{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/57","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction In any business, it is crucial to keep trade secrets confidential. Companies implement laws for data preservation while…","fields":{"slug":"/growth/prevent-identity-disclosure-spiderman/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In any business, it is crucial to keep trade secrets confidential. Companies implement laws for data preservation while handling sensitive information. Along with these laws, employees need to be reassured that the information is retained in an appropriate space. Disclosure of the consumer's identity can be due to any breach of privacy. Such a breach can lead to loss of business, market reputation, and clients. Also, such acts destroy the employees' trust and impact their loyalty towards the company. To avoid such huge losses, you must <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">apply strict data protection rules</a> while dealing with private information.  </p>\n<p>You can easily relate the loss in this situation with the story of Spiderman. <strong>Identity disclosure</strong> of Spiderman was a turning point in the story. Before this event, everything was smooth sailing in Spiderman's life; however, things went downhill when his true identity was revealed. </p>\n<h2 id=\"what-happened-after-the-identity-disclosure-of-spiderman\" style=\"position:relative;\"><a href=\"#what-happened-after-the-identity-disclosure-of-spiderman\" aria-label=\"what happened after the identity disclosure of spiderman permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Happened After the Identity Disclosure of Spiderman</h2>\n<p>Peter supported the Superhuman Registration Act and worked as a superhero. He unmasked himself in public to reveal his identity and his association with Stark. Initially, revealing the identity brought an abundance of popularity and praise for Spiderman; however, it did not turn out as expected. </p>\n<p>With time, Peter understood that he had made a big mistake. After his big identity reveal, Peter Parker faced a bundle of troubles in his personal life. His Aunt May and Mary Jane were at risk all the time. Also, this event destroyed his relationship with Mary Jane and cancelled their marriage. Due to all these controversies, Peter Parker's initial glory went for a toss, and he ended up in a constant state of dread.</p>\n<h2 id=\"what-are-the-consequences-of-identity-disclosure-in-business\" style=\"position:relative;\"><a href=\"#what-are-the-consequences-of-identity-disclosure-in-business\" aria-label=\"what are the consequences of identity disclosure in business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Consequences of Identity Disclosure in Business</h2>\n<p>Just as Spiderman struggles in Spider-Man: No Way Home, for any business too, identity disclosure can be destructive as it can lead to multiple losses. The major consequences of disclosure of identity for an enterprise are:</p>\n<h3 id=\"1-trust-of-clients\" style=\"position:relative;\"><a href=\"#1-trust-of-clients\" aria-label=\"1 trust of clients permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Trust of clients</h3>\n<p>Once you disclose the identity of a consumer, it will lead to other existing clients losing faith in your company. If clients do not believe in your services, they will not recommend you to others. Thus, the chances of the <a href=\"https://www.loginradius.com/blog/fuel/how-customer-retention-can-help-businesses-grow/\">growth of your business</a> will reduce drastically, which in turn can lead to bankruptcy in extreme conditions. </p>\n<h3 id=\"2-business-reputation\" style=\"position:relative;\"><a href=\"#2-business-reputation\" aria-label=\"2 business reputation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Business reputation</h3>\n<p>The identity disclosure of a consumer will damage a business' market reputation. Maintaining relationships with clients keeps your business booming, however, one incident of identity theft can hinder your cash flow. Such an incident will also impact employees' payment cycles and influence your reputation before them, affecting their loyalty towards the company.</p>\n<h3 id=\"3-personal-liability\" style=\"position:relative;\"><a href=\"#3-personal-liability\" aria-label=\"3 personal liability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Personal liability</h3>\n<p>When dealing with personal information in business, it is crucial to be extra careful to prevent identity disclosure. Any criminal breach of your business information will harm your personal liability and can disturb your survival in the market. </p>\n<h3 id=\"4-late-payments\" style=\"position:relative;\"><a href=\"#4-late-payments\" aria-label=\"4 late payments permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Late payments</h3>\n<p>In a business theft, if you lose a significant amount of income, it will cause a delay in the salaries of the employees and other staff members. There might be certain situations where you might need to cut your operating expenses and reduce your budget. In some cases, the thieves can also impact your business credit score. Thus, it will draw your credit reports into negative scores. Such an event can drastically shake the trust of people for your company.             </p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-Mod-Cust-ID\"\n        title=\"EB-GD-to-Mod-Cust-ID\"\n        src=\"/static/e8ca49370e6ab28514cbd05ef77951af/e5715/EB-GD-to-Mod-Cust-ID.png\"\n        srcset=\"/static/e8ca49370e6ab28514cbd05ef77951af/a6d36/EB-GD-to-Mod-Cust-ID.png 650w,\n/static/e8ca49370e6ab28514cbd05ef77951af/e5715/EB-GD-to-Mod-Cust-ID.png 768w,\n/static/e8ca49370e6ab28514cbd05ef77951af/81501/EB-GD-to-Mod-Cust-ID.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-recover-from-identity-disclosure-in-business\" style=\"position:relative;\"><a href=\"#how-to-recover-from-identity-disclosure-in-business\" aria-label=\"how to recover from identity disclosure in business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Recover from Identity Disclosure in Business</h2>\n<p>If you have been a victim of identity disclosure, you will end up in danger of compromised information. However, there are a few points that will help you in recovering from identity misuses. </p>\n<ul>\n<li>Alert the business credit bureaus so that they can stop the use of business information by the fraudsters. </li>\n<li>Report your case to the local police station. </li>\n<li>Keep an eye out for any suspicious behaviour of anyone in the company. </li>\n</ul>\n<h2 id=\"tips-to-prevent-identity-disclosure-in-business\" style=\"position:relative;\"><a href=\"#tips-to-prevent-identity-disclosure-in-business\" aria-label=\"tips to prevent identity disclosure in business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tips to Prevent Identity Disclosure in Business</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 52.307692307692314%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"1\"\n        title=\"1\"\n        src=\"/static/04ab4b6ee52b016dc6ee159b35e2e203/212bf/1.jpg\"\n        srcset=\"/static/04ab4b6ee52b016dc6ee159b35e2e203/6aca1/1.jpg 650w,\n/static/04ab4b6ee52b016dc6ee159b35e2e203/212bf/1.jpg 768w,\n/static/04ab4b6ee52b016dc6ee159b35e2e203/e5166/1.jpg 1200w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/security/\">Protecting the identities of users</a> is critical for any business. Mentioned below are a few methods to prevent identity disclosure as a business:</p>\n<ul>\n<li><strong>A switch to digital payments</strong>: Switching to digital modes of transaction ensures you close one of the susceptibility areas for your business.</li>\n<li><strong>Ensure you use strong passwords and tools like MFA</strong>: Tools like MFA and <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive authentication</a> ensure your accounts are protected at all times. Depending on your risk factors, tools like adaptive authentication can increase the authentication requirements.</li>\n<li><strong>Adopt the best digital security practices</strong>: In today’s digital world, you must use strong firewalls and train your employees to use the best digital security practices.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius</a> provides you with the perfect tools to secure your identity. Being the world's first no-code identity platform, it ensures seamless data security to its customers. The platform supports global regulatory compliance to deliver frictionless customer experience. A few of the common ones are:</p>\n<ul>\n<li><strong>PCI DSS-PCI SSC</strong> administered standard for payment transactions.</li>\n<li><strong>ISO 27001:2013</strong> – Information security management system.</li>\n<li><strong>ISO 27017:2015</strong> – Information security for cloud services.</li>\n<li><strong>ISO/IEC 27018:2019</strong> – PII Protection.</li>\n<li><strong>US Privacy Shield</strong> - Complaint resolution for EEA citizens.</li>\n<li><strong>NIST Cybersecurity Framework</strong> – Standardized security framework to manage and reduce cybersecurity risk.</li>\n<li><strong>ISAE 3000</strong> – International attestation standard for assurance over non-financial information.</li>\n<li><strong>AICPA SOC 2 (Type II)</strong> – System-level controls for Trust Services Criteria – security, availability, process integrity, confidentiality, and privacy.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Your consumer data privacy and security plan should keep up with technological advancements and the rise of cyber-attacks. To future-proof your consumer data protection plan, consider investing in accordance with the most recent regulations. <a href=\"https://www.loginradius.com/contact-sales\">Contact us</a> for more information on how we have been securing billions of identities globally. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 02, 2021","updated_date":null,"description":"What's most challenging about identity disclosure is that it is not only hard to avoid but also very difficult to repair once it has been disclosed. So, don't wait for a Mysterio to mess up your consumers’ identities! Security is just a click away with LoginRadius.","title":"Not Sure About Spiderman, But You Can Prevent Identity Disclosure","tags":["data security","adaptive authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7391304347826086,"src":"/static/70a840bfddf1c24c4761b99d75692280/14b42/spiderman.jpg","srcSet":"/static/70a840bfddf1c24c4761b99d75692280/f836f/spiderman.jpg 200w,\n/static/70a840bfddf1c24c4761b99d75692280/2244e/spiderman.jpg 400w,\n/static/70a840bfddf1c24c4761b99d75692280/14b42/spiderman.jpg 800w,\n/static/70a840bfddf1c24c4761b99d75692280/16310/spiderman.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Single-tenant and multi-tenant cloud architectures represent two core approaches to managing SaaS environments, each with unique benefits…","fields":{"slug":"/engineering/saas-single-tenancy-vs-multi-tenancy/"},"html":"<p>Single-tenant and multi-tenant cloud architectures represent two core approaches to managing SaaS environments, each with unique benefits depending on how resources and infrastructure are utilized. In a single-tenant cloud, each customer has their own dedicated environment, offering greater control, data security, and customization. Meanwhile, multi-tenant cloud architecture allows multiple customers to share the same infrastructure, driving down costs and enabling faster, more frequent updates.\nHence, choosing the right cloud architecture is crucial for your business. </p>\n<p>This article comprehensively compares SaaS-based multi-tenant and single-tenant cloud architectures along with their benefits and drawbacks. The comprehension also points out which one to choose based on the organization’s requirements and scenario.</p>\n<h2 id=\"single-tenant-cloud-architecture\" style=\"position:relative;\"><a href=\"#single-tenant-cloud-architecture\" aria-label=\"single tenant cloud architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Single-Tenant Cloud Architecture</h2>\n<p><a href=\"https://www.loginradius.com/private-cloud/\">A single-tenant architecture</a>  dedicates a single instance of the software, infrastructure, or database to a single customer. The single-tenant system encapsulates all customer data and interactions distinctly from other customers. Moreover, customer information is not shared in any way.</p>\n<p>In a single-tenant architecture, the provider helps manage the software instance and dedicated infrastructure while giving a single-tenant nearly complete flexibility over software and infrastructure modification. Single-tenancy models provide control, reliability, security, and backup capability. In addition, each tenant has its independent database and software instance, keeping them separate from one another. Each tenant's data also has a remote backup, allowing tenants to restore their data in case of data loss quickly. In most cases, tenants can choose when they want to install any available updates themselves rather than waiting for the service provider to do so.</p>\n<p>Ultimately, potential customers who desire more control and flexibility to meet specific needs in their environment would likely prefer a single-tenant infrastructure over other solutions.</p>\n<h3 id=\"benefits-of-single-tenancy\" style=\"position:relative;\"><a href=\"#benefits-of-single-tenancy\" aria-label=\"benefits of single tenancy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Single-Tenancy</h3>\n<p>Although single-tenancy architecture is uncommon, it caters to easy auditing and maintenance. Here is the list of some other benefits a single-tenant cloud provides:</p>\n<ul>\n<li><strong>Excellent Reliability:</strong> Single-tenant architectures are typically more reliable because one software instance serves one customer. So the entire system remains unaffected by other cloud traffic and peak load performance. Also, it becomes easier to scale as compared to the multi-tenant. Moreover, one can configure In-transit Network Routing in single-tenancy.</li>\n<li><strong>Enhanced Data Security:</strong> Single-tenant cloud architecture separates application instances and supporting components like database and infrastructure for each customer within the same provider. So, there is no way for others outside of your organization to access your data in case of vulnerability. As a result, even if a customer with the same service provider experiences a data breach, other tenants remain protected.</li>\n<li><strong>Simplified Migration:</strong> It is easier to migrate data from a single-tenant architecture since the data store contains data from a single customer. One does not need to think about mixing customer data or using complicated migration scripts.</li>\n<li><strong>Easy Customizations:</strong> In the case of SaaS, mainly the services are thoroughly managed by the service provider’s team. However, the service provider can give dedicated server access to customers in the case of single-tenant—for example; server logs access to customers. The same level of ownership or customization cannot be provided for multi-tenant customers.</li>\n</ul>\n<h3 id=\"drawbacks-of-single-tenancy\" style=\"position:relative;\"><a href=\"#drawbacks-of-single-tenancy\" aria-label=\"drawbacks of single tenancy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Drawbacks of Single-Tenancy</h3>\n<p>Despite all of the potential benefits of single-tenancy, it is still the least popular architecture among competing options, which you could attribute to some of its drawbacks. The following are some of the disadvantages of single-tenancy:</p>\n<ul>\n<li><strong>Higher Costs:</strong> Hosting one SaaS instance per customer increases the cost due to setup time, resources, customization, and maintenance.</li>\n<li><strong>Lesser Deployments:</strong> While releasing customer-specific updates and features, all customer benefits in case of multi-tenant. Such feature updates are not generally released for single-tenant customers because of their separate application instances and related components.</li>\n</ul>\n<p><strong><a href=\"https://www.loginradius.com/resource/ebook/single-tenant-vs-multi-tenant-business/\">Single-Tenant or Multi-Tenant SaaS: Which is Better for Your Business</a></strong></p>\n<h2 id=\"multi-tenant-cloud-architecture\" style=\"position:relative;\"><a href=\"#multi-tenant-cloud-architecture\" aria-label=\"multi tenant cloud architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Tenant Cloud Architecture</h2>\n<p><a href=\"https://www.loginradius.com/multi-tenant-cloud/\">Multi-tenancy</a> is another cloud architecture wherein a single instance of a software program serves numerous customers. People usually refer to the real estate analogy to explain Single-tenant vs. Multi-tenant cloud architecture.</p>\n<p>Every user in a single-tenant cloud lives alone in a single building with its security system and amenities, entirely secluded from neighboring buildings. Tenants in multi-tenant cloud architecture, on the other hand, live in various apartments within a single apartment complex. They are both protected by the same security system and have access to the same communal facilities. However, each resident has a key to their apartment, ensuring that their privacy is protected. The actions of other tenants, however, are more likely to affect their comfort in the property.</p>\n<p>Most startups choose a multi-tenant architecture having a single massive database containing all customer information. Customer data is kept confidential with the necessary security systems in place. While customers cannot view each other's data, they are all stored in the same database, and all of the data gets processed by the same computer.</p>\n<h3 id=\"benefits-of-multi-tenancy\" style=\"position:relative;\"><a href=\"#benefits-of-multi-tenancy\" aria-label=\"benefits of multi tenancy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Multi-Tenancy</h3>\n<ul>\n<li><strong>Lower Costs:</strong> SaaS allows businesses of all sizes to share infrastructure and data center operations expenditures, resulting in lower prices. It also reduces infrastructure implications as compared to single-tenancy-hosted solutions.</li>\n<li><strong>Frequent Deployments:</strong> All customers get the feature updates when SaaS vendors release features in a multi-tenancy environment, even if a specific multi-tenancy customer initially requested the feature.</li>\n</ul>\n<p>In contrast, the single-tenancy customer does not benefit from such scenarios.</p>\n<h3 id=\"drawbacks-of-multi-tenancy\" style=\"position:relative;\"><a href=\"#drawbacks-of-multi-tenancy\" aria-label=\"drawbacks of multi tenancy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Drawbacks of Multi-Tenancy</h3>\n<p>While multi-tenant cloud architecture is usually the best option for most SaaS customers, it can have <a href=\"https://web.archive.org/web/20150221181153/http://se2.informatik.uni-wuerzburg.de/pa/uploads/papers/paper-371.pdf\">some drawbacks</a>, including:</p>\n<ul>\n<li>\n<p><strong>Greater Security Risk:</strong> As different customers share resources, the risk factor in a multi-tenant setup increases. In contrast to a single-tenant cloud, where security events remain isolated to a single customer, it is more likely to harm other customers if one customer's data is compromised.</p>\n<p>In multi-tenancy, an organization's data is not visible to other tenants. However, multiple users without the organization's affiliation get access to the same database. This increases the security risks.</p>\n</li>\n<li><strong>Resource Availability:</strong> The increased load of one customer can impact other customers sharing the same resources in a multi-tenancy setup. While in a single-tenancy architecture of SaaS, this risk is not present as customers are provided with dedicated resources.</li>\n</ul>\n<h2 id=\"when-to-use-one-over-the-other\" style=\"position:relative;\"><a href=\"#when-to-use-one-over-the-other\" aria-label=\"when to use one over the other permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to Use One Over the Other</h2>\n<p>A single-tenant setup of SaaS may be appropriate for certain companies or sectors where customer data privacy and security are paramount. The healthcare and finance industries are excellent examples, leveraging single-tenant cloud systems.</p>\n<p>For example, when working with patient information, applications in the healthcare industry must comply with <a href=\"https://www.loginradius.com/industry-healthcare/\">HIPAA regulations</a>. To maintain compliance, each hospital may need to establish its own data center on-site. The same is true for certain forms of financial information.</p>\n<p>Most consumer-facing applications and start-ups that require comparatively less customizability tend to use a multi-tenant setup of SaaS. Also, multi-tenancy is preferred by organizations that want to opt for a cost-effective solution.</p>\n<p>To learn more about Single-Tenant vs Multi-Tenant Cloud, check out the <a href=\"https://www.loginradius.com/resource/infographic/single-tenant-vs-multi-tenant-cloud\">infographic by LoginRadius</a>.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>There are a lot of other factors an organization must keep in mind while deciding which SaaS architecture to choose. Some business factors are the purpose of cloud adoption, type of application, budget, scalability, customization, migration, visibility, backup, and recovery. Finally, organizations must brainstorm what they want to achieve and how their company operates to arrive at the best, ideal solution.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is the difference between single tenant vs multi tenant?</strong></p>\n<p>In single tenant architecture, a dedicated cloud infrastructure serves one client, while in a multi tenant cloud, multiple businesses share the same infrastructure, which optimizes resources.</p>\n<p><strong>2. Is AWS a single tenant?</strong></p>\n<p>AWS offers primarily multi tenant cloud environments, but single tenant architecture can be achieved through dedicated hosting options like Amazon EC2 Dedicated Instances.</p>\n<p><strong>3. What is a multi tenant cloud system?</strong></p>\n<p>A multi tenant cloud system allows multiple businesses to share the same infrastructure, with resources and applications managed centrally for efficiency.</p>\n<p><strong>4. What are some examples of single tenant and multi tenant systems?</strong></p>\n<p>Private clouds or custom SaaS deployments are examples of single tenant architecture, while platforms like Salesforce represent multi tenant cloud systems.</p>\n<p><strong>5. Which SaaS architecture is more secure: single tenant or multi tenant?</strong></p>\n<p>Single tenant architectures generally offer more security due to isolated data environments, while multi-tenant systems have more shared risks but are often well-protected by cloud providers.</p>\n<p><strong>6. What is tenancy in cloud computing?</strong></p>\n<p>Tenancy in cloud computing refers to how computing resources are shared—whether through single tenant or multi tenant systems that isolate or combine client resources.</p>\n<p><strong>7. What is a tenant in cloud computing?</strong></p>\n<p>A tenant in cloud computing is an entity, such as a business, that uses a specific cloud infrastructure, either in a single tenant or multi tenant setup.</p>\n<p><em>LoginRadius provides both <a href=\"https://www.loginradius.com/private-cloud/\">single-tenant</a> and <a href=\"https://www.loginradius.com/multi-tenant-cloud/\">multi-tenant</a> SaaS architecture for our CIAM solution.</em></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 01, 2021","updated_date":null,"description":"When choosing a SaaS architecture for your business, the decision between single-tenant and multi-tenant models can significantly impact performance, security, and cost. This blog explores the key differences, advantages, and potential drawbacks of each approach, helping you determine which solution best aligns with your business needs.","title":"Single-Tenant vs. Multi-Tenant: Which SaaS Architecture is better for Your Business? ","tags":["saas","Architecture"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/6e91625d67f997fc0d90b890f7111691/ee604/coverImage.png","srcSet":"/static/6e91625d67f997fc0d90b890f7111691/69585/coverImage.png 200w,\n/static/6e91625d67f997fc0d90b890f7111691/497c6/coverImage.png 400w,\n/static/6e91625d67f997fc0d90b890f7111691/ee604/coverImage.png 800w,\n/static/6e91625d67f997fc0d90b890f7111691/f3583/coverImage.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction 2021, without a doubt, has been a decisive year for digital transition. As more and more businesses moved their services and…","fields":{"slug":"/identity/reduce-attack-surface-online-business/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>2021, without a doubt, has been a decisive year for digital transition. As more and more businesses moved their services and operations online, they needed to ensure safety from malicious activities. </p>\n<p>However, data shows otherwise. </p>\n<p>According to a survey conducted by Insight, almost 80% of IT leaders were not confident about their IT security position; despite an increase in IT security investments by these companies.</p>\n<p>More and more organizations are exposing their networks and critical assets to a <a href=\"https://www.loginradius.com/blog/fuel/how-ciso-can-improve-collaboration-on-security-risks/\">cyber security risk</a> by employing external contractors and enabling an entire workforce to work remotely.</p>\n<p>Is <em>your</em> business safe from cyber exploitation? With widespread cyberattacks, hackers may be able to find their way into your corporate network. As the tech environment expands, it brings along more potential attack surfaces exposed to hacking. </p>\n<h2 id=\"what-is-an-attack-surface\" style=\"position:relative;\"><a href=\"#what-is-an-attack-surface\" aria-label=\"what is an attack surface permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an Attack Surface</h2>\n<p>An attack surface refers to all the possible points that an attacker (unauthorized user) can use to enter your network or application to steal or alter data. In simple terms, all the resources are exposed to exploitation within your enterprise; this could encompass liability for your people, network, or digital environments.</p>\n<h2 id=\"understanding-attack-vectors\" style=\"position:relative;\"><a href=\"#understanding-attack-vectors\" aria-label=\"understanding attack vectors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Attack Vectors</h2>\n<p>Attack vectors are the points that make your network vulnerable to attacks. These may include access points, services, or protocols. The most common type of attack vectors include:</p>\n<ul>\n<li><strong>Passwords:</strong> A hacker may compromise your password through <a href=\"https://www.loginradius.com/blog/identity/brute-force-lockout/\">brute force</a> and gain access to critical data.</li>\n<li><strong>Malware:</strong> These are malicious softwares that introduce viruses, prompt errors, and slow down your computer.</li>\n<li><strong>DDoS (Denial of Service):</strong> Attackers use a DDoS attack to overwhelm a server or network by flooding it with traffic.</li>\n<li><strong>Phishing:</strong> Sophisticated phishing attempts can easily trick users into giving away sensitive information through a simple request for email confirmation or password data.</li>\n<li><strong>Insiders:</strong> Attack vectors are not just limited to digital assets. An unhappy employee is as much of a threat as any virus. They may share a part of your network with outsiders or attempt to hand over access information for snooping.</li>\n</ul>\n<h2 id=\"protect-your-network-with-attack-surface-analysis\" style=\"position:relative;\"><a href=\"#protect-your-network-with-attack-surface-analysis\" aria-label=\"protect your network with attack surface analysis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Protect Your Network With Attack Surface Analysis</h2>\n<p>The larger your attack surface, the more vulnerable you are to attacks. The first step to protect your network is to map out your network's weak points to help your security teams identify and understand potential risk areas and minimize the attack surface. Doing this can help you gain a focused outlook on your most vulnerable activities, such as:</p>\n<ul>\n<li>Login and authentication forms</li>\n<li>Data-gathering forms</li>\n<li>File storage locations</li>\n<li>APIs</li>\n<li>Email and text messaging services</li>\n<li>Entry points</li>\n<li>Database users and permissions</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/digital-trade-zone-threats-cybersecurity-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-dig-trade-zone\"\n        title=\"WP-dig-trade-zone\"\n        src=\"/static/b345c95b262e355d5e3f3a7d99d71e2b/e5715/WP-dig-trade-zone.png\"\n        srcset=\"/static/b345c95b262e355d5e3f3a7d99d71e2b/a6d36/WP-dig-trade-zone.png 650w,\n/static/b345c95b262e355d5e3f3a7d99d71e2b/e5715/WP-dig-trade-zone.png 768w,\n/static/b345c95b262e355d5e3f3a7d99d71e2b/81501/WP-dig-trade-zone.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-reduce-the-attack-surface-of-user-authentication\" style=\"position:relative;\"><a href=\"#how-to-reduce-the-attack-surface-of-user-authentication\" aria-label=\"how to reduce the attack surface of user authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Reduce the Attack Surface of User Authentication</h2>\n<p>Let's take a look at how you can decrease your attack surface through these strategies.</p>\n<ol>\n<li><strong>Compliance:</strong> First and foremost, make sure your organization meets all the cybersecurity compliances: state, regional, or industry level. This ensures you have standard cybersecurity and also avoid professional fines.</li>\n<li><strong>Simplify access:</strong> Use protocols like single sign-on (SSO) and federated identity management (FIM) to simplify user access to all business applications and reduce the burden of remembering multiple passwords. </li>\n<li><strong>Monitor active domains:</strong> Implement solutions that allow access only to authorized people. Monitor access points and lockdown any areas that have unusual traffic.</li>\n<li><strong>Multi-factor authentication (MFA):</strong> Enhance your IT infrastructure with <a href=\"https://www.loginradius.com/multi-factor-authentication/\">additional verification</a> protocols to confirm that users are who they claim to be. </li>\n<li><strong>Run less code:</strong> Decrease the number of possible entry points by running less code on your computer, server, or cloud infrastructure. Whenever possible, remove or disable features and simplify your code.</li>\n<li><strong>Split your network:</strong> You can reduce the risk of unwanted devices or software infecting your critical assets by segmenting your network. For example, you set up a network for your customers that is separate from your employee network.</li>\n<li><strong>Secure credentials:</strong> Employee credentials pose a serious risk to your IT assets if they are lost, shared, or stolen. Build a controlled vault and protect passwords with high-end encryption and automatic rotation.</li>\n<li><strong>Optimize DevOps:</strong> Streamline your DevOps activities, enabling automatic access to vital IT resources in real-time, securely.</li>\n<li><strong>Close any open ports:</strong> A port may be dangerous if the service has weak security protocols or is vulnerable to exploits. Protect your network from any attempt at ransomware and other malicious actors to hijack your systems and data. </li>\n<li><strong>Remove privileged accounts from endpoints:</strong> Ransomware and malware are a constant threat to your network. And users with elevated privileges or admin accounts on their endpoints are the most vulnerable to it. <strong>Immediately reduce your attack surface</strong> by removing all special rights from workstations.</li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Today's digital world leaves no room for error. Companies across the globe look to expand access to IT resources. However, they face the challenge of securing their infrastructures from cyber threats. Reducing your attack surface is crucial for cybersecurity success, and that’s what a <a href=\"https://www.loginradius.com/\">CIAM provider</a> by LoginRadius does best. </p>\n<p>By analyzing and implementing the security measures mentioned in this blog, you can safeguard your company from cyber threats and help it leverage the benefit of a dispersed workforce. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 30, 2021","updated_date":null,"description":"Companies are predominantly facing the challenge of securing their infrastructures from cyber threats. By analyzing and implementing the security measures mentioned in this blog, you can safeguard your company from cyber threats and help it leverage the benefit of a dispersed workforce.","title":"10 Tips From CIAM Experts to Reduce the Attack Surface of User Authentication","tags":["cybersecurity","user authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8018018018018018,"src":"/static/b709215f89763efe5f832eeb4b897113/14b42/attack-surface.jpg","srcSet":"/static/b709215f89763efe5f832eeb4b897113/f836f/attack-surface.jpg 200w,\n/static/b709215f89763efe5f832eeb4b897113/2244e/attack-surface.jpg 400w,\n/static/b709215f89763efe5f832eeb4b897113/14b42/attack-surface.jpg 800w,\n/static/b709215f89763efe5f832eeb4b897113/16310/attack-surface.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"This is Hitesh Kumawat. I am a BTech-backed Product Designer with a knack for finding elegant solutions to complex UI problems and creating…","fields":{"slug":"/growth/loginradius-employee-perks/"},"html":"<p>This is <em>Hitesh Kumawat</em>. I am a BTech-backed Product Designer with a knack for finding elegant solutions to complex UI problems and creating intuitive experiences through front-end development. </p>\n<p><a href=\"https://www.loginradius.com/company/\">LoginRadius</a> has been an integral part of my personal and professional growth, especially in the last four years of my employment here. The organization is an excellent combination of professionalism and fun.</p>\n<h2 id=\"working-at-loginradius-im-exposed-to-an-amazing-work-culture\" style=\"position:relative;\"><a href=\"#working-at-loginradius-im-exposed-to-an-amazing-work-culture\" aria-label=\"working at loginradius im exposed to an amazing work culture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Working at LoginRadius, I’m Exposed to an Amazing Work Culture.</h2>\n<p>A great work culture can be key to the success of a company. Not only does it promote productivity, but it makes everyday tasks easier. </p>\n<p><strong>LoginRadius understands that a positive, healthy work culture is a top priority for employees.</strong></p>\n<p>Naturally, every employee is encouraged to be a part of a community of driven and ambitious individuals. This is what makes LoginRadius a place where I can be myself. It’s great to work for a company that makes people feel valued.</p>\n<p>Speaking of my manager, he is a leader who leads by example with a warm, “good ol’ country boy' charm. He is equally as passionate as he is compassionate. He believes in creating a positive work environment that fosters professional growth and a refined skill set from his team members.</p>\n<h2 id=\"loginradius-supported-my-mental-and-economic-well-being-during-covid-19\" style=\"position:relative;\"><a href=\"#loginradius-supported-my-mental-and-economic-well-being-during-covid-19\" aria-label=\"loginradius supported my mental and economic well being during covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius Supported My Mental and Economic Well-Being During COVID-19.</h2>\n<p>It makes me feel good that I am working for an organization that is willing to fight for its employees during hard times. COVID-19 was extraordinarily exhausting for most people and LoginRadius left no stones unturned to look after our mental and economic health during the deadly first and second waves. It organized vitality sessions with medical professionals to provide counseling and education so we could take care of ourselves and our family amid this troublesome period.</p>\n<p>Even in today's global financial uncertainty and the state of the job market, LoginRadius is one of the rare companies that has always valued its employees. While most companies are cutting costs and laying off employees, LoginRadius ensured job retention by keeping our paychecks steady.</p>\n<h2 id=\"loginradius-recently-introduced-a-revised-11-month-appraisal-program\" style=\"position:relative;\"><a href=\"#loginradius-recently-introduced-a-revised-11-month-appraisal-program\" aria-label=\"loginradius recently introduced a revised 11 month appraisal program permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius Recently Introduced A Revised 11-Month Appraisal Program.</h2>\n<p>The time period between appraisals is important to employees; it allows them to benchmark their progress and plan long-term goals. By introducing an 11-month appraisal program, LoginRadius has demonstrated that the company truly cares about its employees.</p>\n<p>I am one of the first employees to receive this revised appraisal benefit, and I am utterly satisfied. It feels great and boosts motivation and performance. </p>\n<p><strong>Also, the additional percentage reward for the number of years spent at LoginRadius is the icing on the cake.</strong></p>\n<p>Yes, our association is highly valued, recognized, and respected in every step of our journey at LoginRadius. </p>\n<h2 id=\"a-bunch-of-other-perks\" style=\"position:relative;\"><a href=\"#a-bunch-of-other-perks\" aria-label=\"a bunch of other perks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Bunch of Other Perks</h2>\n<p>From yoga and happy hours to on-campus meals and lunch reimbursements, LoginRadius values our health and happiness as much as it does our professional development.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 45.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"picture05.jpg\"\n        title=\"picture05.jpg\"\n        src=\"/static/c58cc93e0eabd589705dfb48352da280/212bf/picture05.jpg\"\n        srcset=\"/static/c58cc93e0eabd589705dfb48352da280/6aca1/picture05.jpg 650w,\n/static/c58cc93e0eabd589705dfb48352da280/212bf/picture05.jpg 768w,\n/static/c58cc93e0eabd589705dfb48352da280/93719/picture05.jpg 4000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Working at LoginRadius means we’re always on top of our game. With team-oriented activities like regular Zumba and yoga classes, we stay together as a cohesive unit. Moreso, these perks support our overall health and wellbeing as an employee.</p>\n<p>LoginRadius has a team named ‘Events Squad,’ which organizes employee engagement and random targeted team-building activities to keep the fun going. They also come up with friendly ways to get <a href=\"https://www.loginradius.com/blog/fuel/loginradius-journey-csm/\">new hires to get along</a> and enjoy their new jobs.</p>\n<p>One of the best things about a LoginRadius retreat is that team-building games bring together employees from different teams, so they get a chance to meet people from other departments and spend some really fun time with them. It helps to strengthen our relationships and increase productivity at work after the retreat.</p>\n<p>LoginRadius also provides free access to its online/offline library so employees can learn something new every day and expand their skills. </p>\n<p>LoginRadius is in a league of its own. It’s a company that isn’t afraid to think outside the box. A few other initiatives include:</p>\n<ul>\n<li>Monthly team lunches (off-premises)</li>\n<li>Monthly office lunches (on-premises)</li>\n<li>Quarterly team outings</li>\n<li>Birthday party celebrations</li>\n<li>Virtual get-togethers</li>\n<li>Awards and recognition for notable achievements</li>\n<li>Gift distributions</li>\n<li>Festival celebrations (Makar Sankranti, Holi, Halloween, Diwali, Christmas, etc.)</li>\n<li><a href=\"https://www.loginradius.com/blog/fuel/loginradius-journey-csm/\">CSR activities</a></li>\n</ul>\n<h2 id=\"wrapping-up\" style=\"position:relative;\"><a href=\"#wrapping-up\" aria-label=\"wrapping up permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Wrapping Up</h2>\n<p>Every employee wants their employer to provide growth, a friendly environment, and a responsive/punctual salary.</p>\n<p><strong>And this is what LoginRadius should be termed for.</strong></p>\n<p><strong>Growth</strong></p>\n<p>I have learned so much in my four years at LoginRadius, and I have grown 200%. LoginRadius is very interested and responsive when you want to learn new technologies, work with other teams, or undertake new projects.</p>\n<p><strong>Friendly-environment</strong></p>\n<p>LoginRadius has created a friendly environment from day one. You can work wherever is most convenient for you and there are no cubicles. Everyone works together in one open space, which creates an atmosphere of collaboration. And the best part is that the managers work right alongside the rest of us. </p>\n<p><strong>Punctual salary</strong></p>\n<p>I have been with the company for over four years now, and I have not faced any problems regarding salary. It is always credited at the end of every month. </p>\n<p>Working with LoginRadius has been flexible, energizing, and filled with people who not only care about each other but are actually invested in your success. </p>\n<p>Once You're a Part of LoginRadius, the Company Will Be a Part of You Forever!!</p>\n<p><a href=\"https://www.loginradius.com/careers/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"career-page\"\n        title=\"career-page\"\n        src=\"/static/f31e24d3c870b2ea17ea36cfb8459637/e5715/career-page.png\"\n        srcset=\"/static/f31e24d3c870b2ea17ea36cfb8459637/a6d36/career-page.png 650w,\n/static/f31e24d3c870b2ea17ea36cfb8459637/e5715/career-page.png 768w,\n/static/f31e24d3c870b2ea17ea36cfb8459637/63ff0/career-page.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 26, 2021","updated_date":null,"description":"Working at LoginRadius is more than just a job. The organization is an excellent combination of professionalism and fun, where an employee’s association is highly valued, recognized, and respected in every step of their journey.","title":"Sharing My Journey With LoginRadius: A Look Inside the Best Employee Perks","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/3a5eed7e830d6636a7bc1d9a524ca86d/14b42/picture04.jpg","srcSet":"/static/3a5eed7e830d6636a7bc1d9a524ca86d/f836f/picture04.jpg 200w,\n/static/3a5eed7e830d6636a7bc1d9a524ca86d/2244e/picture04.jpg 400w,\n/static/3a5eed7e830d6636a7bc1d9a524ca86d/14b42/picture04.jpg 800w,\n/static/3a5eed7e830d6636a7bc1d9a524ca86d/47498/picture04.jpg 1200w,\n/static/3a5eed7e830d6636a7bc1d9a524ca86d/0e329/picture04.jpg 1600w,\n/static/3a5eed7e830d6636a7bc1d9a524ca86d/10a43/picture04.jpg 4032w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Hitesh Kumawat","github":null,"avatar":null}}}},{"node":{"excerpt":"Open source projects are intended to be freely available to the developer community and are easy to modify. In fact, many open-source…","fields":{"slug":"/identity/pros-cons-open-source-project/"},"html":"<p>Open source projects are intended to be freely available to the developer community and are easy to modify. In fact, many open-source developers believe that by enabling modifications to their software, they receive constructive criticism.</p>\n<p>Developers also frequently learn new techniques by trying to integrate open-source software into their own programs. Others can then take this new code and incorporate it into their projects if they find it useful. </p>\n<p>No wonder, the adoption of third-party open-source software is getting popular. What's more is it allows companies to produce software faster than developing from scratch.</p>\n<p>While <a href=\"https://www.loginradius.com/open-source/\">open-source projects</a> have several advantages over proprietary software, they also bring in some challenges that you need to consider. Let's discuss the pros first. </p>\n<h2 id=\"advantages-of-open-source-software\" style=\"position:relative;\"><a href=\"#advantages-of-open-source-software\" aria-label=\"advantages of open source software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Open-Source Software</h2>\n<p>Here are some of the fundamental advantages that open-source software offers: </p>\n<h3 id=\"1-agility\" style=\"position:relative;\"><a href=\"#1-agility\" aria-label=\"1 agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Agility</h3>\n<p>The development or customization of proprietary solutions depends on the availability and ability of the vendor's development team to solve the problem. </p>\n<p>Since open-source solutions are developed by contributions from various community members, they typically offer multiple ways to solve a problem. Hence, you can get the job done faster using an open-sourcing project. </p>\n<h3 id=\"2-cost\" style=\"position:relative;\"><a href=\"#2-cost\" aria-label=\"2 cost permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Cost</h3>\n<p>As community members develop and maintain open-source solutions, they generally cost less than a proprietary solution. </p>\n<h3 id=\"3-scalability\" style=\"position:relative;\"><a href=\"#3-scalability\" aria-label=\"3 scalability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Scalability</h3>\n<p>You can start small by updating the community versions of the open-source project to meet your business requirements. But later, <a href=\"https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/\">as your business requirements grow</a>, you can leverage commercially supported solutions too.</p>\n<h3 id=\"4-community-engagement\" style=\"position:relative;\"><a href=\"#4-community-engagement\" aria-label=\"4 community engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Community Engagement</h3>\n<p>Open-source projects allow developers to create projects and get a platform to interact with other developers outside their organizations. </p>\n<h2 id=\"disadvantages-of-open-source-software\" style=\"position:relative;\"><a href=\"#disadvantages-of-open-source-software\" aria-label=\"disadvantages of open source software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Disadvantages of Open-Source Software</h2>\n<p>An open-source project approach can be a great way to collaborate with other talented engineers. But when you're building something critical to your business, you need more than a supporting cast of thousands of developers from across the globe. Here are some of the risks observed with open-source software: </p>\n<h3 id=\"1-vulnerabilities-exposure\" style=\"position:relative;\"><a href=\"#1-vulnerabilities-exposure\" aria-label=\"1 vulnerabilities exposure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Vulnerabilities Exposure</h3>\n<p>The source code is available for everyone, cybercriminals can also <a href=\"https://www.loginradius.com/resource/owasp-top-10-web-application-vulnerabilities-list-for-every-developer/\">easily find vulnerabilities</a> in the code. For example, they can extract sensitive information or damage the systems leveraging the open-source software.Here are a few examples of the vulnerabilities found in some common open-source software recently: </p>\n<ul>\n<li>Severe security flaws were found in the open-source identity and access management solution, <strong>Keycloak</strong>, which cybercriminals can exploit to gain access to sensitive information in systems leveraging the platform. </li>\n<li>Certain <a href=\"https://www.cvedetails.com/vulnerability-list/vendor_id-3496/Joomla.html\">XSS and CSRF</a> vulnerabilities were found in <strong>Joomla</strong>, an open-source content management solution that cybercriminals can exploit. </li>\n<li>Prior to<span style=\"text-decoration:underline;\"> <a href=\"https://www.cvedetails.com/cve/CVE-2021-39165/\">Cachet version 2.5.1</a></span>, authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server.</li>\n<li>An issue was discovered in **Xen **through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. </li>\n</ul>\n<h3 id=\"2-security\" style=\"position:relative;\"><a href=\"#2-security\" aria-label=\"2 security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Security</h3>\n<p>Open-source project contributors are generally developers who are not security experts. They contribute to the product primarily to support the functionality and may not consider the security aspects. Hence, the open-source product may pose <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">security risks</a> that cybercriminals can easily exploit. </p>\n<h3 id=\"3-warranty\" style=\"position:relative;\"><a href=\"#3-warranty\" aria-label=\"3 warranty permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Warranty</h3>\n<p>Open-source software does not provide any warranty for its security and support as these products are developed and managed by volunteers.</p>\n<p>The developer community members typically test the software for security issues and provide suggestions/recommendations on the public forums, but they are not liable for faulty guidance.</p>\n<h3 id=\"4-security-audit-process\" style=\"position:relative;\"><a href=\"#4-security-audit-process\" aria-label=\"4 security audit process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Security Audit Process</h3>\n<p>Open-source project contributions are generally managed by a small team to reduce cost. They may not perform proper testing/QA or have a security auditing process at all due to a lack of expertise or workforce. </p>\n<p>The testing team may not be familiar with the open-source change requests or test the code properly by considering crucial aspects. </p>\n<h3 id=\"5-copyright\" style=\"position:relative;\"><a href=\"#5-copyright\" aria-label=\"5 copyright permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Copyright</h3>\n<p>Anonymous developers sometimes develop open-source software. Therefore, it is pretty likely that they may copy from third-party sources without understanding the copyright issues. </p>\n<p>As a result, companies leveraging the particular open-source software can be held responsible for Copyright infringement.</p>\n<p>For example, <a href=\"https://arstechnica.co.uk/tech-policy/2017/10/appeals-court-keeps-alive-the-never-ending-linux-case-sco-v-ibm/\">SCO Group</a> contended IBM stole part of the UnixWare source code and used it for their Project Monterey and sought billions of dollars in damages.</p>\n<h3 id=\"6-operational-insufficiencies\" style=\"position:relative;\"><a href=\"#6-operational-insufficiencies\" aria-label=\"6 operational insufficiencies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Operational Insufficiencies</h3>\n<p>Open-source projects can be a lot of effort for an organization. It isn't always clear who will do the work to manage the change requests from the developer community or take care of scope, licensing, and versioning.</p>\n<h3 id=\"7-poor-developer-practices\" style=\"position:relative;\"><a href=\"#7-poor-developer-practices\" aria-label=\"7 poor developer practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Poor Developer Practices</h3>\n<p>If hackers are invited to contribute to open-source projects, they can potentially change the code so that it contains malware. If the code is not carefully reviewed, it can become part of an open-source project.</p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>The open-source licenses are not like traditional software licenses (you don't pay for using them). Hence, you cannot expect it to be constructed with the best security practices and also pose potential risks. These risks may include vulnerabilities of the source code, proprietary issues, license violations, etc.</p>\n<p>Experts recommend not to leverage the open-source project in the places where:</p>\n<ul>\n<li>You are handling sensitive personal and operational data information, e.g., Identity Access Management(IAM) space. </li>\n<li>You are developing proprietary software based on the open-source project. </li>\n</ul>\n<p>Enterprises should carefully analyze and assess their suitability while adopting open source and be cautious when implementing the project.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 26, 2021","updated_date":null,"description":"As a developer, chances are at some point you’ve looked at an open source project to solve a problem. But before going off and using the first one you come across, it’s important to consider both the pros and cons of using open source.","title":"Why You Should Use Open Source Project For Your Business","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9230769230769231,"src":"/static/da49f74aa418b24ac69e985d2e6dbb9c/14b42/open-source.jpg","srcSet":"/static/da49f74aa418b24ac69e985d2e6dbb9c/f836f/open-source.jpg 200w,\n/static/da49f74aa418b24ac69e985d2e6dbb9c/2244e/open-source.jpg 400w,\n/static/da49f74aa418b24ac69e985d2e6dbb9c/14b42/open-source.jpg 800w,\n/static/da49f74aa418b24ac69e985d2e6dbb9c/16310/open-source.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Jitender Agarwal","github":null,"avatar":null}}}},{"node":{"excerpt":"The question of online privacy and security seems to only attract attention when a major cybersecurity threat occurs. Most people don’t…","fields":{"slug":"/growth/4-tips-secure-frictionless-ux/"},"html":"<p>The question of online privacy and security seems to only attract attention when a major cybersecurity threat occurs. Most people don’t spend too much time considering the safety of their data – not even when shopping online. </p>\n<p>Sadly, many online stores and mobile apps also fail to take it into proper account. There’s a delicate balance they need to achieve between <a href=\"https://www.loginradius.com/blog/identity/balancing-security-cx/\">data security and user experience</a>. While one does not necessarily negatively impact the other, ensuring that both are addressed equally well can be difficult. </p>\n<p>Let’s examine this intricate relationship and its importance. Read on to learn how you can improve it on your own website and within your own product. </p>\n<h2 id=\"why-is-the-balance-important\" style=\"position:relative;\"><a href=\"#why-is-the-balance-important\" aria-label=\"why is the balance important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is the Balance Important?</h2>\n<p>Cybersecurity is now more important than ever. Cybercrime is <a href=\"https://www.packetlabs.net/cybersecurity-statistics-2021/\">expected to cost the globe $6 trillion by the end of 2021</a>. A ransomware attack occurs every 11 seconds – up from one every 40 seconds just five short years ago. That being said, it’s clear we need to rethink the way we protect our data and the data of our clients and customers. </p>\n<p>Just recently, <a href=\"https://www.reuters.com/technology/kaseya-ransomware-attack-sets-off-race-hack-service-providers-researchers-2021-08-03/\">the Kaseya ransomware attack</a> has shaken up the small business world yet again, proving that no one is safe. Apparently, cybercriminals are able to threaten your security in ways you wouldn’t previously have thought of. </p>\n<p>When it comes to user experience, we can safely say it has become the most important underrated ranking factor. Additionally, it is _the _factor that can impact your user retention rates the most. In fact, <a href=\"https://websitebuilder.org/blog/user-experience-stats/\">over 50% of internet users</a> will leave a website if: </p>\n<ul>\n<li>it doesn’t load fast enough</li>\n<li>it’s not mobile-friendly</li>\n<li>they are not able to navigate it as intuitively as they would expect</li>\n</ul>\n<p>The same rates apply to app abandonment as well. </p>\n<p><a href=\"https://skillcrush.com/blog/high-paying-remote-tech-jobs/\">UX designers are also among the highest-paid</a> on the tech marketplace, which goes to show how invaluable their role for any online business has become. </p>\n<p>As important as these two facets of online business are, they do often clash. Implementing added security measures can severely impact user experience. Likewise, trying to please a user (or providing what we think a user wants) can compromise data security. </p>\n<p>Here’s what you can do to ensure the two don’t trip each other up: </p>\n<h3 id=\"1-let-ux-and-security-teams-work-together\" style=\"position:relative;\"><a href=\"#1-let-ux-and-security-teams-work-together\" aria-label=\"1 let ux and security teams work together permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Let UX and security teams work together</h3>\n<p>During the initial product design phase, ensure that your UX design team and your security team are actually working together. Instead of having one team work on the product and then hand it over to the other, have these people in the same (virtual) room. Give them the resources they need to come up with solutions that will cater to both aspects. </p>\n<p>This approach can also help you design a better product, as the solutions will be much more organic. There will be less friction, and every element can be developed so that the user is satisfied and protected.</p>\n<p>Make sure you implement proper security measures _during _the design phase as well. You need to protect your designs and code long before it gets to the consumer. So, have your security team devise an encrypted (or at least a completely protected) way to share files. </p>\n<p>Cybercriminals can even take advantage of something as seemingly harmless as a Slack chat, using the information that has been shared to further break your product. Teach your teams about the importance of data privacy and security, and ask them to only communicate in secure ways. </p>\n<h3 id=\"2-make-use-of-social-logins\" style=\"position:relative;\"><a href=\"#2-make-use-of-social-logins\" aria-label=\"2 make use of social logins permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Make use of social logins</h3>\n<p>Users love to be able to sign in using one of their social accounts. It eliminates the hassle of registering a new account and remembering yet another password, saving overall time and effort. </p>\n<p>As they also enable you to personalize the experience a user has with your product, <a href=\"https://www.loginradius.com/social-login/\">social logins</a> seem to provide a win-win scenario. However, you need to ask yourself how safe they actually are and whether you may inadvertently be opening the door to some serious harm.</p>\n<p>If you allow users to log in with their Google, Windows, or Facebook accounts, you don’t have to worry. They’re perfectly safe, as these huge companies are on the cutting edge of data security. You can rest assured that they’re working very hard to ensure account security.</p>\n<p>The only issue that often arises is password reuse. Many users tend to come up with one good password and then use it for their most secure and their least secure accounts. When one of them is breached (and you can guess which one that is likely to be), the other one is compromised as well.</p>\n<p>All you can do is educate your users about the importance of strong, varied passwords. If you do offer social login, know that you are reaching for the most pleasant UX available. </p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Social-Login-rec\"\n        title=\"WP-Social-Login-rec\"\n        src=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-Social-Login-rec.png\"\n        srcset=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/a6d36/WP-Social-Login-rec.png 650w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-Social-Login-rec.png 768w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/81501/WP-Social-Login-rec.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-make-use-of-single-sign-on\" style=\"position:relative;\"><a href=\"#3-make-use-of-single-sign-on\" aria-label=\"3 make use of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Make use of Single Sign-on</h3>\n<p>If you have more than one product and request that your users use a different account to log in everywhere, you’ll be significantly reducing the quality of their experience. It’s a hassle, to say the least, and you are likely to lose a fair share of your client base.</p>\n<p>Multiple logins also mean you will end up with incomplete data silos, and you won’t have a complete understanding of your customer’s journey. Plus, maintaining and securing these multiple accounts will only cost you more. </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">By providing a single sign-on</a>, you can eliminate all of these issues. You’ll both improve user experience and make data protection simpler. Consider all of your customer touchpoints, whether they’re web- or app-based, and ensure one account is all they need to access your products or services. </p>\n<h3 id=\"4-implement-frequent-testing\" style=\"position:relative;\"><a href=\"#4-implement-frequent-testing\" aria-label=\"4 implement frequent testing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Implement frequent testing</h3>\n<p>Finally, to ensure both your UX and your security are as they should be, you need to implement frequent usability and security testing. Building it right once does not mean you won’t need to tweak, improve, and upgrade – so regularly scheduled testing is simply mandatory. </p>\n<p>Start by coming up with a <a href=\"https://www.optimalworkshop.com/learn/101s/usability-testing/\">detailed usability testing plan and checklist</a>. The steps you map out will ensure each test targets the same aspects of UX and that you can measure and track results over longer periods of time. </p>\n<p>You can also outsource security testing, as it makes uncovering a potential threat more likely. Those who have worked on implementing initial security protocols aren’t always able to uncover any potential risks, so a fresh pair of eyes can do the trick. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>By striking the right balance between UX and security, you can provide a product that consumers trust and enjoy using. If, on the other hand, you compromise one for the other, customer churn is a more likely scenario. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 24, 2021","updated_date":null,"description":"By striking the right balance between UX and security, you can provide a product that consumers trust and enjoy using. If, on the other hand, you compromise one for the other, customer churn is a more likely scenario.","title":"How to Blend Security with Frictionless User Experience","tags":["data security","social login","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/06951ab1ef4916d0cab7ff614d758260/14b42/ux-cover.jpg","srcSet":"/static/06951ab1ef4916d0cab7ff614d758260/f836f/ux-cover.jpg 200w,\n/static/06951ab1ef4916d0cab7ff614d758260/2244e/ux-cover.jpg 400w,\n/static/06951ab1ef4916d0cab7ff614d758260/14b42/ux-cover.jpg 800w,\n/static/06951ab1ef4916d0cab7ff614d758260/16310/ux-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shivangini Yadav","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":336,"currentPage":57,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}