{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/60","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction As enterprises advance towards digital maturity in the times of robust cloud-based systems and stringent online security…","fields":{"slug":"/identity/authentication-vs-authorization-infographic/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As enterprises advance towards digital maturity in the times of robust cloud-based systems and stringent online security, <em>authentication</em> and <em>authorization</em> are used in conjunction (also, often interchangeably) with each other.</p>\n<p>Though both the terms sound similar, they refer to entirely different security processes. Within the scope of <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a>, authentication verifies a user's identity, while authorization validates if the user has access to perform a specific function.</p>\n<p>In other words, authentication is identifying users by confirming who they say they are, while authorization is the process of establishing the rights and privileges of a user.</p>\n<p>Both processes play equally important roles in securing sensitive data assets from breaches and unauthorized access.</p>\n<p>Here, we'll cover how they're defined and what distinguishes one from the other.</p>\n<h2 id=\"what-is-authentication\" style=\"position:relative;\"><a href=\"#what-is-authentication\" aria-label=\"what is authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authentication?</h2>\n<p>Authentication is the process of identifying users and validating who they claim to be. One of the most common and obvious factors to authenticate identity is a password. If the user name matches the password credential, it means the identity is valid, and the system grants access to the user.</p>\n<p>Interestingly, with enterprises going passwordless, many use modern authentication techniques like one-time passcodes (OTP) via SMS, or email, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, multi-factor authentication (MFA) and biometrics, etc. to authenticate users and deploy security beyond what passwords usually provide.</p>\n<h2 id=\"types-of-authentication\" style=\"position:relative;\"><a href=\"#types-of-authentication\" aria-label=\"types of authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authentication</h2>\n<p>Authentication is a crucial process that verifies the identity of users accessing a system, website, or application. There are several types of <a href=\"https://www.loginradius.com/authentication/\">authentication methods</a> employed in today's digital landscape to ensure secure access to sensitive data. The most common ones include:</p>\n<h3 id=\"password-based-authentication\" style=\"position:relative;\"><a href=\"#password-based-authentication\" aria-label=\"password based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password-based Authentication</h3>\n<p>This traditional method requires users to provide a unique combination of characters known only to them. While passwords are simple to implement, they are susceptible to security breaches if not managed properly.</p>\n<h3 id=\"multi-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication\" aria-label=\"multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">MFA enhances security</a> by combining two or more authentication factors, such as passwords, biometrics (fingerprint or facial recognition), or one-time codes sent to a user's registered device. This layered approach significantly reduces the risk of unauthorized access.</p>\n<h3 id=\"two-factor-authentication\" style=\"position:relative;\"><a href=\"#two-factor-authentication\" aria-label=\"two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor Authentication</h3>\n<p>2FA is a subset of MFA that employs two different authentication factors to verify user identity. Typically, this includes a password and a one-time code generated by a mobile app or sent via SMS.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>This cutting-edge method uses unique biological traits like fingerprints, iris scans, or facial features to validate a user's identity. Biometrics offer a high level of security and convenience, but they may raise privacy concerns.</p>\n<h3 id=\"token-based-authentication\" style=\"position:relative;\"><a href=\"#token-based-authentication\" aria-label=\"token based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Token-based Authentication</h3>\n<p>Token-based systems use physical or virtual tokens to grant access. These tokens can be hardware devices or software applications that generate temporary codes for authentication.</p>\n<h2 id=\"advantages-of-authentication\" style=\"position:relative;\"><a href=\"#advantages-of-authentication\" aria-label=\"advantages of authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Authentication</h2>\n<p>Effective authentication protocols offer numerous benefits to individuals, organizations, and online platforms, ensuring a secure and seamless user experience.</p>\n<h3 id=\"enhanced-security\" style=\"position:relative;\"><a href=\"#enhanced-security\" aria-label=\"enhanced security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Security</h3>\n<p>Authentication prevents unauthorized access and protects sensitive data from falling into the wrong hands, reducing the risk of data breaches and cyberattacks.</p>\n<h3 id=\"user-trust-and-confidence\" style=\"position:relative;\"><a href=\"#user-trust-and-confidence\" aria-label=\"user trust and confidence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Trust and Confidence</h3>\n<p>Implementing robust authentication measures instills confidence in users, assuring them that their personal information is safe, thereby fostering trust in the platform or service.</p>\n<h3 id=\"regulatory-compliance\" style=\"position:relative;\"><a href=\"#regulatory-compliance\" aria-label=\"regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Regulatory Compliance</h3>\n<p>In many industries, adhering to specific <a href=\"https://www.loginradius.com/blog/identity/stay-compliant-with-data-privacy-laws-2023/\">data protection regulations</a> and standards is mandatory. Proper authentication procedures aid in meeting compliance requirements.</p>\n<h3 id=\"reduced-fraud-and-identity-theft\" style=\"position:relative;\"><a href=\"#reduced-fraud-and-identity-theft\" aria-label=\"reduced fraud and identity theft permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduced Fraud and Identity Theft</h3>\n<p>By requiring users to verify their identity through authentication, the likelihood of fraudulent activities and identity theft is significantly minimized.</p>\n<h3 id=\"customizable-access-control\" style=\"position:relative;\"><a href=\"#customizable-access-control\" aria-label=\"customizable access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customizable Access Control</h3>\n<p>Different authentication methods can be tailored to suit specific security needs, allowing organizations to grant appropriate levels of access to different user groups.</p>\n<h2 id=\"what-is-authorization\" style=\"position:relative;\"><a href=\"#what-is-authorization\" aria-label=\"what is authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authorization?</h2>\n<p>Authorization happens after a user’s identity has been successfully authenticated. It is about offering full or partial access rights to resources like database, funds, and other critical information to get the job done.</p>\n<p>In an organization, for example, after an employee is verified and confirmed via ID and password authentication, the next step would be defining what resources the employee would have access to.</p>\n<h2 id=\"types-of-authorization\" style=\"position:relative;\"><a href=\"#types-of-authorization\" aria-label=\"types of authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authorization</h2>\n<p>Authorization is a crucial aspect of identity and access management, ensuring that individuals or entities are granted appropriate access to resources and actions within a system. There are several types of authorization mechanisms that organizations implement to control access and protect sensitive information.</p>\n<h3 id=\"role-based-authorization\" style=\"position:relative;\"><a href=\"#role-based-authorization\" aria-label=\"role based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role-Based Authorization</h3>\n<p>In this approach, access rights are assigned based on predefined roles or job functions within the organization. Users are grouped into specific roles, and each role is granted a set of permissions that align with the responsibilities of that role. This <a href=\"https://www.loginradius.com/user-management/\">simplifies access management</a> and reduces administrative overhead, especially in large enterprises.</p>\n<h3 id=\"attribute-based-authorization\" style=\"position:relative;\"><a href=\"#attribute-based-authorization\" aria-label=\"attribute based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attribute-Based Authorization</h3>\n<p>This type of authorization evaluates access requests based on specific attributes of the user, such as their department, location, or clearance level. Access is granted or denied depending on whether the user's attributes match the defined criteria for accessing certain resources or performing particular actions.</p>\n<h3 id=\"rule-based-authorization\" style=\"position:relative;\"><a href=\"#rule-based-authorization\" aria-label=\"rule based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Rule-Based Authorization</h3>\n<p>Rule-based authorization enforces access control based on predefined rules and conditions. These rules specify the circumstances under which access should be granted or denied. Organizations can define complex access policies using rule-based authorization to cater to unique business requirements.</p>\n<h3 id=\"mandatory-access-control-mac\" style=\"position:relative;\"><a href=\"#mandatory-access-control-mac\" aria-label=\"mandatory access control mac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mandatory Access Control (MAC)</h3>\n<p>MAC is a high-security authorization model commonly used in government and military settings. It operates on the principle of strict access controls determined by the system administrator. Access rights are assigned based on labels and categories, ensuring that users can only access information at or below their clearance level.</p>\n<h3 id=\"discretionary-access-control-dac\" style=\"position:relative;\"><a href=\"#discretionary-access-control-dac\" aria-label=\"discretionary access control dac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Discretionary Access Control (DAC)</h3>\n<p>In contrast to MAC, DAC allows users to control access to the resources they own. Each resource has an owner who can determine who else can access it and what level of access they have. DAC is commonly used in less secure environments where users have more control over their data.</p>\n<h3 id=\"role-based-access-control-rbac\" style=\"position:relative;\"><a href=\"#role-based-access-control-rbac\" aria-label=\"role based access control rbac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role-Based Access Control (RBAC)</h3>\n<p>RBAC is a variation of role-based authorization that focuses on managing user access based on roles and their associated permissions. It simplifies access control by allowing administrators to grant or revoke permissions to entire groups of users through the management of roles.</p>\n<h2 id=\"advantages-of-authorization\" style=\"position:relative;\"><a href=\"#advantages-of-authorization\" aria-label=\"advantages of authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Authorization</h2>\n<p>Implementing robust authorization mechanisms offers various advantages that strengthen an organization's security posture and overall access management strategies.</p>\n<h3 id=\"enhanced-security-1\" style=\"position:relative;\"><a href=\"#enhanced-security-1\" aria-label=\"enhanced security 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Security</h3>\n<p>Authorization ensures that only authorized users can access specific resources and perform permitted actions. By enforcing proper access controls, organizations can significantly reduce the risk of data breaches, unauthorized access, and other security incidents.</p>\n<h3 id=\"granular-access-control\" style=\"position:relative;\"><a href=\"#granular-access-control\" aria-label=\"granular access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Granular Access Control</h3>\n<p>Authorization systems provide the flexibility to grant access on a granular level. This means administrators can define fine-grained access permissions for different users based on their roles, attributes, or other conditions. Granular access control allows for a more tailored and least privilege approach to access management.</p>\n<h3 id=\"compliance-and-auditing\" style=\"position:relative;\"><a href=\"#compliance-and-auditing\" aria-label=\"compliance and auditing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Compliance and Auditing</h3>\n<p>Many industries have specific compliance requirements regarding data access and protection. Authorization mechanisms help organizations comply with these regulations by monitoring and controlling access to sensitive information. Additionally, audit logs can track user activities, providing valuable data for security investigations and compliance reporting.</p>\n<h3 id=\"reduced-human-errors\" style=\"position:relative;\"><a href=\"#reduced-human-errors\" aria-label=\"reduced human errors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduced Human Errors</h3>\n<p>Implementing a structured authorization system reduces the likelihood of human errors in access control. Automated role-based or rule-based access assignment minimizes the chances of accidental misconfigurations and unauthorized access.</p>\n<h3 id=\"scalability-and-manageability\" style=\"position:relative;\"><a href=\"#scalability-and-manageability\" aria-label=\"scalability and manageability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Scalability and Manageability</h3>\n<p>As organizations grow, managing access rights can become challenging. Authorization systems, particularly role-based ones, offer <a href=\"https://www.loginradius.com/scalability/\">scalable solutions</a>, making it easier to add or remove users from different roles as the organization's structure evolves.</p>\n<h3 id=\"user-experience\" style=\"position:relative;\"><a href=\"#user-experience\" aria-label=\"user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Experience</h3>\n<p>A well-designed authorization system ensures that users can access the resources they need without unnecessary barriers. By providing a seamless and efficient user experience, employees can focus on their tasks without being impeded by access restrictions.</p>\n<h2 id=\"authentication-vs-authorization-understanding-the-techniques\" style=\"position:relative;\"><a href=\"#authentication-vs-authorization-understanding-the-techniques\" aria-label=\"authentication vs authorization understanding the techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication vs Authorization: Understanding the Techniques</h2>\n<p>When we talk about the difference between authentication and authorization, C IAM administrators should understand the core of utilizing both authentication and authorization, and how one differentiates from the other.</p>\n<p>For example, an organization will allow all its employees to access their workplace systems (that’s authentication!). But then, not everyone will have the right to access its gated data (that’s authorization!).</p>\n<p><a href=\"https://www.loginradius.com/authentication/\">Implementing authentication</a> with the right authorization techniques can protect organizations, while streamlined access will enable its workforce to be more productive.</p>\n<p>Here is the common authentication vs authorization techniques used by CIAM solutions to help you better understand the difference between authentication and authorization. However note that technologies like JWT, SAML, OpenID Authorization, and OAuth are used in both authentication and authorization.</p>\n<h3 id=\"popular-authentication-techniques\" style=\"position:relative;\"><a href=\"#popular-authentication-techniques\" aria-label=\"popular authentication techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Popular authentication techniques</strong></h3>\n<ul>\n<li><strong>Password-based authentication</strong> is a simple <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">method of authentication</a> that requires a password to verify the user's identity. </li>\n<li><strong>Passwordless authentication</strong> is <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">where a user is verified</a> through OTP or a magic link delivered to the registered email or phone number.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"passwordless-login\"\n        title=\"passwordless-login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/passwordless-login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/passwordless-login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/passwordless-login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/passwordless-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>2FA/MFA</strong> requires <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">more than one security level</a>, like an additional PIN or security question, to identify a user and grant access to a system. </li>\n<li><strong>Single sign-on</strong> (SSO) allows users to access multiple applications with a single set of credentials. </li>\n<li><strong>Social authentication</strong> verifies and <a href=\"https://www.loginradius.com/social-login/\">authenticates users</a> with existing credentials from social networking platforms.</li>\n</ul>\n<h3 id=\"popular-authorization-techniques\" style=\"position:relative;\"><a href=\"#popular-authorization-techniques\" aria-label=\"popular authorization techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Popular authorization techniques</strong></h3>\n<ul>\n<li><strong>Role-based access controls</strong> (RBAC) can be implemented for system-to-system and user-to-system privilege management.</li>\n<li><strong>JSON web token</strong> (JWT) is an open standard for securely transmitting data between parties, and users are authorized using a public/private key pair.</li>\n<li><strong>SAML</strong> is a standard Single Sign-On format (SSO) where authentication information is exchanged through XML documents that are digitally signed.</li>\n<li><strong>OpenID authorization</strong> verifies user identity based on an authorization server's authentication.</li>\n<li><strong>OAuth</strong> allows the API to authenticate and access the requested system or resource.</li>\n</ul>\n<p>To learn more about the authentication vs authorization - concept, differences, and techniques, check out the infographic created by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 670%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Authentication-Vs-Authorization-infographic\"\n        title=\"Authentication-Vs-Authorization-infographic\"\n        src=\"/static/2935024506705ba2636afa047daa36cb/e5715/Authentication-Vs-Authorization-1.png\"\n        srcset=\"/static/2935024506705ba2636afa047daa36cb/a6d36/Authentication-Vs-Authorization-1.png 650w,\n/static/2935024506705ba2636afa047daa36cb/e5715/Authentication-Vs-Authorization-1.png 768w,\n/static/2935024506705ba2636afa047daa36cb/4fa52/Authentication-Vs-Authorization-1.png 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"implementing-identity-and-access-management-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-identity-and-access-management-with-loginradius\" aria-label=\"implementing identity and access management with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Identity and Access Management with LoginRadius </h2>\n<p>Centralized identity and access management solutions can play a major role in delivering robust authentication and authorization for users within the organizational framework. </p>\n<p>A cloud-based CIAM solution like LoginRadius verifies authoritative user identities and automates privileges and rights based on <a href=\"https://www.loginradius.com/role-management/\">pre-defined roles</a>. </p>\n<p>What more? Not having to manually define permissions saves time, reduces backlogs, and ensure hassle-free user experience.</p>\n<p>Furthermore, with LoginRadius, opportunities to streamline CIAM are endless. That also includes securing access to privileged resources and safeguarding IT infrastructure from <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">cyber attacks</a>.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  What are some real-world examples of authentication and authorization in use?</strong></p>\n<p>Logging into a social media account using a username/password (authentication) and setting privacy controls for posts (authorization).</p>\n<p><strong>2. How do authentication and authorization improve overall security?</strong></p>\n<p>Authentication ensures only legitimate users access resources, while authorization restricts their actions, reducing potential threats from unauthorized users.</p>\n<p><strong>3. How can businesses determine which solution is best for their needs?</strong></p>\n<p>Businesses should assess their security requirements, user base, and budget to choose between various authentication methods (e.g., password-based, multi-factor, biometrics).</p>\n<p><strong>4. What are some common authentication and authorization technologies in use today?</strong></p>\n<p>Common authentication technologies include OTPs, fingerprint recognition, and smart cards. For authorization, role-based access control (RBAC) and OAuth are prevalent.</p>\n<p><strong>5.  How can authentication and authorization help with compliance requirements?</strong></p>\n<p>Properly implemented authentication and authorization processes can ensure data privacy and access controls, aiding businesses in meeting compliance regulations like GDPR or HIPAA.</p>\n<p><strong>6.  What is the future of authentication and authorization?</strong></p>\n<p>The future likely involves more advanced biometrics, continuous authentication, and AI-driven security measures to combat evolving cyber threats and enhance user experience. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 11, 2020","updated_date":null,"description":"As companies progress towards digital maturity in times of robust cloud-based systems and stringent online security, authentication and authorization are used in conjunction with each other.","title":"Authentication and Authorization Defined: What's the Difference? [Infographic]","tags":["authentication","authorization","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/e0951469abdfc257c0fc40334d45e1eb/33aa5/authentication-vs-authorization.jpg","srcSet":"/static/e0951469abdfc257c0fc40334d45e1eb/f836f/authentication-vs-authorization.jpg 200w,\n/static/e0951469abdfc257c0fc40334d45e1eb/2244e/authentication-vs-authorization.jpg 400w,\n/static/e0951469abdfc257c0fc40334d45e1eb/33aa5/authentication-vs-authorization.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"When the foundation of the General Data Protection Regulation (GDPR) was officially laid out, it prompted a rising need for organizations…","fields":{"slug":"/identity/consent-management/"},"html":"<p>When the foundation of the General Data Protection Regulation (GDPR) was officially laid out, it prompted a rising need for organizations running on <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">Customer Identity &#x26; Access Management</a> (CIAM) solutions to re-consider their security arrangements. </p>\n<p>To complement, LoginRadius introduces its Consent Management feature that offers a secure platform to support the European Union's <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">GDPR compliance capabilities</a>.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Launch</h2>\n<p>Customer data is at the epicenter of brand engagements today. With customer expectations dramatically shifting over the last couple of years, individuals demand customization and more control while interacting with brands online. </p>\n<p>GDPR exposed the world to a whole lot of data security concerns ranging from how to collect, store, get consent, and use personal information. The aim was to provide mutual benefits for companies and end-users by building stronger trust relationships.</p>\n<p>LoginRadius Consent Management will help companies and their security professionals understand the core mechanism of GDPR requirements and improve customer experience in the process. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 52.615384615384606%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Dashboard Consent Management\"\n        title=\"LoginRadius Dashboard Consent Management\"\n        src=\"/static/40f0dad23edd85b297bc23833dd162b3/212bf/LoginRadius-Dashboard-Consent-Management.jpg\"\n        srcset=\"/static/40f0dad23edd85b297bc23833dd162b3/6aca1/LoginRadius-Dashboard-Consent-Management.jpg 650w,\n/static/40f0dad23edd85b297bc23833dd162b3/212bf/LoginRadius-Dashboard-Consent-Management.jpg 768w,\n/static/40f0dad23edd85b297bc23833dd162b3/72e01/LoginRadius-Dashboard-Consent-Management.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"key-features-of-the-loginradius-consent-management-to-meet-the-eus-gdpr\" style=\"position:relative;\"><a href=\"#key-features-of-the-loginradius-consent-management-to-meet-the-eus-gdpr\" aria-label=\"key features of the loginradius consent management to meet the eus gdpr permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features of the LoginRadius Consent Management to Meet the EU's GDPR </h2>\n<ul>\n<li>It offers scoped access, encryption of data in transit and at rest, data backup, and a tested BCDR plan audited by independent third parties regularly. </li>\n<li>Our certifications include ISO 27001 and 27018, Service Organization Controls (SOC) 2 Type II, ISO 27001:2013, and EU-US Privacy Shield framework. </li>\n<li>\n<p>It allows the flexibility to perform every action of the consent lifecycle with ease, including:</p>\n<ul>\n<li>Creating, updating, and revocating custom consent forms. </li>\n<li>Scheduling consents forms and activating them at a future timestamp.</li>\n<li>Cloning consent form to create and replicate data.</li>\n<li>Offering user-friendly event-based experience for new and existing users.</li>\n</ul>\n</li>\n<li>Our platform enables easy deployment of consent forms via sequential steps with minimal custom code using our Identity Experience Framework and JavaScript Library.</li>\n<li>Customers own the right to grant consent, reject, access, withdraw, and modify data, along with portability and erasure in a transparent, freely given, clear, specific, informed, and unambiguous manner. </li>\n<li>It offers a single API for viewing and managing customer data across all systems, with a unified rich user profile. </li>\n<li>Our consent repository is designed as a secure database and a single source of truth for all data processing based on customers’ consent.</li>\n<li>It supports language localization for better and personalized communication.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-consent-management/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginraidus consent management datasheet\"\n        title=\"Loginraidus consent management datasheet\"\n        src=\"/static/dff7f4df9f54fc845d93d2cbfd3a8f34/e5715/DS-Consent-Management-1024x310.png\"\n        srcset=\"/static/dff7f4df9f54fc845d93d2cbfd3a8f34/a6d36/DS-Consent-Management-1024x310.png 650w,\n/static/dff7f4df9f54fc845d93d2cbfd3a8f34/e5715/DS-Consent-Management-1024x310.png 768w,\n/static/dff7f4df9f54fc845d93d2cbfd3a8f34/2bef9/DS-Consent-Management-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>LoginRadius Consent Management is an effort from the cloud-based CIAM solution provider to accelerate the path to compliance. Rest assured, companies can steer clear of GDPR-related fines that can otherwise be devastating even for the world's biggest companies. </p>\n<p>In addition to the GDPR, the LoginRadius Platform is also compliant with other international data privacy <a href=\"https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">standards like the CCPA</a>, NIST, and HIPPA.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 29, 2020","updated_date":null,"description":"When the General Data Protection Regulation (GDPR) was officially laid out, it sparked an increasing need to re-consider their security arrangements for organisations running on Customer Identity & Access Management (CIAM) solutions.","title":"LoginRadius Launches Consent Management to Support the EU's GDPR Compliance","tags":["data privacy","compliance","consent management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/937bf203268dbfe4d85930371206f755/6051d/Consent-Management.png","srcSet":"/static/937bf203268dbfe4d85930371206f755/69585/Consent-Management.png 200w,\n/static/937bf203268dbfe4d85930371206f755/497c6/Consent-Management.png 400w,\n/static/937bf203268dbfe4d85930371206f755/6051d/Consent-Management.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"If a couple of years ago, streaming apps were the future, then the future is here. As social isolation continues to be the new normal amidst…","fields":{"slug":"/identity/streaming-applications-secure-customer-data/"},"html":"<p><em>If a couple of years ago, streaming apps were the future, then the future is here.</em></p>\n<p>As social isolation continues to be the new normal amidst work-from-home and social distancing measures, the popularity of over-the-top (OTT) streaming apps – both video and audio has jumped exponentially to meet the <a href=\"https://www.loginradius.com/blog/2020/02/customer-experience-media-entertainment-industry/\">growing entertainment demands</a> of viewers.</p>\n<p>A recent study by Animoto suggests, <a href=\"https://animoto.com/blog/news/social-video-trends-consumers-2020\">70% of businesses</a> are investing in videos compared to the same time last year.</p>\n<p>With no new content for channels to run (because they are unable to shoot due to the pandemic), viewers are gravitating towards OTT streaming apps like Netflix, Disney Hotstar, Amazon Prime to watch fresh content.</p>\n<p><em>But what about data security amidst the volatile digital identity theft environment?</em></p>\n<p>With the boom in streaming applications, OTT services are a hotbed for sensitive credit card data and <a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\">personally identifiable information</a>.</p>\n<p>But sadly, it is not an uncommon occurrence that people share passwords on-the-go or use the same passwords across the plethora of streaming app premium subscriptions they own.</p>\n<p>Cybercriminals can easily monetize such mistakes and sell access credentials for data theft and identity fraud.</p>\n<h2 id=\"recent-cyber-attacks-in-the-video-and-music-streaming-industry\" style=\"position:relative;\"><a href=\"#recent-cyber-attacks-in-the-video-and-music-streaming-industry\" aria-label=\"recent cyber attacks in the video and music streaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recent Cyber Attacks in the Video and Music Streaming Industry</h2>\n<ul>\n<li>Popular streaming service, Disney+ indicated credential stuffing <a href=\"https://www.cpomagazine.com/cyber-security/new-disney-plus-streaming-service-hit-by-credential-stuffing-cyber-attack/\">cyberattack on their application</a> where hackers used stolen login credentials and then applied the brute force method to hack into accounts.</li>\n<li>Irdeto Piracy Trends <a href=\"https://www.aol.com/article/finance/2018/08/13/hundreds-of-stolen-passwords-for-netflix-hbo-hulu-and-more-discovered-for-sale-on-dark-web/23501424/\">Report revealed</a> that it discovered 854 listings of OTT credentials from 69 unique sellers in the dark web. What's more disturbing was the list included 42 popular streaming services, including Netflix, HBO, and Hulu.</li>\n<li>According to Proofpoint <a href=\"https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish\">threat analysts</a>, cybercriminals steal valid credentials from thousands of Netflix, Disney+ streaming accounts, and sell them online at a discounted price.</li>\n<li>The online music streaming service provider, Mixcloud was compromised by AWS hackers who gained unauthorized access to their systems and tried to <a href=\"https://www.cisomag.com/aws-hacker-attacks-online-music-service-mixcloud/\">sell more than 20 million user data</a> on the dark web. </li>\n</ul>\n<p>It has become imperative for content streaming players to fight back. In fact, using automated bot detection and low-friction authentication like social and passwordless login can go a long way in <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">securing digital identities</a>.</p>\n<h2 id=\"cyber-threats-faced-by-video-and-music-streaming-apps\" style=\"position:relative;\"><a href=\"#cyber-threats-faced-by-video-and-music-streaming-apps\" aria-label=\"cyber threats faced by video and music streaming apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cyber Threats Faced by Video and Music Streaming Apps</h2>\n<p>When it comes to entertainment-based streaming applications, security often takes the backseat. For customers, keeping Netflix or Amazon Prime's account credentials secure isn't much of a concern. They won't treat them the same way as they would their bank accounts.</p>\n<p>The lack of awareness is what hackers take advantage of. Some of the common ways attackers gain access to customer account include:</p>\n<h3 id=\"phishing-attack\" style=\"position:relative;\"><a href=\"#phishing-attack\" aria-label=\"phishing attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Phishing Attack</h3>\n<p>Phishing is a kind of social engineering attack where imposters dupe victims into opening an email link, instant message, or genuine looking sites to steal login credentials and credit card numbers.</p>\n<p>As the worldwide lockdown is forcing people to rely a lot more on streaming applications like Netflix, Disney+, Hulu, YouTube TV, fraudsters are seeing this as an opportunity to pose threats to users.</p>\n<p>According to a report by <a href=\"https://www.theguardian.com/media/2020/apr/19/hackers-exploit-coronavirus-lockdown-with-fake-netflix-and-disney-pages\">The Guardian</a>, more than 700 lookalike websites resembling Netflix and Disney+ signup pages have been created by hackers to take advantage of the pandemic streaming boom.</p>\n<p>These fake websites entice users with their free subscriptions to steal names, IDs, personal and financial information.</p>\n<h3 id=\"credential-stuffing-attack\" style=\"position:relative;\"><a href=\"#credential-stuffing-attack\" aria-label=\"credential stuffing attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Credential Stuffing Attack</h3>\n<p><a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">Credential stuffing</a> is a kind of cyberattack where hackers use large databases of stolen credentials via automated bots to gain access to user accounts.</p>\n<p>One of the biggest loopholes that result in a credential stuffing attack include consumers using the same login and password for multiple applications services.</p>\n<p>Streaming apps are the perfect victim of such attacks. Often, hackers know when there is a worldwide demand for a particular service, for example, during the premiere of a popular series. They know users will be sharing login credentials with others. That's precisely the kind of opportunity hackers look for.</p>\n<h3 id=\"brute-force-attack\" style=\"position:relative;\"><a href=\"#brute-force-attack\" aria-label=\"brute force attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Brute Force Attack</h3>\n<p>A brute force attack is a kind of hacking attempt that hackers use to target login pages through trial and error. The bad actors use automated bots to attempt as many guesses as possible until they are able to crack open an account with the right combination.</p>\n<p>One of the biggest examples of brute force attacks on streaming apps is that they are relatively simple to perform. Also, the lack of mitigation strategy in the systems' security level makes it a <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">popular form of cyberattack</a>.</p>\n<h3 id=\"account-takeover-attack\" style=\"position:relative;\"><a href=\"#account-takeover-attack\" aria-label=\"account takeover attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Takeover Attack</h3>\n<p>It seems like <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">account takeover attacks</a> are the new normal for content streaming applications today. Fraudsters have an intensive criminal ecosystem that often leverages a large database of previously stolen credentials to hack into OTT delivery models.</p>\n<p>They use bot infrastructure to attempt logging in with the hope that at least 1%-2% of these account owners will re-use their credentials. And when consumers do that, bam! Hackers take over those accounts and exploit them for financial gain.</p>\n<h3 id=\"man-in-the-middle-mitm-attack\" style=\"position:relative;\"><a href=\"#man-in-the-middle-mitm-attack\" aria-label=\"man in the middle mitm attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Man-in-the-Middle (MitM) Attack</h3>\n<p>Consider MitM attacks as cyber eavesdropping where attackers secretly place them between communication end-points and tamper data through a compromised, yet trusted system.</p>\n<p>Man-in-the-middle attacks can be easily automated, and hence, repercussions can be quite severe. Its negative brand publicity can cost businesses in millions, and customers can be ripped off money.</p>\n<p>Detecting MitM attacks is difficult, but they can be prevented through cybersecurity measures like multi-factor authentication and maximizing network control.</p>\n<h2 id=\"ott-over-the-top-streaming-services-and-apps\" style=\"position:relative;\"><a href=\"#ott-over-the-top-streaming-services-and-apps\" aria-label=\"ott over the top streaming services and apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OTT (Over-The-Top) Streaming Services and Apps</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"OTT (Over-The-Top) Streaming Services and Apps\"\n        title=\"OTT (Over-The-Top) Streaming Services and Apps\"\n        src=\"/static/32ca256cfd2e6ca189272ccfb8eaffe9/e5715/OTT-Over-The-Top-Streaming-Services-and-Apps-1024x703.png\"\n        srcset=\"/static/32ca256cfd2e6ca189272ccfb8eaffe9/a6d36/OTT-Over-The-Top-Streaming-Services-and-Apps-1024x703.png 650w,\n/static/32ca256cfd2e6ca189272ccfb8eaffe9/e5715/OTT-Over-The-Top-Streaming-Services-and-Apps-1024x703.png 768w,\n/static/32ca256cfd2e6ca189272ccfb8eaffe9/2bef9/OTT-Over-The-Top-Streaming-Services-and-Apps-1024x703.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Streaming entertainment giants are completely <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">aware of the cyber threats</a> - a reason why the media landscape is rapidly evolving to accommodate the growing security concerns.</p>\n<p>Some of the OTT (over-the-top) video streaming services and apps that stand out in the volatile environment include:</p>\n<h3 id=\"ott-video-streaming-services-and-apps\" style=\"position:relative;\"><a href=\"#ott-video-streaming-services-and-apps\" aria-label=\"ott video streaming services and apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OTT Video Streaming Services and Apps</h3>\n<ol>\n<li><strong>Netflix</strong></li>\n</ol>\n<p>Content is king, and catalog is everything when it comes to a video streaming service's success. Netflix ticks both the checkboxes. With over 182.8 million subscribers, it is one of the biggest video-distribution networks in the world today.</p>\n<p>To accommodate the security of the vast customer base, Netflix takes a <a href=\"https://partnerhelp.netflixstudios.com/hc/en-us/articles/360001937528-Netflix-Content-Security-Best-Practices\">risk-based approach to content security</a>. </p>\n<p>Some of the measures include regular risk assessment, strong authentication protections via MFA, security training and awareness program, business continuity plan, and ensuring that only persons working on client projects can access the content.</p>\n<ol start=\"2\">\n<li><strong>Amazon Prime Video</strong> </li>\n</ol>\n<p>Another streaming giant, Amazon Prime, handles cybersecurity by following the best possible practices.</p>\n<p>Some of them include the use of SSL to encrypt web traffic, use of secure cookies to prevent client malware from hacking customers and email and DNS protection to verify the authenticity of the email and web addresses. They also have their headers obscured.</p>\n<ol start=\"3\">\n<li><strong>Disney +</strong></li>\n</ol>\n<p>One of the world's largest independent media conglomerates, the Walt Disney Company, or simply Disney+ offers enhanced security measures to keep the data of its millions of subscribers safe.</p>\n<p>Who does it do it? Disney uses a robust SSL algorithm for data encryption. Furthermore, it also ensures that the ASP.NET version header is not exposed, so it is harder for hackers to hack into their systems.</p>\n<ol start=\"4\">\n<li><strong>Voot</strong></li>\n</ol>\n<p>Voot is Viacom18's Premium video on demand (SVOD) service for the Indian audience. It's the latest offering, Voot Select is launched with an extensive digital portfolio.</p>\n<p>The platform offers 32 original shows with edgy and disruptive stories, four international channels, and the best network content 24 hours before the episodes air on TV.</p>\n<ol start=\"5\">\n<li><strong>Alt Balaji</strong></li>\n</ol>\n<p>Alt Balaji, one of the leading OTT players, is a homegrown streaming platform for Indian consumers. With a variety of new options in the original web-series category, it lets you stream Indian content at a minimal cost.</p>\n<p>Speaking of its cybersecurity adjustments, they undertake robust internal control measures to limit the access of information and also offer strong <a href=\"https://www.altbalaji.com/privacy-policy\">security policies against phishing</a> to protect consumer data from identity theft.</p>\n<ol start=\"6\">\n<li><strong>BritBox</strong> </li>\n</ol>\n<p>BritBox is a UK-based digital video subscription service, which is a joint venture between ITV and the BBC. It serves the consumers in the United Kingdom, the United States, and Canada.</p>\n<p>The platform offers an ensemble of the massively popular British TV content along with fresh series of a mixture of genres. BritBox has chosen LoginRadius as the <a href=\"https://www.loginradius.com/press/loginradius-powers-britbox-launch-high-performance-ciam/\">sole provider of its managed identity platform</a>.</p>\n<ol start=\"7\">\n<li><strong>Hulu</strong></li>\n</ol>\n<p>Hulu is a very popular American video streaming application co-owned by The Walt Disney Company and Comcast. It streams newer TV shows in the US and Japan.</p>\n<p>With an extensive library, Hulu majorly focuses on original content, documentaries, blockbuster, and independent films and other popular shows from popular network broadcasters across the globe.</p>\n<ol start=\"8\">\n<li><strong>Zee 5</strong></li>\n</ol>\n<p>Zee 5 is another popular video streaming app for Indian consumers from entertainment network Zee Entertainment Enterprises Limited (ZEEL). The online OTT platform offers entertainment through hyper-personalization in their content developing strategies.</p>\n<p>Zee 5 offers Live TV, TV shows, originals, international shows, and premium movies in 11 navigational and 12 featured languages to cater to the ever-evolving viewership pattern of users.</p>\n<ol start=\"9\">\n<li><strong>HBO Go</strong></li>\n</ol>\n<p>HBO GO is a streaming service that is offered for free along with an existing HBO subscription. Consumers can enjoy unlimited access to the best HBO shows, movies, sports, and documentaries.</p>\n<ol start=\"10\">\n<li><strong>SonyLIV</strong></li>\n</ol>\n<p>SonyLIV is another popular OTT service that streams quality content by Sony Pictures Networks India Private Limited (SPN) for Indian users. Launched in 2013, it is the first premium video-on-demand service that offers multi-screen engagement, a massively popular concept these days.</p>\n<p>With secured digitization taking over the streaming platform, consumers are swamped with choices – FuboTV, Tubi, Philo, Youtube TV, Sling TV, Crunchyroll, Apple TV Plus, Sony Crackle, Hotstar, Erosnow, Viu, Jio Cinema, Zengatv and more.</p>\n<h3 id=\"ott-audio-streaming-services-and-apps\" style=\"position:relative;\"><a href=\"#ott-audio-streaming-services-and-apps\" aria-label=\"ott audio streaming services and apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OTT Audio Streaming Services and Apps</h3>\n<ol>\n<li><strong>Apple Music</strong></li>\n</ol>\n<p>Apple Music is one of the most loved music streaming apps that features more than 30 million songs and a 24/7 live radio. Music lovers can enjoy both commercial and local hits and options to upload their own music and stream to their devices.</p>\n<ol start=\"2\">\n<li><strong>Deezer</strong> </li>\n</ol>\n<p>Deezer is another popular music streaming app for music fanatics in the United States. It claims to offer the best quality music streaming service with an infinite collection of songs with automated recommendations.</p>\n<ol start=\"3\">\n<li><strong>iHeartRadio</strong></li>\n</ol>\n<p>iHeartRadio is one of the personal favorites of listeners who love to enjoy music from curated playlists. The premium on-demand music service houses millions of tracks, and there are radio stations that are offered for free.</p>\n<ol start=\"4\">\n<li><strong>Pandora</strong></li>\n</ol>\n<p>For music lovers looking for the most reliable online radio station, Pandora is the first choice. While there's a lot to enjoy in the free plan, listeners can enjoy unlimited skips with the premium account, along with a diverse collection of personalized radio stations.</p>\n<ol start=\"5\">\n<li><strong>SoundCloud</strong></li>\n</ol>\n<p>SoundCloud is a community-driven music streaming app and a popular choice for global indie creators. Listeners are exposed to millions of popular tracks, and they can also upload their own music.</p>\n<ol start=\"6\">\n<li><strong>Google Play Music</strong></li>\n</ol>\n<p>Google Play Music is undoubtedly one of the most popular audio streaming sites among music lovers. It is a perfect choice for on-demand music access with a tidy interface compared to other popular streaming sites.</p>\n<ol start=\"7\">\n<li><strong>Spotify</strong> </li>\n</ol>\n<p>Spotify has it all - from millions of songs, curated radio stations, playlists, podcasts, and even some video content. It is one of the most recognizable streaming music apps after Google Play Music.</p>\n<ol start=\"8\">\n<li><strong>Tidal</strong> </li>\n</ol>\n<p>Tidal is unquestionably a popular music streaming site that supports High Fidelity music. It offers a collection of over 50 million soundtracks and is available to dozens of countries worldwide. Tidal recommends users to access through Google Chrome to enjoy a HiFi music experience.</p>\n<p>Among its popular features include Android TV support, over 130,000 high definition music videos, expertly curated playlists, and a music blog.</p>\n<ol start=\"9\">\n<li><strong>YouTube Music</strong></li>\n</ol>\n<p>YouTube Music is the video service's most popular and recognizable music streaming offering. Like other music apps, users can enjoy millions of songs on the platform with the unique differentiation that it sources the YouTube channel.</p>\n<ol start=\"10\">\n<li><strong>Gaana</strong></li>\n</ol>\n<p>Gaana is an incredibly popular music streaming app among Indian audiences, mostly because of its selection of curated playlists and lively looking interface.</p>\n<p>With other popular options like TuneIn Radio, Wynk, JioSaavn, Amazon Prime Music, IDAGIO, PrimePhonic, and the likes, there is no shortage of music apps.</p>\n<p>Now, think of it this way. If nearly all of the population is attached to at least one streaming service (be it audio or video), we are a lucrative target for hackers to get their hands on sensitive data.</p>\n<h2 id=\"5-things-video-and-audio-streaming-industry-can-do-to-secure-the-user-experience\" style=\"position:relative;\"><a href=\"#5-things-video-and-audio-streaming-industry-can-do-to-secure-the-user-experience\" aria-label=\"5 things video and audio streaming industry can do to secure the user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Things Video and Audio Streaming Industry Can Do to Secure the User Experience</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Video and Audio Streaming Industry \"\n        title=\"Video and Audio Streaming Industry \"\n        src=\"/static/0179c3b843325d591a0fd6be791fc6fb/e5715/Video-and-Audio-Streaming-Industry-1024x703.png\"\n        srcset=\"/static/0179c3b843325d591a0fd6be791fc6fb/a6d36/Video-and-Audio-Streaming-Industry-1024x703.png 650w,\n/static/0179c3b843325d591a0fd6be791fc6fb/e5715/Video-and-Audio-Streaming-Industry-1024x703.png 768w,\n/static/0179c3b843325d591a0fd6be791fc6fb/2bef9/Video-and-Audio-Streaming-Industry-1024x703.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Identity is the most important entity in the digital ecosystem. Streaming applications should know how to associate the required restrictions with the right users and secure customer experiences. Here are five other ways to enhance customer security. </p>\n<ol>\n<li><strong>Put user experience at the center.</strong></li>\n</ol>\n<p>Popular streaming sites like Netflix, Amazon Prime, Disney + already do that. They offer curated recommendations on their home screen based on viewers' most binge-watched genre. This is where the use of AI for seamless customer experience comes into play. </p>\n<p>Make sure the UX complement aspects such as targeted retention strategies, quick onboarding, and secure payment gateways. </p>\n<p>But then, let's not forget that hackers are skilled engineers that develop faulty algorithms to redirect consumers to different payment sites. Make sure <a href=\"https://www.loginradius.com/authentication/\">you are authenticating users</a> with a robust security system on your OTT platform. </p>\n<ol start=\"2\">\n<li><strong>Safeguard customer data.</strong> </li>\n</ol>\n<p>Securing customer data in the digital space is a big deal for any industry. As consumers continue to subscribe, and your community grows, the growing database becomes more and more vulnerable to security risks.</p>\n<p>Henceforth, if any brand fails to <a href=\"https://www.loginradius.com/security/\">prioritize security and privacy</a>, it may be a significant blow to reputation. </p>\n<p>Conversely, practicing the right cybersecurity measures and investing in the right identity management solution will gain a competitive edge over others. </p>\n<ol start=\"3\">\n<li><strong>Steer clear of targeted automation and bots.</strong></li>\n</ol>\n<p>A vast majority of credential stuffing attacks happen due to botnets. Hackers usually program botnets to devise account takeovers of consumer data that are most vulnerable to attacks. </p>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Using multi-factor authentication</a> can help a great deal in reducing such risks. Users trying to authenticate should first confirm the human use of a web browser. </p>\n<p>For example, the clicking pattern or movement of a mouse during Recaptcha evaluation can determine the difference between a bot and a human.</p>\n<ol start=\"4\">\n<li><strong>Implement low-fiction security solutions.</strong></li>\n</ol>\n<p>If remembering complex passwords is a problem for consumers, introduce <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> into your system where you can confirm a user's identity through OTP, magic link, or biometrics in a more efficient, and secure way.</p>\n<p>It will keep customer data safe without creating any inconvenience to user experience — a win-win for both parties.</p>\n<ol start=\"5\">\n<li><strong>Protection against piracy.</strong></li>\n</ol>\n<p>Piracy sites are quite popular in the industry because they allow users to stream content for free. The lack of a monthly subscription business model seems more appealing than premium streaming services where users cannot move past thumbnails unless they are subscribers.</p>\n<p>Other benefits like live streaming of premium TV content make piracy sites more popular among general users. Sometimes, they resemble popular streaming applications to make hacking even easier.</p>\n<p>Educate your customers about different hacking practices and make sure they can distinguish between you and your pirated version.</p>\n<h2 id=\"the-need-for-identity-management-in-online-streaming-services-and-applications\" style=\"position:relative;\"><a href=\"#the-need-for-identity-management-in-online-streaming-services-and-applications\" aria-label=\"the need for identity management in online streaming services and applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Need for Identity Management in Online Streaming Services and Applications</h2>\n<p>Securing content and safeguarding customer information is crucial to the functioning of streaming apps. Any loophole in the security system may lead to compromised service and put your OTT brand at risk.</p>\n<p>A <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">cloud-based identity management solution</a> like LoginRadius sits between streaming services and general users to safeguard data embedded in backend and frontend systems.</p>\n<p>Today, streaming subscribers want things to be effortless and easy-to-operate. An identity management platform ticks all the boxes here.</p>\n<p>Wondering how? Let's find out. </p>\n<ul>\n<li>\n<p><strong>Single Sign-On</strong>: SSO or <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">Single Sign-on</a> allows a unified login system where a single set of login credentials can be used to access multiple partners.  </p>\n<p>Video broadcasting company BroadcastMed's successful implementation of SSO by LoginRadius is a good example.</p>\n</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/broadcastmed-case-study\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"BroadcastMed case study\"\n        title=\"BroadcastMed case study\"\n        src=\"/static/af32863f56c0b3b04d3ada5ccab74458/e5715/CS-BroadcstMed-1024x310.png\"\n        srcset=\"/static/af32863f56c0b3b04d3ada5ccab74458/a6d36/CS-BroadcstMed-1024x310.png 650w,\n/static/af32863f56c0b3b04d3ada5ccab74458/e5715/CS-BroadcstMed-1024x310.png 768w,\n/static/af32863f56c0b3b04d3ada5ccab74458/2bef9/CS-BroadcstMed-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The identity provider offered a centralized login system where users can seamlessly navigate to third-party sites and other syndication partners without the need to log in and out every time.</p>\n<ul>\n<li>\n<p><strong>Passwordless Login</strong>: The general users love it if they can log in or register without a password. In the streaming industry, <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a> can act as a catalyst for customer retention and loyalty.  </p>\n<p>With advanced authentication features like one-touch login and <a href=\"https://www.loginradius.com/docs/authentication/tutorial/smart-login/\">smart login</a>, subscribers can simply login by entering the OTP or email ID.</p>\n</li>\n<li><strong>Social Login</strong>: <a href=\"https://www.loginradius.com/social-login/\">Social login</a> is another authentication module that helps reduce login complexities and password fatigue. Subscribers can authenticate using their existing social media credentials instead of filling out time-consuming forms.</li>\n<li><strong>Increase security with MFA</strong>: Streaming applications can offer multi-factor authentication or <a href=\"https://www.loginradius.com/multi-factor-authentication/\">MFA as an additional security layer</a> to protect subscribers' data. They can minimize the risk of data theft by mandating customers to enter an instant OTP or open a link.</li>\n<li><strong>Compliance and privacy management</strong>: An identity management solution ensures that international <a href=\"https://www.loginradius.com/data-governance/\">data governance policies</a> are met. Additionally, it takes care of real-time fraud analysis to prevent stubborn hacking attempts.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Frictionless user experience and optimal security drive the transformation of the audio and video streaming industry. A common reason why most people do not favor multi-factor authentication or like to create unique passwords is because the process adds on to their effort.</p>\n<p>Even then data security remains a crucial aspect. You need to balance both the worlds. An identity management platform can help you achieve that.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 21, 2020","updated_date":null,"description":"OTT streaming apps should know how to mitigate data theft. Using a robust identity management solution in online streaming services helps secure digital identities.","title":"Streaming Applications: How to Secure Your Customer Data","tags":["data security","authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9607843137254901,"src":"/static/0e3b293d6c4492e0beefd2007bcf9422/33aa5/secure-customer-data.jpg","srcSet":"/static/0e3b293d6c4492e0beefd2007bcf9422/f836f/secure-customer-data.jpg 200w,\n/static/0e3b293d6c4492e0beefd2007bcf9422/2244e/secure-customer-data.jpg 400w,\n/static/0e3b293d6c4492e0beefd2007bcf9422/33aa5/secure-customer-data.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Cyber threat for businesses has always been a big deal. With the world population self-quarantined at home and the stock market succumbing…","fields":{"slug":"/identity/cyber-threats-business-risk-covid-19/"},"html":"<p>Cyber threat for businesses has always been a big deal. With the world population self-quarantined at home and the stock market succumbing to the ill-fated Covid-19, cybercriminals are making the most of the on-going crisis and adding on to the cyberthreat landscape.</p>\n<p>In April 2020 alone, WHO reported that some 450 active official email addresses and passwords <a href=\"https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\">were leaked online</a> along with thousands of other credentials – all linked with people working to mitigate the coronavirus impact.</p>\n<p>For cybercriminals, it has become easier than ever to conduct social engineering campaigns where they use fake emails to exploit the fear around the COVID-19 pandemic.</p>\n<p>Before going through the protection module, let's find out a few more creative examples of cyber threat for businesses.</p>\n<ul>\n<li>Online sellers are claiming they offer unlimited delivery of essentials products like groceries, medical, cleaning, and household supplies. When buyers pre-order, they never receive the order.</li>\n<li>Cybercriminals are creating fake websites with bogus face masks, hand sanitizers, wipes, and other medical equipment.</li>\n<li>Charities are losing money to man-in-the-middle attacks. Scammers are stealing donated money by hacking into organizations' accounts and redirecting donors to fake accounts.</li>\n<li>Phishing attempts by tempting users to get hold of personal data like account numbers, Social Security numbers, and <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">login credentials</a>. </li>\n</ul>\n<p>Amidst IT facing the heat to mitigate the Covid-19 data breach challenges, certain techniques like phishing attack remain constant.</p>\n<p>It is time for businesses to pull the chord on attackers exploiting accounts and gaining access to high-profile resources. </p>\n<h2 id=\"industries-at-risk-during-covid-19\" style=\"position:relative;\"><a href=\"#industries-at-risk-during-covid-19\" aria-label=\"industries at risk during covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Industries at Risk During COVID-19</h2>\n<p>With the majority of companies working on the \"work from home\" module, cyber threats for businesses have increased multi-fold – which is irrespective of any industry. The most notable ones include:</p>\n<h3 id=\"media-industry\" style=\"position:relative;\"><a href=\"#media-industry\" aria-label=\"media industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Media Industry</strong></h3>\n<p>The <a href=\"https://www.loginradius.com/blog/2020/02/customer-experience-media-entertainment-industry/\">media and entertainment industry</a> is rapidly becoming a new favorite for cyber hackers as they find creative ways to exploit revenue-driven assets like intellectual property or commercially sensitive data in the industry's security infrastructure. </p>\n<p>Moreover, with the shooting popularity of streaming sites due to the pandemic, hackers are turning these services into a new hotspot for exploitation. </p>\n<p>According to the cybersecurity firm Mimecast, <a href=\"https://www.capetalk.co.za/podcasts/136/early-breakfast-with-abongile-nzelenzele/310995/streaming-services-spoofed-more-than-700-suspicious-domains-impersonating-netflix-found\">more than 700 fake websites</a> resembling Netflix and Disney+ signup pages were identified between 6th April 2020 and 12 April 2020. </p>\n<p>It seems like with the world population obliged to stay at home, hackers are redirecting their attention to streaming services for understandably obvious reasons – i.e. to pose cyber threat for businesses. </p>\n<h3 id=\"hospitality-industry\" style=\"position:relative;\"><a href=\"#hospitality-industry\" aria-label=\"hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Hospitality Industry</strong></h3>\n<p>Hospitality is one of the hardest-hit industries during this time of the pandemic. It witnessed a sharp decline in the first quarter of 2020. But, just because the industry isn't in its best shape at the moment, it doesn't mean they aren't a target for bad actors anymore. </p>\n<p>Hackers are getting increasingly sophisticated and finding new ways to steal guests' information from systems, servers, and even the front desks. </p>\n<p><a href=\"https://www.loginradius.com/blog/2020/04/marriott-data-breach-2020/\">Marriott data breach</a> at the end of February 2020 made headlines for the second time. More than 5.2 million guest data including names, birth-dates, phone numbers, language preferences, and loyalty account numbers were exposed as a result of the breach.</p>\n<p>A data breach in this sector can lead to severe cyber threat for businesses like damage to reputation, loss of customer trust, and cost thousands of dollars in fines and penalties. </p>\n<h3 id=\"financial-industry\" style=\"position:relative;\"><a href=\"#financial-industry\" aria-label=\"financial industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Financial Industry</strong></h3>\n<p>The <a href=\"https://www.loginradius.com/blog/2020/04/financial-industry-identity-management/\">financial industry</a> is no alien to cyberattacks during the novel coronavirus pandemic. The U.S. Secret Service and the FBI even declared that <a href=\"https://www.us-cert.gov/ncas/alerts/aa20-106a\">North Korea's hacking activities</a> are threatening the country's financial system and the stability of the global community at large.</p>\n<p>As governments across the globe are sanctioning millions of dollars to mitigate the economic crisis, financial institutions play the primary role in distributing the funds to companies and citizens. Therefore, this industry is a juicy target, not just for North Korea but for the bad actors at large. </p>\n<p>With people working remotely on less secure networks, they are easy targets for hackers to exploit sensitive systems and even bring down national economies. </p>\n<h3 id=\"retail-industry\" style=\"position:relative;\"><a href=\"#retail-industry\" aria-label=\"retail industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Retail Industry</strong></h3>\n<p>Mimecast observed more than <a href=\"https://www.mimecast.com/globalassets/cyber-resilience-content/100-days-of-coronavirus-threat-intelligence.pdf\">60,000 COVID-19-related fake domains</a> were created since January 2020 to steal from unsuspecting panic-buyers through lookalike domains during the time of crisis. </p>\n<p>The <a href=\"https://www.loginradius.com/blog/2020/05/customer-experience-retail-industry/\">retail industry</a> has a lot to do with payment and transactions. Retailers are loaded with customers' personally identifiable information, and if hacked, millions of data are exposed.</p>\n<p>No doubt, attackers have become more opportunist and automated with time. In response to the increasing impersonation attack campaigns and cyber threat for businesses, organizations need to review their cybersecurity strategies and add multiple layers of security as their first line of defense. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-retail-and-consumer-goods-companies-use-loginradius-identity-solution/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Datasheet-How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius\"\n        title=\"Datasheet-How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius\"\n        src=\"/static/58eda90d8cb3e71f78a942b87b50d167/e5715/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png\"\n        srcset=\"/static/58eda90d8cb3e71f78a942b87b50d167/a6d36/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png 650w,\n/static/58eda90d8cb3e71f78a942b87b50d167/e5715/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png 768w,\n/static/58eda90d8cb3e71f78a942b87b50d167/2bef9/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"gaming-industry\" style=\"position:relative;\"><a href=\"#gaming-industry\" aria-label=\"gaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Gaming Industry</strong></h3>\n<p><a href=\"https://www.loginradius.com/blog/2020/01/improving-customer-experience-in-the-gaming-industry/\">Gamers are taking advantage</a> of social distancing to boost gaming skills while the newbies are using games to relieve their boredom or alleviate their anxiety.</p>\n<p>No doubt, the gaming industry is gradually becoming a lucrative target <a href=\"https://securityintelligence.com/posts/player-vs-hacker-cyberthreats-to-gaming-companies-and-gamers/\">for hackers</a> to make money - mostly in exchange for in-game items for profit. </p>\n<p>Also, gamers fall under elite demographics who do not mind spending money. So, their financial status is also a big turn-on for hackers. </p>\n<h3 id=\"education-industry\" style=\"position:relative;\"><a href=\"#education-industry\" aria-label=\"education industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Education Industry</strong></h3>\n<p>The pandemic has reformed the online learning landscape (for good). E-learning is quickly shaping up as the new normal for the global education industry.</p>\n<p>With schools and colleges temporarily shut, the impact of the crisis is reshaping application processes and taking active care of crisis management strategies. </p>\n<p>That was the good part. Now, speaking of what went wrong, criminals are in no mood to spare this industry too. Recently, the popular online learning platform Unacademy <a href=\"https://www.business-standard.com/article/companies/unacademy-s-database-hacked-information-of-11-million-users-compromised-120050701280_1.html\">was hacked online</a>. </p>\n<p>The breach exposed details of 22 million users and listed 21,909,707 records for sale at $2,000 on darknet forums. Most of the compromised data included usernames, hashed passwords, email addresses, profile details, account status, date of joining, and last login date.</p>\n<h2 id=\"best-practices-for-companies-to-deal-with-cyber-threats-during-covid-19\" style=\"position:relative;\"><a href=\"#best-practices-for-companies-to-deal-with-cyber-threats-during-covid-19\" aria-label=\"best practices for companies to deal with cyber threats during covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices for Companies to Deal With Cyber Threats During COVID-19</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Best Practices for Companies to Deal With Cyber Threats\"\n        title=\"Best Practices for Companies to Deal With Cyber Threats\"\n        src=\"/static/1f6458325bce0a341bb10dcdcf6a5834/212bf/Best-Practices-for-Companies-to-Deal-With-Cyber-Threats.jpg\"\n        srcset=\"/static/1f6458325bce0a341bb10dcdcf6a5834/6aca1/Best-Practices-for-Companies-to-Deal-With-Cyber-Threats.jpg 650w,\n/static/1f6458325bce0a341bb10dcdcf6a5834/212bf/Best-Practices-for-Companies-to-Deal-With-Cyber-Threats.jpg 768w,\n/static/1f6458325bce0a341bb10dcdcf6a5834/72e01/Best-Practices-for-Companies-to-Deal-With-Cyber-Threats.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As companies across the globe are adapting to new working environments to remain socially distant, it seems like cybercriminals are competing within themselves to come up with innovative ways to devise new cyber threat for businesses and exploit new vulnerabilities. </p>\n<p>It is high time for enterprises to understand the <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">severity of cyberattacks</a> and work in advance to mitigate those threats. Following are a few best practices:</p>\n<h3 id=\"secure-remote-working\" style=\"position:relative;\"><a href=\"#secure-remote-working\" aria-label=\"secure remote working permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Secure remote working.</strong></h3>\n<p>No matter how hard you try, remote working can never be like working from the office. There is a huge difference in attitude between the two. But when we at a more comfortable space, it is much easier to make mistakes.</p>\n<ul>\n<li>Train your employees on how to work on a remote setup. Get work from home organization policies drafted and educate employees so they can comply. </li>\n<li>Ensure that your employees' system communication at home is free from eavesdropping. Educate them on how to configure home Wi-Fi router for added security. Also, hard to guess passwords is a must. </li>\n<li>If you're working in a BYOD model, ask your employees to <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-best-practices-for-enterprises/\">cover basic security features</a> like installing antivirus software and multi-factor authentication.</li>\n<li>All desktops, laptops and mobile devices should be patched and updated.</li>\n<li>Ensure your employees do not click or open any unknown attachment or donation links. In case of suspicion, ask them to verify first.</li>\n</ul>\n<h3 id=\"get-the-security-fundamentals-right\" style=\"position:relative;\"><a href=\"#get-the-security-fundamentals-right\" aria-label=\"get the security fundamentals right permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Get the security fundamentals right.</strong></h3>\n<p>Bear in mind that cybercriminals are always on the lookout to leverage every vulnerability in their favor to pose cyber threat for businesses. Therefore, companies should remain composed during this global crisis and plan every counteractive move.</p>\n<ul>\n<li>If your organization is working on a remote setup, train your employees to install software updates as soon as they are released. Maybe, ask your IT team to patch anti-malware apps with email and online surfing to mitigate threat vulnerabilities.</li>\n<li>Even though multi-factor authentication is in place, ensure that your employees are practicing good <a href=\"https://www.loginradius.com/blog/2018/12/infographic-the-death-of-passwords/\">password hygiene</a>. Popular recommendations include passphrases, never using the same password for different accounts, updating default passwords, adding special characters instead of just digits or letters.</li>\n<li>Keep backup of your data and regularly test processes as things pile up. Moreover, it comes handy when businesses fall victim of ransomware attacks. Not relying on just the one data backup center means not having to pay criminals to get your data back.</li>\n</ul>\n<h3 id=\"conduct-safer-meetings\" style=\"position:relative;\"><a href=\"#conduct-safer-meetings\" aria-label=\"conduct safer meetings permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Conduct safer meetings.</strong></h3>\n<p>Close to half a million Zoom (a video conferencing app) accounts were <a href=\"https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/\">sold on the dark web</a>. Get the severity? Businesses need to be extra cautious while conducting meetings in a remote environment. Top recommendations include: </p>\n<ul>\n<li>The IT department should approve of the web-conference platform.</li>\n<li>Introduce new participants as they join in to avoid falling for imposters.</li>\n<li>Do not use the same meeting access codes for meetings. Change them occasionally.</li>\n<li>Never record meetings, unless extremely needed.</li>\n</ul>\n<h3 id=\"secure-confidential-data\" style=\"position:relative;\"><a href=\"#secure-confidential-data\" aria-label=\"secure confidential data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Secure confidential data.</strong></h3>\n<p>Because employees are working in their network environments, it has become imperative to <a href=\"https://www.loginradius.com/security/\">secure confidential organizational data</a>. Here are some instructions businesses would want to send out:</p>\n<ul>\n<li>Restrict employees from transferring business data to personal computers.</li>\n<li>Documents with sensitive data should be locked securely outside of office hours. </li>\n<li>Do not allow employees to print documents or emails that contain sensitive data, if not necessary.</li>\n</ul>\n<h2 id=\"how-loginradius-mitigates-the-risk-for-organizations\" style=\"position:relative;\"><a href=\"#how-loginradius-mitigates-the-risk-for-organizations\" aria-label=\"how loginradius mitigates the risk for organizations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Mitigates the Risk for Organizations</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Industries at Risk During COVID-19\"\n        title=\"Industries at Risk During COVID-19\"\n        src=\"/static/f15a22b24f70b1f14c1bcee917bc8e34/212bf/Industries-at-Risk-During-COVID-19.jpg\"\n        srcset=\"/static/f15a22b24f70b1f14c1bcee917bc8e34/6aca1/Industries-at-Risk-During-COVID-19.jpg 650w,\n/static/f15a22b24f70b1f14c1bcee917bc8e34/212bf/Industries-at-Risk-During-COVID-19.jpg 768w,\n/static/f15a22b24f70b1f14c1bcee917bc8e34/72e01/Industries-at-Risk-During-COVID-19.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The coronavirus outbreak has pushed more people to go digital. A <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) solution like the cloud-based LoginRadius can help businesses deal with scalability and offer a secure environment to sustain the newfound digital identities. </p>\n<p>Few of the advantages for business and its customers include:</p>\n<ul>\n<li><strong>Frictionless access</strong>: With <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, businesses can allow customers to authenticate without the need to create a new account every single time while entering into their multiple web-based services.</li>\n<li><strong>Seamless login</strong>: <a href=\"https://www.loginradius.com/social-login/\">Social login</a> reduces login issues and password fatigue. It is easy to use as customers do not need to fill out long traditional forms or remember complex credentials. They are instead authenticated using their existing social media credentials.</li>\n<li><strong>Advanced login options</strong>: Businesses can enjoy new and advanced login options like <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> where customers can authenticate and log in with a one-time link sent to their email address, phone number, and one-touch login customers can log in without the obligation to create new accounts. </li>\n<li><strong>Enhanced protection</strong>: LoginRadius offers <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a> as an essential security feature to secure customers' sensitive data and account access. It prevents attackers from running cyber threat for businesses to a large extend. For example, MFA verifies identities by mandating customers to enter an additional code or open a link sent to their registered mobile number or email id.</li>\n<li><strong>Consent and privacy management</strong>: LoginRadius provides global <a href=\"https://www.loginradius.com/data-governance/\">data access governance</a> policies for businesses to ensure that regional data storage and other privacy compliances are met. Companies can abide by user-centric preferences laid out by international laws like the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">EU's GDPR and California's CCPA</a>.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h2>\n<p>The digital space is all about identity, where cyber threat for businesses is at an all-time high. With the world on a standstill due to the pandemic, the idea of secure data governance and scalable identity management in the volatile environment should make the cut.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABbElEQVQY0zVQO0/CUBQmaihthUbRhPhCAlhKEXlE3s+CCEaBwQF10riQODkwaFyMMcTFwR9gjBvRSeKko4NxcfD/fJ57C8PJbc53+r0soj8Lm5qHbS0HW6AIwZ+DXSvAESxBpJ3MMLph3+xWDlUwm2jCGa5A0isQtRIkhrH/CbdwwkDBHAJlGodexsy6wUkduknMBCfdmxCCBhZKHailfUxGm5jQKphaTUDwmaIWdigyF1oZsm7AFavBRspKuMpdTJMQO5yLbCHVPkG0cYRY4xAR9tbp3T5AsnUMT7YFqzdtOuQOSFmiyMupXUihKuzk0hWvc0xgUYlYod18tAZPrg13eg8rNIuJHSihMtVUHEUe51cLPJ5zo8oJJRJQRnHlQB6WpTjOru7w/fuH59d3PL0M8Th4w+fXDwbDD16R1ZsxCcelsyUbidQEEuC9ECap1J8nCaPTRe/2Ad3LvjkXfZxf3+O0d8P7FnwZ/AMzEsMp2f6LdQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 18, 2020","updated_date":null,"description":"Cyber risks have always been a big deal for corporations. With the self-quarantined world population at home and the stock market succumbing to the ill-fated Covid-19.","title":"Protecting Organization From Cyber-Threats: Business at Risk During COVID-19","tags":["cybersecurity","data security","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f96bf5fbc11694ae42e4b0519c1d81a6/33aa5/cyber-threats.jpg","srcSet":"/static/f96bf5fbc11694ae42e4b0519c1d81a6/f836f/cyber-threats.jpg 200w,\n/static/f96bf5fbc11694ae42e4b0519c1d81a6/2244e/cyber-threats.jpg 400w,\n/static/f96bf5fbc11694ae42e4b0519c1d81a6/33aa5/cyber-threats.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"LoginRadius has been simplifying identity management to help businesses build stronger relationships with their customers. With our…","fields":{"slug":"/identity/loginradius-ciam-china-business/"},"html":"<p>LoginRadius has been simplifying identity management to help businesses build stronger relationships with their customers.</p>\n<p>With our LoginRadius China CIAM platform, we aim to help businesses <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">securely manage digital identities</a> within the restrictive borders of mainland China.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>The Chinese online market is a lucrative hotspot for businesses with over 900 million active internet users, as of March 2020. From a digital business standpoint, it is critical for enterprises that want to expand their customer base by collecting and storing citizen's data, to understand China's cyber regime.</p>\n<p>We ensure that our LoginRadius China <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management</a> platform meets the changing privacy regulations imposed by China, and businesses are able to streamline a hassle-free customer experience in the nation’s digital ecosystem.</p>\n<h2 id=\"key-features-of-the-loginradius-china-ciam\" style=\"position:relative;\"><a href=\"#key-features-of-the-loginradius-china-ciam\" aria-label=\"key features of the loginradius china ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features of the LoginRadius China CIAM</h2>\n<p><strong>Data Center</strong>: To meet the data localization regulation requirements of the Chinese government, LoginRadius owns a primary data center in China. We offer a mature operating model where data accessibility and data protection are completely transparent. Our cloud solution is highly scalable and provides up to a <strong>99.99% service level agreement guarantee</strong> with perfect deployment capabilities. </p>\n<p><strong>Chinese Social Providers</strong>: On the LoginRadius China CIAM platform, businesses can integrate APIs with native social networks like Sina Weibo, Kaixin, QQ Tencent, Renren, WeChat, along with approximately 40 other social providers. There are provisions for mobile native support for WeChat too along with the flexibility to add custom social providers.  </p>\n<p><strong>QQ Tencent Captcha</strong>: Captcha can be applied as a lockout method for brute force attacks. Because China does not support Google reCAPTCHA, LoginRadius serves QQ Tencent Captcha to ensure that the end-user is a human and not bots.</p>\n<p><strong>Multilingual Support</strong>: The LoginRadius China CIAM solution provides local language support through simplified and traditional Chinese. Businesses can easily configure language settings too.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-china-ciam\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius ciam china datasheet\"\n        title=\"Loginradius ciam china datasheet\"\n        src=\"/static/ac3b7347b15afc3f29625a8d073e16f6/e5715/DS-Product-Chinese-CIAM-1024x310.png\"\n        srcset=\"/static/ac3b7347b15afc3f29625a8d073e16f6/a6d36/DS-Product-Chinese-CIAM-1024x310.png 650w,\n/static/ac3b7347b15afc3f29625a8d073e16f6/e5715/DS-Product-Chinese-CIAM-1024x310.png 768w,\n/static/ac3b7347b15afc3f29625a8d073e16f6/2bef9/DS-Product-Chinese-CIAM-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>Privacy and security rule everything in China. With the LoginRadius China customer identity and access management solution, we aim to offer a mainstream business capability for businesses that drive (or aims to drive) revenue growth by leveraging the identity data of Chinese citizens.</p>\n<p>From social integration, <a href=\"https://www.loginradius.com/multi-factor-authentication/\">strong authentication</a>, local language support to meeting the standard regional regulatory compliances, they are the key areas no clients should worry about.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo-loginradius\"\n        title=\"Book-a-demo-loginradius\"\n        src=\"/static/a854d948ee1cb58ffca614fbff39f749/e5715/BD-Developers2-1024x310.png\"\n        srcset=\"/static/a854d948ee1cb58ffca614fbff39f749/a6d36/BD-Developers2-1024x310.png 650w,\n/static/a854d948ee1cb58ffca614fbff39f749/e5715/BD-Developers2-1024x310.png 768w,\n/static/a854d948ee1cb58ffca614fbff39f749/2bef9/BD-Developers2-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 14, 2020","updated_date":null,"description":"With our LoginRadius China CIAM platform, we aim to help businesses securely manage digital identities within the restrictive borders of mainland China.","title":"Announcement - LoginRadius China CIAM for Businesses to Benefit From Its Lucrative Market","tags":["industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/264ba6470f4b235a308124ffe6b27a57/14b42/LoginRadius-China-CIAM.jpg","srcSet":"/static/264ba6470f4b235a308124ffe6b27a57/f836f/LoginRadius-China-CIAM.jpg 200w,\n/static/264ba6470f4b235a308124ffe6b27a57/2244e/LoginRadius-China-CIAM.jpg 400w,\n/static/264ba6470f4b235a308124ffe6b27a57/14b42/LoginRadius-China-CIAM.jpg 800w,\n/static/264ba6470f4b235a308124ffe6b27a57/47498/LoginRadius-China-CIAM.jpg 1200w,\n/static/264ba6470f4b235a308124ffe6b27a57/0e329/LoginRadius-China-CIAM.jpg 1600w,\n/static/264ba6470f4b235a308124ffe6b27a57/13721/LoginRadius-China-CIAM.jpg 2135w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The financial industry has a deep-rooted relationship with its customers. After all, handling mortgages, retirement savings, home, and…","fields":{"slug":"/identity/financial-industry-identity-management/"},"html":"<p>The financial industry has a deep-rooted relationship with its customers. After all, handling mortgages, retirement savings, home, and personal loans require the highest level of trust. It comes from ensuring that the right people have access to the right information.</p>\n<p>Likewise, a robust identity management system helps financial organizations <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">remain compliant and conduct business</a> in a secure environment.</p>\n<p>The COVID-19 outbreak has led to fresh strings of phishing and real-time identity thefts. As countries across the globe are rolling out financial iterations in response to the pandemic like tax due-date extension and new direct stimulus payments, fraudsters are using this as an outright theft opportunity.</p>\n<h2 id=\"recent-cyber-attacks-in-the-finance-industry\" style=\"position:relative;\"><a href=\"#recent-cyber-attacks-in-the-finance-industry\" aria-label=\"recent cyber attacks in the finance industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recent Cyber Attacks in the Finance Industry</h2>\n<ul>\n<li>According to the Federal Trade Commission, Americans alone have <a href=\"https://www.cnbc.com/2020/04/15/americans-have-lost-13point4-million-to-fraud-linked-to-covid-19.html\">lost $13.4 million</a> to coronavirus-related fraud in 2020 so far. </li>\n<li>On April 15, 2020, the U.S. Secret Service and the FBI declared that the North Koreans have used <a href=\"https://www.us-cert.gov/ncas/alerts/aa20-106a\">cyber attacks to steal</a> some $2 billion over the past decade. </li>\n<li>According to VMware Carbon Black analytics, the global financial industry saw a 38% increase in cyberattacks and <a href=\"https://searchsecurity.techtarget.com/news/252481832/Ransomware-attacks-see-148-surge-amid-COVID-19\">148% spike in ransomware attacks</a> between February and March 2020. </li>\n<li>As the estimated global cost of cyber attacks stands <a href=\"https://www.independent.co.uk/news/business/news/cyber-attack-financial-crisis-christine-lagarde-ecb-a9322556.html\">between $45bn and $654bn</a>, ECB chief Christine Lagarde warns the world of a plausible financial crisis. </li>\n<li>In mid-march, hackers silently entered the London-based fintech company, Finastra Group Holdings Ltd., and <a href=\"https://www.zdnet.com/article/fintech-company-finastra-hit-by-ransomware/\">captured employee passwords</a>. They also installed dozens of backdoors inside Finastra's network. As a result, the company had to shut down its servers. </li>\n</ul>\n<p>Get the severity now?</p>\n<p>So, how do banking and online financial industries safeguard identities in the consumer-centered market?</p>\n<p>The answer lies in implementing a modern identity management system that is good at data protection.</p>\n<p>But before exploring the growing need for identity management in the online finance sector, let's understand the security challenges in the finance sector first.</p>\n<h2 id=\"security-risk-and-challenges-faced-by-finance-industries\" style=\"position:relative;\"><a href=\"#security-risk-and-challenges-faced-by-finance-industries\" aria-label=\"security risk and challenges faced by finance industries permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Risk and Challenges Faced by Finance Industries</h2>\n<p>Financial institutions feel the most burn from cyberattacks. After all, that's where all the money is. <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">Attackers can take many forms</a> and spread across a wide range of channels. The widespread ones include:</p>\n<p><strong>1. Bot Attacks</strong></p>\n<p>Bots are a series of automated online programs designed to conduct repetitive tasks. The majority of modern businesses in the financial sector use bots to enhance customer service.</p>\n<p>But, on the downside,  if the bad guys operate them, bots can breach cybersecurity defenses and steal customer data.</p>\n<p>For example, they can be used to launch brute force attacks and result in <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">corporate account takeover fraud.</a> </p>\n<p>You need to implement the right fraud detection solution to stop bot attacks. Also, having a robust device authentication system can keep your customers safe.</p>\n<p><strong>2. Ransomware Attacks</strong></p>\n<p>It is no secret why <a href=\"https://www.ft.com/content/387eb604-4e72-11ea-95a0-43d18ec715f5\">ransomware hackers are after financial institutions</a>. That includes banks, insurance companies, and any other organization where data is a basic entity for survival.</p>\n<p>Cybercriminals take advantage of this vulnerability because they know companies have both the means and the incentive to pay the ransom and have their data decrypted.</p>\n<p>The first line of defense against ransomware attacks is having a secure data backup system. Next, you need to implement disaster recovery solutions and conduct cybersecurity training for employees.</p>\n<p><strong>3. Phishing Attacks</strong> </p>\n<p>In the financial service industry, phishing scams are also as common as ransomware attacks. Attackers employ social engineering tricks to break into networks.</p>\n<p>Most of the time, they are standard email links and attachments. But phishing attacks are also executed via pop-ups, chatbots, media feeds, search engines, and browser extensions.</p>\n<p>To counter, get your financial institute advanced endpoint protections and strengthen its payment system. Above all, prepare for how you'll limit damage and recover if you are at the receiving end.</p>\n<h2 id=\"advantages-of-identity-management-in-online-finance-sector\" style=\"position:relative;\"><a href=\"#advantages-of-identity-management-in-online-finance-sector\" aria-label=\"advantages of identity management in online finance sector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Identity Management in Online Finance Sector</h2>\n<p>An identity management system can improve the security and productivity of a financial institute. It offers numerous benefits to keep customers' sensitive data safe and unharmed from attackers.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsSAAALEgHS3X78AAABJUlEQVQoz4VS20rEMBDt//+X4JMgCItURVnd3Ta9pblPMhOnLYi13XWeQuacOWcuRf4vkHKkTETbVHGDtsAHBy+teR9hyy9+QFsah8P82Qx3D0+lYPYVZRup99j7NAQEnFAsYwA7n87Kvx4vtXJp17ZikAWIkQnWh9alMUyFzFIm50A57fackGRAa+1oPcsqbUyIwqY//mmvryIkGnxa9L80LAKSf2cEzfGbzG64x5WyMbbTbgRspXIQKzORTSQJnKW51Owf6STNh5By1lv1zG/jQ2MjdytcqpR/Lt8utegCjmEawVnDsZHlSQgdVtMe5iGxi0XH85Lq9v7xcKjk4CKnIk7I3gEXXTDFtWHwVoX2vORDD62Lu1d068JCyioSu0Xav6JvM2jA9nvsT+sAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Identity management in online finance sector\"\n        title=\"Identity management in online finance sector\"\n        src=\"/static/d75b762e56e6ea1908912c55b258c15e/e5715/Identity-management-in-online-finance-sector.png\"\n        srcset=\"/static/d75b762e56e6ea1908912c55b258c15e/a6d36/Identity-management-in-online-finance-sector.png 650w,\n/static/d75b762e56e6ea1908912c55b258c15e/e5715/Identity-management-in-online-finance-sector.png 768w,\n/static/d75b762e56e6ea1908912c55b258c15e/2bef9/Identity-management-in-online-finance-sector.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Integrating a <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">reliable CIAM platform</a> into your institution can build cyber defenses against criminals that are both comprehensive and resilient. Furthermore, it is equipped with unique advantages where you can:</p>\n<ul>\n<li>Leverage the identity management system for multi-factor authentication and authorization in the cloud.</li>\n<li>Securely manage customer and employee identities. </li>\n<li>Enjoy a complete user management system and delegate privileges across multiple accounts.</li>\n<li>Manage identities in a complex IT environment through single sign-on (SSO).</li>\n<li>Minimize the risk of data loss through automated reporting.</li>\n<li>Fulfill governance requirements by enforcing policies and auditing compliances.</li>\n<li>Employ security standards such as SAML, LDAP, to ensure secure access to third-party applications.</li>\n<li>Proactively monitor inactive user data, application utilization data, and other login activities.</li>\n</ul>\n<h2 id=\"how-loginradius-mitigates-data-security-risks-in-the-financial-services\" style=\"position:relative;\"><a href=\"#how-loginradius-mitigates-data-security-risks-in-the-financial-services\" aria-label=\"how loginradius mitigates data security risks in the financial services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius mitigates data security risks in the financial services</h2>\n<p>LoginRadius is a leading cloud-based <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> solution that makes managing identities of financial institutions smooth and seamless. It provides the finance sector with real-time customer insights and makes sure that only the authorized person has access to confidential data and assets.</p>\n<p>With the LoginRadius identity platform, online finance companies can enjoy the following benefits:</p>\n<h3 id=\"omnichannel-customer-centric-solutions\" style=\"position:relative;\"><a href=\"#omnichannel-customer-centric-solutions\" aria-label=\"omnichannel customer centric solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Omnichannel customer-centric solutions</strong></h3>\n<p>To <a href=\"https://www.loginradius.com/customer-experience-solutions/\">enhance customer experience</a>, LoginRadius offers the ease to access across multiple devices, platforms, and applications. The identity platform also allows companies to configure login methods via a plethora of options like standard login, phone login, passwordless login.</p>\n<p>They can leverage <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on capabilities</a> to login to multiple domains using a single set of credentials. LoginRadius also supports federated SSO for third-party domains.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer insights data loginraidus\"\n        title=\"customer insights data loginraidus\"\n        src=\"/static/38f7bc171754ea42c73845f3ac9ba687/e5715/customer-insights-data-loginraidus.png\"\n        srcset=\"/static/38f7bc171754ea42c73845f3ac9ba687/a6d36/customer-insights-data-loginraidus.png 650w,\n/static/38f7bc171754ea42c73845f3ac9ba687/e5715/customer-insights-data-loginraidus.png 768w,\n/static/38f7bc171754ea42c73845f3ac9ba687/2bef9/customer-insights-data-loginraidus.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Furthermore, companies can improve security, usability, and user experiences with consumer identity data and new-age reporting tools. There is provision for data segmentation too.</p>\n<h3 id=\"secure-encrypted-data-storage\" style=\"position:relative;\"><a href=\"#secure-encrypted-data-storage\" aria-label=\"secure encrypted data storage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Secure, encrypted data storage</strong></h3>\n<p>Protecting the <a href=\"https://www.loginradius.com/security/\">confidentiality and integrity of customer data</a> is a crucial aspect of financial institutions. LoginRadius offers layered security by restricting and monitoring access to customers' data.</p>\n<p>The CIAM solution ensures that limited people have access to customer data, and they are the only ones who can view and manage them. This further cuts down the possibility of unintentional data leaks.</p>\n<p>Other security enhancement features include:</p>\n<ul>\n<li>Real-time fraud analytics to prevent fraudulent access attempts.</li>\n<li><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi factor authentication</a> and adaptive authentication to enhance security.</li>\n<li>Strict data management and scoped access control to reduce risk.</li>\n</ul>\n<h3 id=\"up-to-date-security-and-compliance\" style=\"position:relative;\"><a href=\"#up-to-date-security-and-compliance\" aria-label=\"up to date security and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Up-to-date security and compliance</strong></h3>\n<p>In the fight against high-profile data breaches, the identity management system supports <a href=\"https://www.loginradius.com/compliances-list/\">global regulatory compliances</a> that are critical to delivering frictionless customer experience. A few of the popular ones include:</p>\n<ul>\n<li>PCI DSS PCI SSC administered standard for payment transactions</li>\n<li>ISO 27001:2013 – Information security management system</li>\n<li>ISO 27017:2015 – Information security for cloud services</li>\n<li>US Privacy Shield Complaint resolution for EEA citizens</li>\n<li>ISO/IEC 27018:2019 – PII Protection</li>\n<li>AICPA SOC 2 (Type II) – System-level controls for Trust Services Criteria – security, availability, process integrity, confidentiality, and privacy </li>\n<li>ISAE 3000 – International attestation standard for assurance over non-financial information </li>\n<li>NIST Cybersecurity Framework – Standardized security framework to manage and reduce cybersecurity risk.</li>\n</ul>\n<p>One of the best examples of meeting international regulations comes from Juhll. This growth-driven digital marketing service acquired Banks.com to provide financial institutions with a trusted source for financial assistance. LoginRadius has helped Juhll to comply with new regulations in terms of where and how customer data is stored.</p>\n<p><a href=\"https://www.loginradius.com/resource/juhll-case-study\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Juhll case study download\"\n        title=\"Juhll case study download\"\n        src=\"/static/7f251a9bf26ed937455f5a19972806d2/e5715/CS-Juhll-Online-Marketing-and-Banks-1024x310.png\"\n        srcset=\"/static/7f251a9bf26ed937455f5a19972806d2/a6d36/CS-Juhll-Online-Marketing-and-Banks-1024x310.png 650w,\n/static/7f251a9bf26ed937455f5a19972806d2/e5715/CS-Juhll-Online-Marketing-and-Banks-1024x310.png 768w,\n/static/7f251a9bf26ed937455f5a19972806d2/2bef9/CS-Juhll-Online-Marketing-and-Banks-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Juhll Case Study</strong></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h2>\n<p>LoginRadius adheres to the best practices relating to authentication and access control. With features like multi-factor authentication and role-based data management, the identity management system reduces the risk of financial data theft. The end goal is to keep up with the changing trends and improve customer experience in the financial industry.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/BD-Plexicon1-1024x310.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/BD-Plexicon1-1024x310.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/BD-Plexicon1-1024x310.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/BD-Plexicon1-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 30, 2020","updated_date":null,"description":"A robust identity management system helps financial organizations remain compliant and conduct business in a secure environment.","title":"Why Financial Industry Needs an Identity Management System Now More Than Ever","tags":["compliance","authentication","identity management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.150537634408602,"src":"/static/813a87228a7504cc17431c5c85fb7e3f/33aa5/financial-industry.jpg","srcSet":"/static/813a87228a7504cc17431c5c85fb7e3f/f836f/financial-industry.jpg 200w,\n/static/813a87228a7504cc17431c5c85fb7e3f/2244e/financial-industry.jpg 400w,\n/static/813a87228a7504cc17431c5c85fb7e3f/33aa5/financial-industry.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":354,"currentPage":60,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}