-use-cases-in-data-collection\" aria-label=\"sso use cases in data collection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO Use Cases in Data Collection</h2>\n<p>An interesting benefit of  SSO is that it can be combined with various data collection tools. Here are some use cases of a well-implemented SSO system for data collection.</p>\n<ul>\n<li><strong>Monitoring user behavior:</strong> When you have SSO in place, it becomes relatively easier to monitor the behavior of users. This is because all the activities of a user are logged into a central location. You can use this data to see which resources are being accessed the most, identify patterns in user behavior, and so on.</li>\n<li><strong>Detecting anomalies:</strong> Anomaly detection is another great use case for an SSO system. By monitoring the activity logs, you can easily detect any unusual behavior that might indicate a security breach. For example, if you see a sudden spike in failed login attempts from a particular IP address, it could indicate someone is trying to <a href=\"https://www.loginradius.com/blog/identity/brute-force-lockout/\">brute force</a> their way into the system.</li>\n<li><strong>Improving security:</strong> Security is always a top priority for businesses, and an SSO system can help enhance security in various ways. For example, by monitoring user behavior, you can more easily identify malicious activity and take steps to prevent it. Additionally, using robust authentication methods, such as <a href=\"https://www.loginradius.com/blog/identity/how-to-setup-2fa-in-online-accounts/\">two-factor authentication</a>, makes it more difficult for unauthorized users to gain access to your resources.</li>\n</ul>\n<h2 id=\"advantages-of-using-sso-for-data-collection\" style=\"position:relative;\"><a href=\"#advantages-of-using-sso-for-data-collection\" aria-label=\"advantages of using sso for data collection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Using SSO for Data Collection</h2>\n<p>Let's consider a few advantages of using SSO for data collection.</p>\n<h3 id=\"1-it-is-a-more-efficient-and-secure-way-for-customers-to-access-systems\" style=\"position:relative;\"><a href=\"#1-it-is-a-more-efficient-and-secure-way-for-customers-to-access-systems\" aria-label=\"1 it is a more efficient and secure way for customers to access systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. It is a more efficient and secure way for customers to access systems.</h3>\n<p>With SSO, the customer only has to remember one credential – their SSO login, which can also be associated with another account they most commonly use. This would make it more convenient for them to access their account and reduce the chance of forgetting their password.</p>\n<p>This applies to any website that provides services that require a login. </p>\n<p>Let's say customers need to log in to access a sample invoice template and other accounting resources on one's site. </p>\n<p>If we assume the template is in a PDF format and is behind a paywall, the customer must input their account details to access the content.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.6171875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"sample-invoice\"\n        title=\"sample-invoice\"\n        src=\"/static/c191df14583a45bc485ee429a86fc71d/01e7c/sample-invoice.png\"\n        srcset=\"/static/c191df14583a45bc485ee429a86fc71d/01e7c/sample-invoice.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Without an SSO system, the customer would have to remember their username and password for your site. If they can't recall their login credentials, they'll have to go through the process of resetting their password. </p>\n<p>Since such a company deals with financial data, it's also essential to have a secure way of handling customer login information.</p>\n<h3 id=\"2-less-chance-of-password-fatigue\" style=\"position:relative;\"><a href=\"#2-less-chance-of-password-fatigue\" aria-label=\"2 less chance of password fatigue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Less chance of password fatigue.</h3>\n<p>This is also a great point to consider regarding your employees. With employee productivity statistics showing that employees do as much as 3.4 hours of multitasking daily, it can be easy for employees to get complacent at work.</p>\n<p>If they have to remember multiple passwords for different systems, it can lead to password fatigue, which leads to them using the same password for multiple accounts or writing down their passwords. Both of these scenarios pose serious security risks.</p>\n<p>With SSO, your employees only have to remember one set of credentials. This can reduce the risk of password fatigue and improve employee productivity.</p>\n<h3 id=\"3-reduced-support-costs\" style=\"position:relative;\"><a href=\"#3-reduced-support-costs\" aria-label=\"3 reduced support costs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Reduced support costs.</h3>\n<p>Another business advantage of SSO is that it can help reduce support costs.</p>\n<p>This is because customers will no longer need to contact customer support often to reset their passwords or troubleshoot login issues. Additionally, employees can resolve their password issues without contacting IT for assistance.</p>\n<h3 id=\"4-improved-security\" style=\"position:relative;\"><a href=\"#4-improved-security\" aria-label=\"4 improved security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Improved security.</h3>\n<p>Since an SSO system uses a central database of user credentials, it's easier to implement robust authentication methods, such as <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a>.</p>\n<p>This can help reduce the risk of unauthorized users gaining access to your systems and sensitive data. Additionally, you can more easily identify and prevent malicious activity by monitoring user activity.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Overall, using SSO for data collection can offer many benefits for businesses. It can simplify the login process for customers and employees, reduce support costs, and improve security - all while following current protocols that are used by both small businesses and large enterprises. </p>\n<p>If you're looking for a more efficient and secure way to collect data, consider implementing an SSO system in your business.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 19, 2022","updated_date":null,"description":"SSO is a great way to collect data while providing a better user experience and increasing security. This blog will help you get the most out of SSO for data collection, ensuring that your data is collected effectively and efficiently.","title":"How Can Enterprises Use SSO to Boost Data Collection?","tags":["sso","mfa","data collection","ux"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3071895424836601,"src":"/static/be9a2c0b89e08cfcdd0d6fa85c070d1d/33aa5/sso-leverage.jpg","srcSet":"/static/be9a2c0b89e08cfcdd0d6fa85c070d1d/f836f/sso-leverage.jpg 200w,\n/static/be9a2c0b89e08cfcdd0d6fa85c070d1d/2244e/sso-leverage.jpg 400w,\n/static/be9a2c0b89e08cfcdd0d6fa85c070d1d/33aa5/sso-leverage.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Hanson Cheng","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction A never-ending registration form is the least favorite thing that you would like to see when you land on a website for the…","fields":{"slug":"/growth/progressive-profiling-lead-generation-tool/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>A never-ending registration form is the least favorite thing that you would like to see when you land on a website for the first time. The same goes for your potential customers! </p>\n<p>Users don’t prefer sharing their personal information in the first interaction, which is why most of them switch in a couple of seconds —leading to poor lead quality. </p>\n<p>Though customer information is the fuel to keep a business up and running, enterprises need to understand that they must find a better way to collect valuable information without annoying the users. </p>\n<p>Here’s where the critical role of <a href=\"https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/\">progressive profiling</a> comes into play! </p>\n<p>Progressive profiling ensures valuable information about a user is gradually collected over time so that it doesn’t create friction while a user lands on a platform, which enhances the overall quality and number of leads. </p>\n<p>Let’s understand in detail what role progressive profiling play in <a href=\"https://www.loginradius.com/blog/growth/sign-up-tips-conversion-rate/\">improving overall lead quality</a> and quantity. </p>\n<h2 id=\"what-is-progressive-profiling\" style=\"position:relative;\"><a href=\"#what-is-progressive-profiling\" aria-label=\"what is progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Progressive Profiling?</h2>\n<p>Progressive profiling is the method of collecting personal information about the client step-by-step. It helps the digital marketing team to streamline the lead nurturing process by gathering increasingly specific client data.</p>\n<p>The best thing about progressive profiling is that the same question won't repeat twice. For example, if the lead has already provided their email address, name, and phone number, they won't be asked for it again.</p>\n<p>Instead, when the lead arrives on the landing page for the second time, they will be asked different questions like their company name, home address, and much more.</p>\n<p>In this way, digital marketing teams obtain several data points about a lead without annoying or overwhelming them with long forms in the first interaction itself.</p>\n<p>Hence, if a business strives for quality leads, it must incorporate the true potential of progressive profiling that eventually helps generate quality leads. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-to-squeeze-every-drop-of-progressive-profiling/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-progressive-profiling\"\n        title=\"EB-progressive-profiling\"\n        src=\"/static/36e781d8b7ee8af244f0c5bffb9401dc/e5715/EB-progressive-profiling.png\"\n        srcset=\"/static/36e781d8b7ee8af244f0c5bffb9401dc/a6d36/EB-progressive-profiling.png 650w,\n/static/36e781d8b7ee8af244f0c5bffb9401dc/e5715/EB-progressive-profiling.png 768w,\n/static/36e781d8b7ee8af244f0c5bffb9401dc/81501/EB-progressive-profiling.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"why-your-business-needs-progressive-profiling-in-2022-and-beyond\" style=\"position:relative;\"><a href=\"#why-your-business-needs-progressive-profiling-in-2022-and-beyond\" aria-label=\"why your business needs progressive profiling in 2022 and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Your Business Needs Progressive Profiling in 2022 and Beyond</h2>\n<p>In a highly competitive business landscape, where buyers have plenty of options, standing ahead of the curve becomes the need of the hour for every enterprise seeking growth. </p>\n<p>With progressive profiling, enterprises can ensure that intelligent forms</p>\n<ul>\n<li>Ask only unanswered questions that save time and effort otherwise spent on creating multiple forms.</li>\n<li>Collect critical consumer information that reveals hidden insights.</li>\n<li>That the visitor can fill within a few seconds.</li>\n</ul>\n<p>Here are the details of other business benefits of incorporating progressive profiling into your business: </p>\n<h3 id=\"1-qualifying-leads\" style=\"position:relative;\"><a href=\"#1-qualifying-leads\" aria-label=\"1 qualifying leads permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Qualifying leads</h3>\n<p>Progressive profiling allows marketers to collect critical information about their clientele and build unique consumer personas. It helps determine where a particular consumer is in the buying journey and decide the best action to move them towards the final purchasing stage.</p>\n<h3 id=\"2-fine-tune-buyer-personas\" style=\"position:relative;\"><a href=\"#2-fine-tune-buyer-personas\" aria-label=\"2 fine tune buyer personas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Fine-tune buyer personas</h3>\n<p>Your marketing team will be able to craft effective marketing strategies that connect with the consumer. They will streamline the <a href=\"https://www.loginradius.com/blog/growth/ott-authentication-boost-lead-generation-2022/\">lead generation</a> process based on the actual data points such as company size, job role, industry, location, etc., instead of making educated guesses.</p>\n<h3 id=\"3-accelerates-the-buying-journey\" style=\"position:relative;\"><a href=\"#3-accelerates-the-buying-journey\" aria-label=\"3 accelerates the buying journey permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Accelerates the buying journey</h3>\n<p>Profiling provides hidden insights about consumers that help to personalize marketing efforts and build trust. You will be able to craft messages that motivate consumers to move ahead in the sales funnel.</p>\n<h3 id=\"4-increase-conversion-rate\" style=\"position:relative;\"><a href=\"#4-increase-conversion-rate\" aria-label=\"4 increase conversion rate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Increase conversion rate</h3>\n<p>Developing unique consumer personas will significantly increase your chance of finalizing the deal. But thorough signup forms can scare away the consumer. Also, your conversion rate will substantially increase with a decrease in the number of fields in the innovative form.</p>\n<h3 id=\"5-optimize-sales-time\" style=\"position:relative;\"><a href=\"#5-optimize-sales-time\" aria-label=\"5 optimize sales time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Optimize sales time</h3>\n<p>The marketing team can significantly decrease sales time by asking more relevant questions to their consumers as they move forward in their buying journey. Progressive profiling allows sending qualified leads to the sales team, ultimately impacting the company's bottom line.</p>\n<h2 id=\"to-sum-up\" style=\"position:relative;\"><a href=\"#to-sum-up\" aria-label=\"to sum up permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Sum Up</h2>\n<p>In the modern digital business landscape, when competition is neck-to-neck, businesses leveraging technology to the fullest would be able to meet customers' demands. </p>\n<p>And if customers are bombarded with registration forms when they land on your website/app, you’ll surely lose your potential customers. </p>\n<p>Progressive profiling is undeniably the best way to nurture and improve the quality of leads, which helps businesses enhance their overall growth and revenues. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 15, 2022","updated_date":null,"description":"Progressive profiling ensures valuable information about a user is gradually collected over time so that it doesn’t create friction while a user lands on a platform, which enhances the overall quality and number of leads. This blog explains the role of progressive profiling in improving overall lead quality and quantity.","title":"How Progressive Profiling Reduces Registration Fatigue and Improves Lead Quality?","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3513513513513513,"src":"/static/b8febc707d2b64a1f66dc47734304f84/33aa5/lead-gen.jpg","srcSet":"/static/b8febc707d2b64a1f66dc47734304f84/f836f/lead-gen.jpg 200w,\n/static/b8febc707d2b64a1f66dc47734304f84/2244e/lead-gen.jpg 400w,\n/static/b8febc707d2b64a1f66dc47734304f84/33aa5/lead-gen.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"A secure and frictionless user experience is what’s swiftly becoming the need of the hour. And here’s where the critical role of…","fields":{"slug":"/identity/passwordless-going-navigate-business-success/"},"html":"<p>A secure and frictionless user experience is what’s swiftly becoming the need of the hour. And here’s where the critical role of passwordless experience comes to play. </p>\n<p>User experience begins the moment a user lands on a website or an application. In a nutshell, if a platform cannot deliver a smooth onboarding experience or frictionless surfing experience, it’ll lose a potential customer. </p>\n<p>Whether it’s a little friction in <a href=\"https://www.loginradius.com/blog/identity/what-is-login-authentication/\">login authentication</a> or user fatigue in filling massive registration forms, everything counts when it comes to a bad user experience. </p>\n<p>Also, it doesn’t matter the quality of products or services you’re offering; if a user isn’t happy with your first greet, they’ll switch. </p>\n<p>So, what could be the best solution to deal with login authentication issues and shun registration fatigue? Well, here is where passwordless technology comes to the rescue!</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless authentication</a> eliminates the need to remember passwords since users can authenticate and log in to their accounts or even sign-up for a platform without using user ids and passwords. </p>\n<p>Passwordless authentication, if implemented through a consumer identity and access management (CIAM) solution, can help mitigate the registration fatigue. </p>\n<p>Let’s look at some aspects that depict the importance of going passwordless and why businesses should immediately put their best efforts into offering a no password experience. </p>\n<h2 id=\"what-is-passwordless-authentication-why-is-it-crucial-in-2022\" style=\"position:relative;\"><a href=\"#what-is-passwordless-authentication-why-is-it-crucial-in-2022\" aria-label=\"what is passwordless authentication why is it crucial in 2022 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Passwordless Authentication? Why is it Crucial in 2022?</h2>\n<p>A passwordless authentication system swaps the use of a <a href=\"https://www.loginradius.com/blog/identity/what-is-standard-login/\">traditional password</a> with more secure factors. These extra-security methods may include a magic link, fingerprint, PIN, or a secret token delivered via email or text message.</p>\n<p>Users find it easier to authenticate themselves without remembering passwords for different accounts. And this contributes to a great user experience from the moment a user first interacts with a platform. </p>\n<p>Apart from the user experience perspective, passwordless authentication is swiftly becoming the preferred authentication method among businesses seeking ways to protect consumer identities and sensitive business information. Let’s understand how. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ds-passwordless\"\n        title=\"ds-passwordless\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/ds-passwordless.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/ds-passwordless.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/ds-passwordless.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/ds-passwordless.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-passwordless-experience-thrives-business-growth\" style=\"position:relative;\"><a href=\"#how-passwordless-experience-thrives-business-growth\" aria-label=\"how passwordless experience thrives business growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Passwordless Experience Thrives Business Growth?</h2>\n<p>With passwordless login, you can create a completely frictionless registration and authentication process for your customers, freeing them from the hassle of remembering yet another password. Hence, you get returning customers. </p>\n<p>Apart from this, if passwordless authentication is implemented through a CIAM solution, enterprises can get endless business benefits, including progressive profiling. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/\">Progressive profiling</a> is the method of collecting personal information about the client step-by-step. It helps the digital marketing team streamline the lead nurturing process by gathering increasingly specific client data.</p>\n<p>The perfect symphony of passwordless authentication and progressive profiling helps businesses generate more leads and convert them, further promoting overall business growth. </p>\n<h2 id=\"passwordless-authentication-from-the-lens-of-cisos-and-it-experts\" style=\"position:relative;\"><a href=\"#passwordless-authentication-from-the-lens-of-cisos-and-it-experts\" aria-label=\"passwordless authentication from the lens of cisos and it experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Authentication from the Lens of CISOs and IT Experts</h2>\n<p>With the increasing number of cybersecurity threats and rapid cloud computing, businesses are now worrying about their sensitive business information and customer details. </p>\n<p>With passwords out of the picture, the following are a few attacks that businesses can dodge by implementing passwordless authentication into their systems. </p>\n<p>Cyber attacks and threats could lead to losses worth millions of dollars and even cause reputational damages. Here are some of the most <a href=\"https://www.loginradius.com/blog/identity/cloud-computing-security-challenges/\">common security threats</a> that can be prevented with a passwordless authentication:</p>\n<ol>\n<li><strong>Password Spraying:</strong> It is a method of cyber-attack that attempts to log in to many accounts with commonly used password credentials.</li>\n<li><strong>Brute Force Attack:</strong> Hackers use the trial-and-error method to guess the login credentials or encryption keys. They try all the possible combinations until the account is hacked.</li>\n<li><strong>Spear Phishing</strong> is an email spoofing attack that scams organizations and individuals into giving away sensitive credentials for financial, military or trade gains.</li>\n<li><strong>Social Engineering:</strong> Hackers use psychological manipulation and scam users to give away sensitive information or grant access to critical resources.</li>\n<li><strong>Shoulder Surfing:</strong> It is a type of data theft where the intruder steals login credentials by peeking over the target's shoulder.</li>\n</ol>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Passwordless authentication is undeniably becoming the need of the hour, both from an information security and user experience perspective. </p>\n<p>Hence, businesses need to understand the importance of passwordless authentication since compromising user experience and security could be fatal for any organization. </p>\n<p>Businesses leveraging cutting-edge authentication technologies always stand ahead of their competitors since their customers enjoy a seamless user experience reinforced by robust security.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 13, 2022","updated_date":null,"description":"Whether it’s a little friction in login authentication or user fatigue in filling massive registration forms, everything counts when it comes to a bad user experience. Let’s uncover the importance of going passwordless for enterprises.","title":"Why Your Business Needs A Simple Passwordless Experience (Minus the User Friction)","tags":["passwordless","login security","progressive profiling"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4705882352941178,"src":"/static/64cefe81bb18a45e60aace2547d65bbb/33aa5/passwordless-business.jpg","srcSet":"/static/64cefe81bb18a45e60aace2547d65bbb/f836f/passwordless-business.jpg 200w,\n/static/64cefe81bb18a45e60aace2547d65bbb/2244e/passwordless-business.jpg 400w,\n/static/64cefe81bb18a45e60aace2547d65bbb/33aa5/passwordless-business.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction The global tech giant Apple has recently announced a new “lockdown mode” for their iPhone, iPad, and Mac computers to enhance…","fields":{"slug":"/identity/apple-lockdown-mode-robust-security/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The global tech giant Apple has recently announced a new “lockdown mode” for their iPhone, iPad, and Mac computers to enhance protection against spyware launched by state-sponsored attacks. </p>\n<p>The ‘lockdown mode’ is considered a giant leap as a part of their information security for protecting operating systems of iPhone, iPad, and Mac against various threats, including spyware. </p>\n<p>As per the officials from Apple, the ‘lockdown mode, when enabled, reinforces the overall security system and restricts certain functions to protect users. </p>\n<p>Let’s understand what a state-sponsored attack is and how this new feature in Apple devices would work to protect critical customer information. </p>\n<h2 id=\"what-are-state-sponsored-attacks\" style=\"position:relative;\"><a href=\"#what-are-state-sponsored-attacks\" aria-label=\"what are state sponsored attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are State-Sponsored Attacks?</h2>\n<p>State-sponsored cyberattacks (SSA) are attacks directly linked to a particular nation or state. The goal is to exploit national infrastructure vulnerabilities, exploit systems, or gather intelligence. </p>\n<p>These attacks usually target a specific group of people that can be spied on to gather critical information regarding a nation’s strategies or other sensitive information that can be exploited for financial benefit. </p>\n<p>Various states employ hackers through their government authorities or militaries, making it easier to deny any state involvement even if an attack is detected. </p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Zerotrust-1\"\n        title=\"WP-Zerotrust-1\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-Zerotrust-1.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-Zerotrust-1.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-Zerotrust-1.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-Zerotrust-1.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-does-apples-lockdown-mode-work\" style=\"position:relative;\"><a href=\"#how-does-apples-lockdown-mode-work\" aria-label=\"how does apples lockdown mode work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Apple’s ‘Lockdown Mode’ Work?</h2>\n<p>The ‘<a href=\"https://www.apple.com/newsroom/2022/07/apple-expands-commitment-to-protect-users-from-mercenary-spyware/\">lockdown mode</a>’ will eventually protect Apple users, regardless of their device, against spyware that state-backed cybercriminals can launch on various devices. </p>\n<p>As per the company’s representatives, the ‘lockdown mode’ will serve as an emergency button that a small number would require of users. It will be the last resort for users that can be targeted by spyware, as this feature would disable many other features. </p>\n<p>However, the users can quickly turn on and off the ‘lockdown mode’ whenever they wish to. </p>\n<p>Currently, the feature is available in the beta version of the operating system so that the company can work on fixing bugs and weaknesses. </p>\n<p>Apart from this, Apple has claimed that it will add more new features and more robust protections to the newly-launched ‘lockdown mode’ in upcoming months. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With the increasing number of spyware and state-sponsored attacks affecting users and a nation's overall security and privacy, the ‘lockdown mode’ would surely help secure devices and users to a great extent. </p>\n<p>However, the underlying risks associated with state-sponsored attacks can’t be overlooked. Hence, users must understand the underlying security risks and take necessary precautions while using different devices. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 07, 2022","updated_date":null,"description":"The ‘lockdown mode’ is considered a giant leap as a part of their information security for protecting operating systems of iPhone, iPad, and Mac against various threats, including spyware. Let’s understand what a state-sponsored attack is and how this new feature in Apple devices would work to protect critical customer information.","title":"Will Apple’s ‘Lockdown Mode’ Reduce State-Sponsored Attacks?","tags":["cyberattacks","apple","zero trust"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3986013986013985,"src":"/static/826409dcd96657357d8d577b01c3dd75/33aa5/apple-inc.jpg","srcSet":"/static/826409dcd96657357d8d577b01c3dd75/f836f/apple-inc.jpg 200w,\n/static/826409dcd96657357d8d577b01c3dd75/2244e/apple-inc.jpg 400w,\n/static/826409dcd96657357d8d577b01c3dd75/33aa5/apple-inc.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":228,"currentPage":39,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}