{"componentChunkName":"component---src-templates-tag-js","path":"/tags/ciam-platform/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":7,"edges":[{"node":{"fields":{"slug":"/growth/lr-top-ciam-platform-cio-review/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In a significant recognition of its industry-leading customer centric solutions, LoginRadius has been awarded the Top Customer Identity and Access Management (CIAM) Platform of 2024 by CIOReview. </p>\n<p>This recognition highlights LoginRadius' commitment to revolutionizing the digital landscape with unparalleled scale, seamless implementation, and <a href=\"https://www.loginradius.com/scalability/\">top-tier system performance</a>.</p>\n<p>Let’s have a look at some of the highlights of the CEO's interview with the leading US business magazine, Rakesh Soni. </p>\n<h2 id=\"were-scaling-ciam-in-a-rapidly-growing-marketplace\" style=\"position:relative;\"><a href=\"#were-scaling-ciam-in-a-rapidly-growing-marketplace\" aria-label=\"were scaling ciam in a rapidly growing marketplace permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>We’re Scaling CIAM in a Rapidly Growing Marketplace</h2>\n<p>As the online marketplace experiences unprecedented growth, the challenge for brands to scale their CIAM without compromising performance has never been more critical. LoginRadius has risen to this challenge, empowering hundreds of brands to navigate these hurdles with ease.</p>\n<p>\"Our CIAM platform can successfully support large-scale projects spanning one hundred million users across 50 countries while maintaining an efficiency of thousands of logins per second,\" explains Rakesh Soni, founder and CEO of LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/resource/enterprise-scalability-and-performance\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-resiliency\"\n        title=\"WP-resiliency\"\n        src=\"/static/fb71c9018fb903928f9e92dff65dd300/e5715/WP-resiliency.png\"\n        srcset=\"/static/fb71c9018fb903928f9e92dff65dd300/a6d36/WP-resiliency.png 650w,\n/static/fb71c9018fb903928f9e92dff65dd300/e5715/WP-resiliency.png 768w,\n/static/fb71c9018fb903928f9e92dff65dd300/81501/WP-resiliency.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"our-rapid-implementation-and-user-centric-design\" style=\"position:relative;\"><a href=\"#our-rapid-implementation-and-user-centric-design\" aria-label=\"our rapid implementation and user centric design permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Our Rapid Implementation and User-Centric Design</h2>\n<p>Unlike traditional IAM solutions meant for internal use, CIAM demands a user-centric approach. LoginRadius' platform can be up and running within five weeks, a stark contrast to the lengthy deployment times of legacy vendors. This rapid implementation underscores the company's dedication to efficiency without disrupting client operations.</p>\n<p>Starting with an Identity Experience Workflow, LoginRadius assists clients in crafting a seamless login experience across various applications. Clients have the freedom to design based on their brand guidelines, aesthetic preferences, and linguistic requirements.</p>\n<p>Whether it's sign-up, email verification, <a href=\"https://www.loginradius.com/social-login/\">social media login</a>, or phone logins, LoginRadius provides comprehensive tools for an effortless end-user experience.</p>\n<h2 id=\"our-expert-implementation-and-compliance\" style=\"position:relative;\"><a href=\"#our-expert-implementation-and-compliance\" aria-label=\"our expert implementation and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Our Expert Implementation and Compliance</h2>\n<p>LoginRadius not just offers a CIAM platform; it offer a dedicated implementation team to assist clients during the design and implementation phases. This ensures a balance between customer experience and security, a critical aspect in today's digital landscape.</p>\n<p>The no-code CIAM platform relieves the backend pressure on engineering teams, offering infrastructure support from managing servers to ensuring continuous data center operations. Whether it's a multi-tenant or private cloud solution, LoginRadius monitors and maintains the infrastructure for its clients.</p>\n<p><a href=\"https://www.loginradius.com/press/cioreview-names-loginradius-as-the-top-customer-iam-platform-for-2024/\">You can read the official Press Release here</a>. </p>\n<h2 id=\"we-offer-unified-data-system-and-regulatory-compliance\" style=\"position:relative;\"><a href=\"#we-offer-unified-data-system-and-regulatory-compliance\" aria-label=\"we offer unified data system and regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>We Offer Unified Data System and Regulatory Compliance</h2>\n<p>For businesses with multiple touchpoints and brands, <a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On</a> (SSO) is essential. LoginRadius' unified data system allows consumers to access various web properties, mobile apps, and third-party systems with a single identity through its Federated Single Sign-On feature. </p>\n<p>This not only enhances user experience but also ensures compliance with regulations such as GDPR or CCPA.</p>\n<h2 id=\"we-practice-a-consultative-approach-to-partnership\" style=\"position:relative;\"><a href=\"#we-practice-a-consultative-approach-to-partnership\" aria-label=\"we practice a consultative approach to partnership permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>We Practice A Consultative Approach to Partnership</h2>\n<p>LoginRadius adopts a consultative methodology to build lasting partnerships. \"When customers reach out, our team begins by deep-diving into their needs, projects, and specific requirements before guiding them to their goal,\" says Rakesh Soni.</p>\n<p>He also shares the company’s vision for 2024 and beyond, where LoginRadius would focus on developing AI capabilities to enhance user experience, simplify implementation processes, and strengthen the security of sensitive data. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 18, 2024","updated_date":null,"title":"LoginRadius Recognized as the Top Customer IAM Platform of 2024 by CIOReview","tags":["ciam platform","coverage","cio review"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/6ba392a10af933e5417e4aa11eebfcd0/e3fce/cio-review-cover.jpg","srcSet":"/static/6ba392a10af933e5417e4aa11eebfcd0/f836f/cio-review-cover.jpg 200w,\n/static/6ba392a10af933e5417e4aa11eebfcd0/2244e/cio-review-cover.jpg 400w,\n/static/6ba392a10af933e5417e4aa11eebfcd0/e3fce/cio-review-cover.jpg 786w","sizes":"(max-width: 786px) 100vw, 786px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/growth/role-sso-in-digital-marketing/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Digital marketing is integral to a business's success in today's world. It can be used to drive growth and increase reach, but it can also help you target your customers more effectively and provide them with the products they want.</p>\n<p>As a result, enterprises have started collecting data on their customers to understand their preferences and behaviors better, leading to the development of more data-driven digital marketing strategies.</p>\n<p>But how do enterprises know the preferences of their potential customers, and how can they track their behavior? </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">Single sign-on (SSO)</a> is perhaps the backbone for laying the groundwork for collecting, storing, and analysis of valuable user insights! </p>\n<p>With SSO, enterprises can understand their target audience's needs, preferences, and behavior when they land on their platform for the first time. And this helps them in creating winning digital marketing campaigns to foster growth. </p>\n<p>Let’s figure out how SSO is reshaping the digital marketing landscape and why businesses must implement a robust SSO authentication mechanism in 2023. </p>\n<h2 id=\"what-is-single-sign-on-sso-and-how-is-it-reshaping-the-future-of-digital-marketing-in-2023--beyond\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on-sso-and-how-is-it-reshaping-the-future-of-digital-marketing-in-2023--beyond\" aria-label=\"what is single sign on sso and how is it reshaping the future of digital marketing in 2023  beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On (SSO), and How is it Reshaping the Future of Digital Marketing in 2023 &#x26; Beyond?</h2>\n<p>Single Sign-On (SSO) is an authentication method that allows users to log into multiple interconnected applications or services with a single login credential (username and password). </p>\n<p>Instead of having to remember different usernames and passwords for each application, SSO provides users with a streamlined and secure experience.</p>\n<p>The main goal of SSO is to improve the customer experience while enhancing security. With a centralized authentication system, digital marketing teams can more easily manage user access. This also reduces the risk of <a href=\"https://blog.loginradius.com/identity/common-vulnerabilities-password-based-login/\">password-related security breaches</a>, as users are less likely to reuse or write passwords down, making them more secure.</p>\n<p>Besides security and user experience, one of the most critical aspects of deploying an SSO authentication into your system is that it offers you many marketing benefits that can improve your conversion and customer retention rates. </p>\n<p>Let’s examine some marketing advantages of incorporating SSO into your online platforms/applications. </p>\n<h3 id=\"1-improves-customer-retention\" style=\"position:relative;\"><a href=\"#1-improves-customer-retention\" aria-label=\"1 improves customer retention permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Improves Customer Retention</h3>\n<p>Delivering a rich customer experience is the key to business success in today's era. And SSO removes barriers in the authentication within related applications.</p>\n<p>SSO (Single Sign-On) helps companies reduce the number of passwords customers need to remember when accessing their systems, which improves customer retention and satisfaction.</p>\n<p>In addition to improving <a href=\"https://blog.loginradius.com/growth/how-customer-retention-can-help-businesses-grow/\">customer retention</a>, SSO also reduces costs for companies by eliminating duplicate workflows and automating tasks that require human intervention.</p>\n<h3 id=\"2-it-helps-understand-user-behavior\" style=\"position:relative;\"><a href=\"#2-it-helps-understand-user-behavior\" aria-label=\"2 it helps understand user behavior permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. It helps Understand User Behavior</h3>\n<p>Businesses that choose a reliable customer identity and access management (CIAM) platform for SSO can quickly get valuable insights into user behavior. </p>\n<p>SSO allows businesses to track how users interact with their platform, as well as what preferences they have. This information can be used to understand better how users feel about the product or service, which helps companies make decisions about changes they may want to make in the future in their digital marketing strategy.</p>\n<p>Apart from this, it also tracks user behavior on different devices so that companies can see how customers are accessing their sites from other devices at different times of day or night—allowing them to better serve their customers' needs by knowing when they're likely to be logged in at any given time.</p>\n<h3 id=\"3-increased-leads--conversion-rates\" style=\"position:relative;\"><a href=\"#3-increased-leads--conversion-rates\" aria-label=\"3 increased leads  conversion rates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Increased Leads &#x26; Conversion Rates</h3>\n<p>The primary purpose of digitally marketing your business is to increase new leads and optimize conversion rate. SSO is a way to streamline the login process, so users only have to go through it once. This can help improve conversion rates because more users can access your site. </p>\n<p>When you're trying to get people in and out quickly, it's essential that they can easily navigate the site and find what they need without getting lost.</p>\n<p>Another thing SSO does is reduce barriers for users. By leveraging single sign-on (SSO), brands can bring users onto a single platform by allowing them to use their existing credentials from one location.</p>\n<p>That means one login, one set of credentials, and one consistent experience—and we all know how important consistency is when converting new users. </p>\n<p><a href=\"https://www.loginradius.com/resource/authentication-sso-native-mobile-apps-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-native-mob-app\"\n        title=\"DS-native-mob-app\"\n        src=\"/static/c32ba7fe038b8ca80e2be0a03db76571/e5715/DS-native-mob-app.png\"\n        srcset=\"/static/c32ba7fe038b8ca80e2be0a03db76571/a6d36/DS-native-mob-app.png 650w,\n/static/c32ba7fe038b8ca80e2be0a03db76571/e5715/DS-native-mob-app.png 768w,\n/static/c32ba7fe038b8ca80e2be0a03db76571/81501/DS-native-mob-app.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-helps-craft-personalized-experiences\" style=\"position:relative;\"><a href=\"#4-helps-craft-personalized-experiences\" aria-label=\"4 helps craft personalized experiences permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Helps Craft Personalized Experiences</h3>\n<p>A reliable CIAM is the backbone of personalized marketing and customer experience. The data collected from the CIAM platform can create a complete and relevant customer journey, ultimately leading to increased revenue and profitability.</p>\n<p>Every user interacts with huge brands, including Apple, Amazon, Google, and Microsoft. And they know what great personalized experience means. Hence, they expect a similar experience from other brands when they land on their platform. </p>\n<p>With a reliable <a href=\"https://www.loginradius.com/\">CIAM platform</a>, brands can implement SSO that captures insightful customer data that can be used to create personalized customer journeys, which boosts your overall marketing program.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>While SSO offers a convenient, secure, and efficient way for users to access multiple applications with a single login credential, it also paves the way for marketers to leverage user insights to create winning marketing campaigns. </p>\n<p>Brands that are thinking about accelerating their digital marketing efforts shouldn’t wait, and just put their best foot forward in implementing SSO into their website/mobile applications. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 10, 2023","updated_date":null,"title":"The Critical Role of SSO in Reshaping Digital Marketing Landscape","tags":["sso","ciam platform","customer retention"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/65cb55baad89b9c203ac281c88aa71bc/33aa5/sso.jpg","srcSet":"/static/65cb55baad89b9c203ac281c88aa71bc/f836f/sso.jpg 200w,\n/static/65cb55baad89b9c203ac281c88aa71bc/2244e/sso.jpg 400w,\n/static/65cb55baad89b9c203ac281c88aa71bc/33aa5/sso.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/loginradius-webhook-datasync-realtime/"},"html":"<p>LoginRadius, a leading CIAM platform, offers endless possibilities to diverse businesses and ensures business success through advanced access control and seamless login capabilities. </p>\n<p>Moreover, when it comes to deriving valuable insights from consumer data, LoginRadius helps enterprises integrate third-party analytics and data-driven applications that help create winning marketing and <a href=\"https://www.loginradius.com/blog/fuel/top-5-marketing-strategies-to-power-up-your-business/\">business-centric strategies</a>. </p>\n<p>Businesses can leverage the true potential of Webhook that allows them to build or set up integrations that subscribe to certain events on LoginRadius CIAM. </p>\n<p>Let’s understand how LoginRadius improves business performance through third-party integrations and helps sync your crucial business data in real-time through Webhook. </p>\n<h2 id=\"how-loginradius-webhook-works\" style=\"position:relative;\"><a href=\"#how-loginradius-webhook-works\" aria-label=\"how loginradius webhook works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Webhook Works</h2>\n<p>Webhooks allow you to build or set up integrations that subscribe to certain events on LoginRadius. When one of these events is triggered, LoginRadius automatically sends a POST payload over HTTPS to the Webhook's configured URL in real-time. You can use Webhooks to update an external tracker or update a backup mirror.</p>\n<p>LoginRadius can integrate with hundreds of third-party tools. We can easily connect customer data to your existing API-driven tools, delivering an incredible experience for your customers and saving you money.</p>\n<p>Enterprises can quickly set up third-party integrations like Webhook to ensure they receive consumer-behavior-related notifications in real-time. </p>\n<p>Once you <a href=\"https://www.loginradius.com/developers/\">configure the webhook</a> with an event, LoginRadius triggers that webhook every time for that event. For example, a webhook subscribed URL configured for a Login event will receive a POST request on your server with a payload. </p>\n<h2 id=\"webhook-security\" style=\"position:relative;\"><a href=\"#webhook-security\" aria-label=\"webhook security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Webhook Security</h2>\n<p>LoginRadius follows the best practices to <a href=\"https://www.loginradius.com/blog/identity/data-security-best-practices/\">ensure your endpoint security</a> and provides several ways to verify that triggered events are securely coming from LoginRadius. </p>\n<p>Enterprises shouldn’t worry about the overall security of consumer data since the best security practices are already in place in the LoginRadius CIAM solution. When it comes to security, LoginRadius commits to: </p>\n<ul>\n<li>Achieving the expectations of its customers and relevant regulatory authorities.</li>\n<li>Understanding customers’ needs to deliver high-standard services.</li>\n<li>Ensuring all of its employees follow the company’s best practices, processes, and procedures.</li>\n<li>Protecting customer data and LoginRadius’ information, intellectual property, people, and activities against loss, damage, disruption, or unauthorized disclosure.</li>\n<li>Implementing and <a href=\"https://www.loginradius.com/security-policy\">maintaining security policies</a> and procedures to meet the ISO 27001, ISO 27017, ISO 27018, NIST CSF requirements, and any other compliance that LoginRadius follows.</li>\n<li>Implementing an Information Security Management System and ensuring that it is continually improved and supported with the necessary resources required to achieve the commitments written in this policy statement.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/webhook-integration-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-webhook\"\n        title=\"DS-webhook\"\n        src=\"/static/0c3a730654d1576212cb8b18aa3b7bb8/e5715/DS-webhook.png\"\n        srcset=\"/static/0c3a730654d1576212cb8b18aa3b7bb8/a6d36/DS-webhook.png 650w,\n/static/0c3a730654d1576212cb8b18aa3b7bb8/e5715/DS-webhook.png 768w,\n/static/0c3a730654d1576212cb8b18aa3b7bb8/81501/DS-webhook.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits-of-webhook-loginradius-integration\" style=\"position:relative;\"><a href=\"#benefits-of-webhook-loginradius-integration\" aria-label=\"benefits of webhook loginradius integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Webhook LoginRadius Integration</h2>\n<p>Webhook LoginRadius integration allows enterprises to leverage the true potential of instant and real-time notifications. </p>\n<p>In a nutshell, the pre-requested consumer information is passed to the linked applications when an event happens. This removes the need for a manual poll for new data at predefined intervals. </p>\n<p>This helps enhance the overall efficiency of business processes running on data as their primary fuel. </p>\n<h2 id=\"where-to-use-webhook-loginradius-integration\" style=\"position:relative;\"><a href=\"#where-to-use-webhook-loginradius-integration\" aria-label=\"where to use webhook loginradius integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Where to Use Webhook LoginRadius Integration?</h2>\n<p>Depending on the various event and data needs, businesses can use webhooks to:</p>\n<ul>\n<li>Know that an event has occurred</li>\n<li>Ensure data is synced across multiple web apps</li>\n<li>Connect two or more apps where an event in one app triggers an event in another app and vice versa </li>\n<li>Customize apps and their functionality based on the needs</li>\n<li>Create tailored marketing campaigns</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>The modern digital era demands businesses to efficiently manage and leverage data to stay ahead of the curve. </p>\n<p>With LoginRadius integration, enterprises can seamlessly integrate multiple applications, including Webhook that can help collect and sync crucial data in real-time. </p>\n<p>LoginRadius can easily connect customer data to your existing API-driven tools, delivering an incredible experience for your customers and saving you money.</p>\n<p>If you wish to see the future of CIAM in action, <a href=\"https://www.loginradius.com/contact-sales\">reach us</a> for a personalized session. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABbElEQVQY0zVQO0/CUBQmaihthUbRhPhCAlhKEXlE3s+CCEaBwQF10riQODkwaFyMMcTFwR9gjBvRSeKko4NxcfD/fJ57C8PJbc53+r0soj8Lm5qHbS0HW6AIwZ+DXSvAESxBpJ3MMLph3+xWDlUwm2jCGa5A0isQtRIkhrH/CbdwwkDBHAJlGodexsy6wUkduknMBCfdmxCCBhZKHailfUxGm5jQKphaTUDwmaIWdigyF1oZsm7AFavBRspKuMpdTJMQO5yLbCHVPkG0cYRY4xAR9tbp3T5AsnUMT7YFqzdtOuQOSFmiyMupXUihKuzk0hWvc0xgUYlYod18tAZPrg13eg8rNIuJHSihMtVUHEUe51cLPJ5zo8oJJRJQRnHlQB6WpTjOru7w/fuH59d3PL0M8Th4w+fXDwbDD16R1ZsxCcelsyUbidQEEuC9ECap1J8nCaPTRe/2Ad3LvjkXfZxf3+O0d8P7FnwZ/AMzEsMp2f6LdQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book a free demo request 1024x310\"\n        title=\"Book a free demo request 1024x310\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 24, 2021","updated_date":null,"title":"How LoginRadius Webhook Allows You to Sync Your Data in Real-Time","tags":["webhook","data security","ciam platform","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/3824713943694920a678f3cf8229c230/14b42/webhook-cover.jpg","srcSet":"/static/3824713943694920a678f3cf8229c230/f836f/webhook-cover.jpg 200w,\n/static/3824713943694920a678f3cf8229c230/2244e/webhook-cover.jpg 400w,\n/static/3824713943694920a678f3cf8229c230/14b42/webhook-cover.jpg 800w,\n/static/3824713943694920a678f3cf8229c230/16310/webhook-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/handling-scalability-security-loginradius/"},"html":"<p>User experience backed by security is all that a business needs to focus on in today’s era when consumers are always on a hunt for better experiences without any threat to their identities and personal data.</p>\n<p>LoginRadius understands the importance of a secure and flawless experience for consumers, especially amid the global pandemic when everyone is online and the number of data breaches is substantially increasing.</p>\n<p>Since consumers and businesses have transitioned to online platforms amidst the global crisis, there’s a huge possibility that the number of logins and the creation of new accounts will surge.</p>\n<p>Without a highly scalable infrastructure to handle the increasing account creations and logins, peak loads can dramatically impede performance and can also hamper consumer experience.</p>\n<p>For this, you need to ensure you have a robust identity solution that grows at the same pace.  </p>\n<p>Here’s LoginRadius for you. A leading CIAM solution provider that empowers businesses to deliver a secure and delightful user experience to their clients through its comprehensive and scalable consumer identity and access management platform.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABc0lEQVQY002RO08CQRSFiYXArmEhgAIioAgsLBheLq9dVmRFBFGjhVHBmNhpgjY2Bmys/CVamWhjpDDRShs7Gwv/ynFmCAnFzZ2Ze+a798wYzGEFNLiIAl5UMSWWWeZJ5iIqRnUapsUiOKkKR34H9qUqzHEdJlGDKVQiMdQYhjAVzrgGh1iCsJiDJShjJlGBJ12DVVphFxiUZJ5AfKsHiOn74ORdGBM1cOFhneoY0EgWoUIT2lYHaqsNSWmB96chELBV0lid6tzZDXjlBjyZdbgydXizdbaflZsQSGOqM7Bxidib0iEWGogRWCCtQ1hYhoWEjU44ZtuZXIM318RcfhO+Qos1oc8zcsGA9MAWIe/jS7HJ7MS6NVqGZT4La6zM6gZ3Eue9O/z8/uHx5Q33T694eB7g/esbg49PCPEKJoPFMSCB8AToiCpwJXVMl4/h37tmlmnniYCM3PYJzgi0fdHHYbeHo24fp1e36FzesM+klv8BIh7Cv8YBwbcAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"modern-ciam\"\n        title=\"modern-ciam\"\n        src=\"/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/modern-ciam.png\"\n        srcset=\"/static/04bf5e11f74fd31f8819d64573a1e02c/a6d36/modern-ciam.png 650w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/modern-ciam.png 768w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/63ff0/modern-ciam.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s understand how LoginRadius handles scalability with the ability to cater to 5-10x more users with the highest level of security.</p>\n<p><strong>A Robust Cloud Infrastructure</strong></p>\n<p>With 100% uptime and 35 data centers across the globe,<a href=\"https://www.loginradius.com/blog/engineering/effective-cloud-management-platform/\"> LoginRadius’ cloud-based platform</a> can scale to 100s of millions of users in a couple of seconds.</p>\n<p>This is perhaps the reason why global leaders including Fortune 500 companies and startups with hundreds of millions of users rely on us.</p>\n<p><strong>Auto-scalable Infrastructure</strong></p>\n<p>No business can give precise predictions regarding the upsurge in their number of daily signups or subscriptions in today’s era when the internet has become the second home for most of us.</p>\n<p>Thus, businesses need to understand the importance of a robust and scalable CIAM solution that can handle a sudden rush in the number of logins or sign-ups without hampering the user experience.</p>\n<p>With LoginRadius, you can be sure enough to deliver the best user experience to your existing clients and potential subscribers as our cloud infrastructure automatically scales to accommodate swiftly changing loads of data storage, account creation, consumer authentication, new application deployment, and more.</p>\n<p><strong>Organizational Level Licensing</strong></p>\n<p>With LoginRadius’ advanced CIAM solution, enterprises can leverage a single corporate license that ensures the platform can flawlessly scale across your organization’s web and mobile applications, offering availability through subsidiaries and geographic locations.</p>\n<p>The innovative solution crafted to deliver a seamless experience across your organization’s web and mobile application helps in delivering a rich user experience to your consumers every time they use their website/ application to log in or sign-up.</p>\n<p><strong>Platform Security</strong></p>\n<p>LoginRadius offers endless solutions that enhance the overall security of your platform. Whether it’s account verification workflow or validating the provided identity, everything is backed by a highly secure infrastructure.</p>\n<p>Apart from this, businesses must ensure that their clients’ data is efficiently and securely handled, especially when a huge number of identities get stolen daily.</p>\n<p>To safeguard your clients’ identities and personal details, LoginRadius ensures you get compliance with all the necessary data privacy and security regulations including EU’s GDPR and CCPA.</p>\n<p>Data security and privacy are ensured through a built-in web application firewall along with cryptographic hashing algorithms that further reinforce clients’ data security.</p>\n<p>Moreover, with industry-standard authentication methods and security features including <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a>, risk-based authentication (RBA), and geo-fencing LoginRadius has woven a trust over clients.  </p>\n<p><strong>Innovative Technology Infrastructure</strong></p>\n<p>Businesses can rely on the cutting-edge technology offered by LoginRadius that helps every enterprise regardless of the industry and domain to deliver rich consumer experiences backed by the highest level of data and privacy security. Here’s what LoginRadius’ innovative CIAM offers:</p>\n<ul>\n<li><strong>Scalable Users:</strong> LoginRadius’ smart infrastructure auto-scales to accommodate your increasing client base. We ensure there’s no cap on the number of users or subscribers so that there’s no limitation to your business growth.</li>\n<li><strong>Scalable Applications:</strong> LoginRadius’ identity platform scales automatically to handle multiple applications. Hundreds of applications can be handled whether they’re web, smart TV, mobile, gaming console, and so on.</li>\n<li><strong>Scalable Storage:</strong> Data storage is perhaps the biggest challenge among businesses seeking online growth. With LoginRadius’ CIAM, you can seamlessly handle incremental data storage from registered consumers since the LoginRadius Cloud Directory scales automatically and that too in real-time, every time.</li>\n<li><strong>Scalable Peak Load:</strong> Since large client bases necessitate frequent and substantial peak loads of login and account creation activity, LoginRadius’ infrastructure swiftly scales to meet the ever-increasing demands.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>A robust consumer IAM solution is the need of the hour for businesses delivering online services and catering to a huge client base.</p>\n<p>The solution must ensure adequate security for both the clients and enterprise data to avoid any chance of security threat without hampering the overall user experience.</p>\n<p>LoginRadius is the leading CIAM solution provider that not only empowers businesses to deliver a rich user experience but eventually offers a robust and highly secure infrastructure that ensures the utmost level of <a href=\"https://www.loginradius.com/blog/identity/2021/03/privacy-compliance/\">data and privacy security</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 30, 2021","updated_date":null,"title":"Handling Scalability and Enhancing Security with LoginRadius","tags":["data security","ciam platform","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/7313f8e38afd2c9efe419124dac7491d/14b42/handling-scalability-security-loginradius-cover.jpg","srcSet":"/static/7313f8e38afd2c9efe419124dac7491d/f836f/handling-scalability-security-loginradius-cover.jpg 200w,\n/static/7313f8e38afd2c9efe419124dac7491d/2244e/handling-scalability-security-loginradius-cover.jpg 400w,\n/static/7313f8e38afd2c9efe419124dac7491d/14b42/handling-scalability-security-loginradius-cover.jpg 800w,\n/static/7313f8e38afd2c9efe419124dac7491d/16310/handling-scalability-security-loginradius-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/progressive-profiling/"},"html":"<p>We live in an age driven by information, where consumers expect you to provide value-filled personalized offers. </p>\n<p>To generate such offers, you need a comprehensive understanding of various factors such as geographic, demographic, psychographic, behavioral, and past purchasing patterns of your clientele. </p>\n<p>A collection of such data points helps build unique consumer personas that allow brainstorming effective selling strategies. </p>\n<p>But the main problem is that consumers hesitate to share personal information on websites. </p>\n<p>Progressive profiling can help in this regard. It is a systematic way of collecting critical information through smart forms that ask questions intended to guide prospective consumers across the sales funnel. </p>\n<p>This article will detail what progressive profiling is, how it works and shed light on the various benefits you will receive after implementing it. </p>\n<h2 id=\"what-is-progressive-profiling\" style=\"position:relative;\"><a href=\"#what-is-progressive-profiling\" aria-label=\"what is progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Progressive Profiling</h2>\n<p>Progressive profiling is the method of collecting personal information about the client in a step-by-step manner. It helps the digital marketing team to streamline the lead nurturing process by gathering increasingly specific client data. </p>\n<p>The best thing about progressive profiling is that the same question won't repeat twice. For example, if the lead has already provided their email address, name, and phone number, they won't be asked for it again. Instead, when the lead arrives on the landing page for the second time, they will be asked different questions like their company name, home address, and much more.</p>\n<p>In this way, digital marketing teams obtain several data points about a lead without annoying or overwhelming them with long forms in the first interaction itself. </p>\n<h2 id=\"how-does-progressive-profiling-work\" style=\"position:relative;\"><a href=\"#how-does-progressive-profiling-work\" aria-label=\"how does progressive profiling work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Progressive Profiling Work</h2>\n<p>Progressive profiling is implemented using marketing automation tools that offer smart form fields. This smart form is linked with the consumer's cookie that helps provide information about their previous behavior. </p>\n<p>Each consumer who lands on the website landing page is assigned a cookie. The cookie tracks all the consumer's activity on the landing page and monitors the questions they have already answered. </p>\n<p>For example, if the consumer has already provided their name, an unanswered question will replace this field, say residential address, the next time they visit the landing page. </p>\n<p>Different marketing automation tools use varying ways of setting up progressive profiling. But all of them have the following three things in common:</p>\n<ul>\n<li>Defining a list of questions that helps with lead generation. </li>\n<li>Adding them strategically to the progressive profiling queue</li>\n<li>Establishing a particular order in which those questions should appear on the consumer's screen.</li>\n</ul>\n<p>The following example will explain this better. A company's marketing team prepares a list of questions they want to ask, such as:</p>\n<ul>\n<li>Email address</li>\n<li>First name</li>\n<li>Last name</li>\n<li>Company name</li>\n<li>Permanent address</li>\n<li>Job position</li>\n</ul>\n<p>Then they add these questions to the marketing automation tool. After that, they decide what questions will be asked on the consumer's first visit and what can be left for the second one. Consequently, the marketing automation tool attaches cookies to each site visitor, ensuring a coherent flow of questions. </p>\n<h2 id=\"what-are-the-benefits-of-progressive-profiling\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-progressive-profiling\" aria-label=\"what are the benefits of progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Benefits of Progressive Profiling</h2>\n<p>The three most significant benefits of progressive profiling are:</p>\n<ul>\n<li>Shorter forms that the visitor can fill within a few seconds.</li>\n<li>Smart forms ask only unanswered questions that save time and effort otherwise spent on creating multiple forms.</li>\n<li>Smart forms collect critical consumer information that reveals hidden insights.</li>\n</ul>\n<p>There are other advantages of progressive profiling as well. The following points explain them in detail:</p>\n<p><strong>1. Qualifying leads</strong></p>\n<p>Progressive profiling allows marketers to collect critical information about their clientele and build unique consumer personas. It helps determine where a particular consumer is in the buying journey and decide the best course of action to move them towards the final purchasing stage.</p>\n<p><strong>2. Fine-tune buyer personas</strong></p>\n<p>Your marketing team will be able to craft effective marketing strategies that connect with the consumer. They will <a href=\"https://www.loginradius.com/blog/growth/b2b-lead-generation-for-2021/\">streamline the lead nurturing process</a> based on the actual data points such as company size, job role, industry, location, etc., instead of making educated guesses. </p>\n<p><strong>3. Accelerates the buying journey</strong></p>\n<p>Lead profiling provides hidden insights about consumers that help to personalize marketing efforts and build trust. You will be able to craft messages that motivate consumers to move ahead in the sales funnel. </p>\n<p><strong>4. Increase conversion rate</strong></p>\n<p>By developing unique consumer personas, you will significantly increase your chance of finalizing the deal. But thorough signup forms can scare away the consumer. Also,  your conversion rate will substantially increase with a decrease in the number of fields in the smart form.</p>\n<p><strong>5. Optimize sales time</strong></p>\n<p>The marketing team can significantly decrease sales time by asking more relevant questions to their consumers as they move forward in their buying journey. Progressive profiling allows sending qualified leads to the sales team that ultimately impacts the company's bottom line. </p>\n<h2 id=\"create-consumer-profiles-using-the-loginradius-ciam-platform\" style=\"position:relative;\"><a href=\"#create-consumer-profiles-using-the-loginradius-ciam-platform\" aria-label=\"create consumer profiles using the loginradius ciam platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create Consumer Profiles Using The LoginRadius' CIAM platform</h2>\n<p>LoginRadius' CIAM platform provides an automated way of collecting consumer-specific data gradually, without annoying or overwhelming them. It will help you <a href=\"https://www.loginradius.com/progressive-profiling/\">build rich consumer profiles</a> and earn the consumer's trust. The following list explains the features in detail:</p>\n<p><strong>1. Work seamlessly with registration services</strong></p>\n<p>The progressive profiling feature of LoginRadius is integrated with the registration service, allowing you to make detailed consumer profiles, regardless of whether your consumers log in using social login, standard login, or phone registration.</p>\n<p><strong>2. Create native profile-building workflows</strong> </p>\n<p>You can select the most critical information you expect to receive from consumers across the buying journey. LoginRadius' progressive profiling allows you to design custom workflows that enable consumers to interact with your brand across various touchpoints. In short, you can set your own rules and <a href=\"https://www.loginradius.com/blog/identity/2019/10/digital-identity-management/\">win the consumer's trust</a> conveniently. </p>\n<p><strong>3. Link social accounts</strong></p>\n<p>Build rich consumer personas by tracing the client's digital footprints. You can link multiple social profiles of a particular consumer to significantly increase your understanding and create better offers. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Progressive profiling allows companies to collect critical consumer information by asking a new question every time they visit the website. It helps create rich and unique consumer personas by building on the information that has already been collected in the past. </p>\n<p>As we saw, there are numerous ways of collecting data, including questionnaires, social media profiles, and tracking the consumer's digital footprints. Progressive profiling is emerging as an effective way of cementing the trust gap between the company and its consumers and <a href=\"https://www.loginradius.com/blog/fuel/2021/02/customer-relationship-business/\">forming robust and evergreen client relationships</a>. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 08, 2021","updated_date":null,"title":"What is Progressive Profiling and How it Works?","tags":["progressive profiling","ciam platform","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5d998ecd7ff03730815b3f206c37faa0/14b42/progressive-profiling-cover.jpg","srcSet":"/static/5d998ecd7ff03730815b3f206c37faa0/f836f/progressive-profiling-cover.jpg 200w,\n/static/5d998ecd7ff03730815b3f206c37faa0/2244e/progressive-profiling-cover.jpg 400w,\n/static/5d998ecd7ff03730815b3f206c37faa0/14b42/progressive-profiling-cover.jpg 800w,\n/static/5d998ecd7ff03730815b3f206c37faa0/16310/progressive-profiling-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shachindra Saxena","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/perfect-ciam-platform/"},"html":"<p>If you aren’t already taking advantage of CIAM (customer identity and access management), you should be. But what components do you need to include if you want to implement the perfect CIAM platform? One that meets all of your organization’s needs, both now and in the future?</p>\n<p>The CIAM revolution has taken over the access management landscape in just five years. Winning customer trust by safeguarding their data is becoming a competitive advantage.</p>\n<p><a href=\"https://www2.deloitte.com/content/dam/insights/us/articles/consumer-data-privacy-strategies/DUP_970-Building-consumer-trust_MASTER.pdf\">Research from Deloitte</a> shows that 70% of consumers are more likely to purchase from consumer product companies that they believe protect their personal information.</p>\n<p>Customer identity management goes beyond simply repurposing employee IAM for customers—CIAM’s scalability, scope, and customer focus enable you to go far beyond simple privacy management and access verification. In fact, it forms a <a href=\"https://www.kuppingercole.com/blog/tolbert/ciam-as-a-key-factor-in-the-digital-transformation\">key component</a> of effective digital transformation.</p>\n<p>To succeed in today’s environment, <a href=\"https://www.loginradius.com/blog/2018/03/top-5-business-objectives-that-ciam-solves/\">businesses should consider</a> an all-in-one CIAM platform that manages people, systems, and devices used throughout their organization. Customers, vendors, partners, and more should all be included in a comprehensive framework if you want to enable true digital transformation.</p>\n<p>There are a number of key features that are essential if you want to implement a robust customer identity and access management framework.</p>\n<h3 id=\"1-advanced-frictionless-security\" style=\"position:relative;\"><a href=\"#1-advanced-frictionless-security\" aria-label=\"1 advanced frictionless security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Advanced Frictionless Security</h3>\n<p>The initial seed behind CIAM will always be the need to securely manage access, with many of its advanced functions evolving from this essential starting point. Going beyond old-fashioned access methods, a modern customer identity management solution should enable frictionless security. By enabling seamless authentication between people, systems, and things, CIAM can enable low-friction access for all, while still remaining secure.</p>\n<p>Frictionless security means easy-to-use security. Your customers are presented with a beautifully integrated access solution that works so well they barely notice it.</p>\n<h3 id=\"2-strong-privacy-management\" style=\"position:relative;\"><a href=\"#2-strong-privacy-management\" aria-label=\"2 strong privacy management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Strong Privacy Management</h3>\n<p><a href=\"https://en.wikipedia.org/wiki/Information_privacy_law\">Compliance with local data protection laws</a> can be a chore, especially given their constant evolution. A good customer identity platform should enable you to keep up with local laws anywhere in the world that you do business.</p>\n<p>With country-specific or regional control over how personal data is stored and managed, you’ll always meet legal requirements, saving you compliance management costs each year.</p>\n<p>These aren’t the only potential costs you can save—legal fees can run high when privacy management fails. Presenting customers with easily self-managed privacy choices and a solid privacy policy also shows them that their data is safe and shows your company to be competent and professional in handling these issues.</p>\n<p>This reputation will encourage customer loyalty in the long run.</p>\n<h3 id=\"3-integration-with-apis\" style=\"position:relative;\"><a href=\"#3-integration-with-apis\" aria-label=\"3 integration with apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Integration with APIs</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIAM Platform\"\n        title=\"CIAM Platform\"\n        src=\"/static/e321b9bb7532e7e7606122e5c1a73584/e5715/integration-graphic.png\"\n        srcset=\"/static/e321b9bb7532e7e7606122e5c1a73584/a6d36/integration-graphic.png 650w,\n/static/e321b9bb7532e7e7606122e5c1a73584/e5715/integration-graphic.png 768w,\n/static/e321b9bb7532e7e7606122e5c1a73584/21b4d/integration-graphic.png 1280w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A perfect CIAM platform needs to be able to integrate more than just people. There are lots of identity-filled business processes and practices, and in the future the number of these is only set to grow.</p>\n<p>A well-designed customer identity solution connects all native and third-party applications that handle customer data.</p>\n<p>APIs let you quickly integrate systems that need to work together across providers, so the APIs available from your CIAM provider need to work with every system that can benefit from <a href=\"https://www.loginradius.com/integrations/\">CIAM integration</a>.</p>\n<p>To make the most of your customer identity and access management solution, it needs to integrate seamlessly with your CRM, business intelligence, analytics, content management, and marketing automation systems. You also need to know that your vendor has the capacity to create effective APIs to let you take advantage of new technology as it comes online.</p>\n<h3 id=\"4-data-access-control-and-aggregation-process\" style=\"position:relative;\"><a href=\"#4-data-access-control-and-aggregation-process\" aria-label=\"4 data access control and aggregation process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Data Access Control and Aggregation Process</h3>\n<p><a href=\"https://www.loginradius.com/blog/2018/10/digital-transformation-safeguarding-customer-experience/\">Customer data needs to be securely protected</a> at all times, yet at the same time be available to those who should be able to use it. A good CIAM solution will let you develop schemas flexibly so you can get the most out of your systems</p>\n<p>Without effective data access control, data governance is useless. You need to know these essentials:</p>\n<ul>\n<li>Where did the data come from?</li>\n<li>Where should it be synchronized?</li>\n<li>Who should have the right and opportunity to access and/or change it?</li>\n</ul>\n<p>All of these things need to be manageable across future system updates without fail. At the same time, there should be no need to mess around with schemas that work well.</p>\n<h3 id=\"5-security-compliance\" style=\"position:relative;\"><a href=\"#5-security-compliance\" aria-label=\"5 security compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Security Compliance</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIAM Platform\"\n        title=\"CIAM Platform\"\n        src=\"/static/06ca9f520a914d46baf6eca2ecd75ddd/e5715/global-compliance-graphic.png\"\n        srcset=\"/static/06ca9f520a914d46baf6eca2ecd75ddd/a6d36/global-compliance-graphic.png 650w,\n/static/06ca9f520a914d46baf6eca2ecd75ddd/e5715/global-compliance-graphic.png 768w,\n/static/06ca9f520a914d46baf6eca2ecd75ddd/21b4d/global-compliance-graphic.png 1280w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Your CIAM platform must <a href=\"https://secureprivacy.ai/complete-guide-to-international-data-privacy-laws/\">meet compliance requirements on a global scale</a>, even though many of these requirements are constantly changing and evolving. Currently, here’s what your CIAM platform needs to do:</p>\n<ul>\n<li>Offer redundancy practices for protecting data in transit and at rest.</li>\n<li>Store and manage access to customer data.</li>\n<li>Implement multi-factor and enhanced authorization.</li>\n<li>Be regularly certified by third-party security standards like SOC 2, HIPAA, and ISO.</li>\n<li>Be able to meet industry and location-specific needs wherever you do businesses.</li>\n</ul>\n<p>Make sure you aren’t wasting time and money on security compliance—use an up-to-date cloud CIAM system.</p>\n<h3 id=\"6-customer-analytics\" style=\"position:relative;\"><a href=\"#6-customer-analytics\" aria-label=\"6 customer analytics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Customer Analytics</h3>\n<p>One of the best things about an advanced CIAM solution is the ability to tie in <a href=\"https://www.loginradius.com/customer-insights/\">customer analytics</a>, giving you a much deeper and clearer understanding of each customer. Here’s what this data can be used for:</p>\n<ul>\n<li>Monitor and improve customer experience.</li>\n<li>Feed data back to product development teams.</li>\n<li>Hone sales and marketing functions.</li>\n<li>Deliver targeted content effectively.</li>\n</ul>\n<p>CIAM can be used to both extract and store many different data points, feeding them back to your other systems for use.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-case-for-buying-over-building/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buy-vs-build\"\n        title=\"buy-vs-build\"\n        src=\"/static/a1eb981f4ba5aed53fe72afe342872f7/e5715/buy-vs-build.png\"\n        srcset=\"/static/a1eb981f4ba5aed53fe72afe342872f7/a6d36/buy-vs-build.png 650w,\n/static/a1eb981f4ba5aed53fe72afe342872f7/e5715/buy-vs-build.png 768w,\n/static/a1eb981f4ba5aed53fe72afe342872f7/63ff0/buy-vs-build.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"7-scalability-during-high-demand\" style=\"position:relative;\"><a href=\"#7-scalability-during-high-demand\" aria-label=\"7 scalability during high demand permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Scalability During High Demand</h3>\n<p>Your CIAM solution must be not only scalable, but rapidly so, making it possible to meet unexpected demand without faltering. You shouldn’t ever need to worry that a promotion or event could affect the smooth operation of your account features.</p>\n<h3 id=\"8-better-customer-experience\" style=\"position:relative;\"><a href=\"#8-better-customer-experience\" aria-label=\"8 better customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Better Customer Experience</h3>\n<p>All told, your CIAM platform needs to boost customer experience in every possible way. A reduced initial entry threshold that <a href=\"https://www.loginradius.com/blog/identity/reconsidering-social-login-security-privacy-angle/\">leverages social login</a> or passwordless login is just the start.</p>\n<p>Advanced analytics, effective self-service options, and integration with all of your customer-facing functions should all work to improve the way customers access your systems. And storing everything about one customer in the same place—data, analytics, preferences, and browsing/purchase history—will make it much easier for employees to manage customer accounts.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>The main thing to remember is that customer IAM is all about customer experience and customer trust. More than just an identity platform, and more than just an access management solution, LoginRadius offers a way to go beyond customer expectations.</p>\n<p>Today that means you need to offer self-service data management and make use of the additional customer data that CIAM platform can give you. Only then can you improve what you offer customers at virtually every point in their journey.</p>\n<p><a href=\"https://www.loginradius.com/book-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIAM Platform\"\n        title=\"CIAM Platform\"\n        src=\"/static/972149f11a42cafbe490512ce1a71dc0/e5715/CTA-Graphics-for-Blogs-13.png\"\n        srcset=\"/static/972149f11a42cafbe490512ce1a71dc0/a6d36/CTA-Graphics-for-Blogs-13.png 650w,\n/static/972149f11a42cafbe490512ce1a71dc0/e5715/CTA-Graphics-for-Blogs-13.png 768w,\n/static/972149f11a42cafbe490512ce1a71dc0/63ff0/CTA-Graphics-for-Blogs-13.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 10, 2019","updated_date":null,"title":"8 Key Components of a Perfect CIAM Platform","tags":["ciam platform","compliance","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/59b043bbfdccfbcbb3f1ae1e7586a72d/0756a/fetaure-image-1.png","srcSet":"/static/59b043bbfdccfbcbb3f1ae1e7586a72d/69585/fetaure-image-1.png 200w,\n/static/59b043bbfdccfbcbb3f1ae1e7586a72d/497c6/fetaure-image-1.png 400w,\n/static/59b043bbfdccfbcbb3f1ae1e7586a72d/0756a/fetaure-image-1.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/customer-identity-preference-trends-q1-2016/"},"html":"<p>In an expansive <a href=\"https://hbr.org/2013/09/the-truth-about-customer-experience\">article for Harvard Business Review</a>, McKinsey and Company analysts have described Customer Experience as “cumulative experiences across multiple touch points and in multiple channels over time.” But if somebody asks for a mathematical definition of something as psychological as Customer Experience, one could blurt out: “Customer Experience is the integral from the beginning to the end of the customer-business relationship of the integral of individual user experiences across all touch points.” Why someone would ask for a mathematical definition is a discussion for another day.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 250px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 129.2%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAaCAYAAAC3g3x9AAAACXBIWXMAAC4jAAAuIwF4pT92AAAGxUlEQVRIxzVVWVRVRxZ9H/3Rq5cf3UEUfDKKEKK9cBHsGNOJMRqnJ8ggSpzSDihRG+04ABJkUiYhgjIFbDsqKkhHWElwAAEV6PAMoMzIjAyPSRmUC75I7d71ktRaZ9W9dW/tc2qfXeeo5m4I18/bGAnbTVFC7RwKm40R+PCLZJjy2YLrNltiYbP9ayz6/Cz2J+XD/rMYzHU7BbVLGEw0wTBzP405zqHCdH0ITNeHKiq1Jljv7H8Fwde1wmn3eZi7hGLB5ihYbYrG/K1xnKNgt/M83tuXjH1n8+C4KwH2e5JgvTkac13DYbk5RjoXZnTCd0W1wCtG/4lvOk4SUM1F43XBmE8AE+cwvLXyBExdT2Plufuw9U7Fgi1nMIuRzXCPxJ/5n9GngVj0j3i87RUt1ATnaRWVk0+yfs3R/8Ar/L9iye5z+Ov2OCz9ZxrsGeWHRy8ZzHFvMpy8E3EwuQAfHEjFvB3xWEgg07VB2BqRA01AhrD5PB72O88pqqf9L0VT7yhadONCNzqF2vYh1LYNomd4As26MTT2jaGuaxgdAy9Rx291HUOGuWvwJY6m3DGcwJr8W5IaS88oRTX8So+XeoiWvlHsDs/ER3sS8JH3ORz+OtcAOjYloAcQn1UKly8vQDc6iefKG/zCtcC0u5ix3B8OPqnC2itGJlFRDb3Si2fc+O62WKE5lIZ7Fe24Xd6M93eexar9yRidnIbvmZtQr/4K1kxYKx33j7+WQSDsaglmM8L3j10hIPnVhCgq/o9vcsphTgn0vZjEFD1L7/Wdw5hF0nMe1CPvf0+RVVANB69otJGGQaJN8KfQjBKYesbAeO1JYbctDiu/vKioJEBgyi0s3RWP8alpPHs+gd6RSQyMTcGOGjt/owxy5D9qhR1VICMc+A0w7FopbH3SYeJ2WthtjYXm+CVFNfEGuFFYA+MVAagh2b+Pwsp2vEV+CkmBHGW13Vi4KRJDBJMcyn1+ybfwp2XHYbImSDAhsPCKUVTS23O68wq4hHc8IxB9uRjh/y6ArfspHIn/HtyLR419CEq6hZmfBOBCjhbNvSN4TSf+Kbeh9ow2ZNn6szNQSx0OkOBhAg6O6xGfWQKPYxexPSgDZuRUAks+r91+DO+QTPwrNheHo2+ioklnWA9IvQObXYmw8IgQ1qTHwvVXQNFPvki0eP1bQuQoqurACp9EFJA7OQRNykf+Y+CQkfsn52HGx34wWXdSLPO9gL8fTFdUkg8dxZZf0oSi8hbcJ2faum48fNSGEoI+IJfamm4UE7iT4pZg/TzNJAGjcivh4JcFc/cIMZ86NJdH7h6aEK28KQ8r20U5iS993Imf63tR2TKIQjrIL2smaAdKaX28Sb0vFHToxjFCmgIvFkHtFQdLHtmKxcLAocY37Ze1B1PhFnRdOPtfhnd0Dtz9LmMj7+i6w+lYdSAFzse/hRS964nLcAm4QsvAir2JcNyZAKNVJySQeGd3ImatCVJUP5Y2vbmjbUHuw0aRmV+NnKI6ZHPOYiKyC2uRW1yPq3mVyKDdKKpFdkkjrhfXIa+0CdtOXpWihuWGMGHDCM09IhRVe9+oaOt9gfo2nXjS3IeG9gHUtuhQQ2to76ek9HzvQ1VjN5q7hlDztBd1rTqMjE/iBLM8n0VBc+RbsXgPS956Xr3vSxqnb9EbsylulzXhHsmXoi78uc1gBYz+7k/Nhptyl5zK798xwh1hmVi0Iw6LWZRDMsrFx4cuYOZqHrmioXtaW9MJzuKn6g4m5BnKOVc19qCaET9u6jEk4BX1NMaLL6VT3/UcputCYEHtvcs6ucQ7SbzNI89xCVNUZdVd02W1z/DwcYcorenCA0qlmBEajM8/aluRdb8e3z1oQHbpU+QyypSbWvaWWENbsJQ9xf20sPq9fBVXtE0XsFyVPOkUEvjeoxZoG3rQ0D2CHhaJhB+q8IflgfjjMj/M9oiE8YZTMFobDMcjV6T+oHYOASVj6CkzPw1UVC09o9MVTX0oreoQFfU9kPakWYeuoQmMvnqDeNa893xSsDk8G/OYANnd/sbyb8uIzDwiYLvjrOHq8bbITqioluxN1H9wKB2+CXnCjXqzY0Vx3JOIxfuSsNQnGQ7cEPNDDa5W6rCMvWYOI7GV3dAz0tBOzVll2O2ENdeMV3+lqOx90vXGLuGw2h4vrLbEYaFbOJZ7J8CaXYzcYLYmBBq22QNsUE6Uhjl7tewfsmcb8/tfXE/BxCVMLPwi7dekOB27ppdejDzPCDNeo5XsKa4Hk+DASC240YzAs3lM41WBWLL/G0Njl8eTRzeizSSnjFTM4TO/Kf8Hq+GS9o6LLdQAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Q1 2016 featured\"\n        title=\"Q1 2016 featured\"\n        src=\"/static/5fc5c5ffde6b586e913dd01591c4796e/63868/Q1_2016_featured.png\"\n        srcset=\"/static/5fc5c5ffde6b586e913dd01591c4796e/63868/Q1_2016_featured.png 250w\"\n        sizes=\"(max-width: 250px) 100vw, 250px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>You can choose the definition you like (we bet you will go with the McKinsey guys) but the point here is about what customers want and what satisfies them. Often the seemingly simpler things matter the most, particularly when these things figure quite a number of times. For instance, let’s say you provide the means for your customers to sign in using their social identities. Owing to obvious constraints, you can only provide for direct links to login with two or three social identities. If your customers choice of identity doesn’t figure in your top two or three list, they are forced to go to another page to look for their choice of identity. It’s a simple thing made difficult because of the lack of knowledge of what your customers preferences are.</p>\n<p>To know what your customers like and prefer only makes things simpler and clearer. Customer preferences don’t just alter minor things but can also influence long term strategy. Analysis of customer preferences is critical to businesses.</p>\n<p>But don’t worry. We got you covered.</p>\n<p>The LoginRadius Analytics team analyzed customer behavior data from over 160,000 websites, powered by our <a href=\"https://www.loginradius.com/\">Customer Identity Management (CIM) platform</a>, and compiled analysis about what customers preferences are and how those preferences vary with specific demographic characteristics. Our Customer Identity Preference Trends Report for Q1 2016 is now available for download <a href=\"https://www.loginradius.com/resource/customer-identity-preference-trends-2016/\">here</a>. And while you download the report, we will give you a sneak peek into what customers generally want.</p>\n<p>Once again, Facebook held its forte and emerged as the most preferred social identity for logging into websites. Google+ followed in second place but with a much smaller share in the social identity space. About 94% customers use their Facebook or Google+ identities to sign into websites which is mammoth number telling you these two networks should be the top on your list.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"2016-Q1-Social-Login_Preference-Users\"\n        title=\"2016-Q1-Social-Login_Preference-Users\"\n        src=\"/static/0fe71d3e801eaf5933ab70b04217118e/e5715/2016-Q1-Social-Login_Preference-Users.png\"\n        srcset=\"/static/0fe71d3e801eaf5933ab70b04217118e/a6d36/2016-Q1-Social-Login_Preference-Users.png 650w,\n/static/0fe71d3e801eaf5933ab70b04217118e/e5715/2016-Q1-Social-Login_Preference-Users.png 768w,\n/static/0fe71d3e801eaf5933ab70b04217118e/7510d/2016-Q1-Social-Login_Preference-Users.png 2119w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>But if your target audience is above 35 years, you will have to think again because only a third of all the customers who used their <a href=\"https://www.loginradius.com/social-login/\">social identity to sign into websites</a> were aged above 35 years. If that is not all, Social Login from desktop computers (both Windows and Mac) ran up to a mammoth 80% of all which should tell you that if you are targeting mobile, it should be the mobile app.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.99999999999999%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAPCAYAAADkmO9VAAAACXBIWXMAAC4jAAAuIwF4pT92AAADVklEQVQ4y3WUWUwTYRCAZxuiD5oIJj6grfag3e3SUlArEDDGKCGtgCZEY4zPGsSIxwOiYjDcnkF7qBzGC2XLFuUKKgKKSEFNoKCJBtpCC1GjvvhmStf5t9RA1D/5MpPd/b/MzL+7APOLcfqRANA8Rt6vop2BjUgS5mqE5MkYNXh/Az6XhqwmzyMUiX8tURYmBjemMGFZKs0HjESOeQbGOIzJeC9lXrp0XrpYZuK8EO/wgq5pEgwO71IdP72C5f3RmvavK9nmyVVJ9S+W0C2za1C2DDdHE7BSUqHkv8It1/th69Uu2H57BLY2T0Fa3TBszqtekbE/P33z4epV62u6YM2IIHbB/IPFQqwuK/8MZOUVwY5qTmU+WZN75Lx1udY2bmGto3Na25hFax2HpKrOqER7H6jbvuGcp8msw+D8Fy0z5wNz0yRlfjiBuZczcR4hh58qoS3ue6xtTGCtbj6hxgUgCBT0CJSAewjKyiH45zJjhSaHj0JI7DRxPiGbn7pAW0YbWJtbwEofxDb+ggINxKAUClQAe7Ylw84sM2Tn5IjISl8vFPpIZRRCYhvOlAirscJbRMjax2+pzvXto0uevVOV9ReyZzsAZgQJdAvUiTiAUzIAWdlCIRFhhaLY4WtfLMSW7WM35RVDNkXVG0FROdQjPe8mLUvgpQCiUAogjQgPHioQhZGWMV8gHI0IaxXlg5eUFS4i5OXFT/RMYVO5srgrU3+8AfTH6rHlgbDwQF4BiLPjPJS5yUNeodZ5YRUK6/FAiPBGRIgH0SgtfX1NWjYoYFXPpeUuQKg/FeKxS3TIJmcgau+jz0Tea3JMEeE12urmcH5kho2KCtd1ZdWwgLTLygYssvJBAefWG3O0G1S176M09yfISy6JfG4iyo6fkNPwLtdUO3xx952R9PjK3kxdZc9lw8X+7erC9i1xRW2XNUUd2fLT3anrClsvyIu6dimc30HX+AE0+JWJLziKjCK838i0zBrX3v2gj73yVC/nvAn0w48Gtb1Hr3FO6xneY2Dq+/VM80SC9smPePa2S6frmI03PJ41ah98Mmo4jxGFRtJyUMQZCNLhGGJaZkIY58JgzgdC+JOYozGnyTXeH1LjtcTHgdCOZ1+CjP1VMK7uLe6dCf4GWYYDbpq31gAAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"2016_Q1_Social-Login_Preference-Age\"\n        title=\"2016_Q1_Social-Login_Preference-Age\"\n        src=\"/static/72a4c673a1d294cf4a9ea66c70161408/e5715/2016_Q1_Social-Login_Preference-Age.png\"\n        srcset=\"/static/72a4c673a1d294cf4a9ea66c70161408/a6d36/2016_Q1_Social-Login_Preference-Age.png 650w,\n/static/72a4c673a1d294cf4a9ea66c70161408/e5715/2016_Q1_Social-Login_Preference-Age.png 768w,\n/static/72a4c673a1d294cf4a9ea66c70161408/7510d/2016_Q1_Social-Login_Preference-Age.png 2119w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Facebook did lose some ground to Google+ in Q1 2016 but not by an amount that would worry the social giant. Nevertheless, Google+ will be heartened by its performance. Sharing, however, is a different story and not one that the search giant would be really happy about. More than half of the social content on the Web is hosted on Facebook while, like in Q4 2015, Twitter comes in second with 16%. Email is not be discounted again as it has notched up the third place and is expected to go strong in the coming quarters too.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 77.84615384615385%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"2016_Q1_Social-Sharing-Global-Popularity\"\n        title=\"2016_Q1_Social-Sharing-Global-Popularity\"\n        src=\"/static/f592b788f42ba34116f1947afb4e2b88/e5715/2016_Q1_Social-Sharing-Global-Popularity.png\"\n        srcset=\"/static/f592b788f42ba34116f1947afb4e2b88/a6d36/2016_Q1_Social-Sharing-Global-Popularity.png 650w,\n/static/f592b788f42ba34116f1947afb4e2b88/e5715/2016_Q1_Social-Sharing-Global-Popularity.png 768w,\n/static/f592b788f42ba34116f1947afb4e2b88/7510d/2016_Q1_Social-Sharing-Global-Popularity.png 2119w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Some more critical insights provided by the analysis are:</p>\n<ul>\n<li>\n<ul>\n<li>In Q1 2016, females trumped males in the use of Social Login by 14%.</li>\n</ul>\n</li>\n<li>\n<ul>\n<li>Among mobile platforms too, iOS run devices lead the way pipping Android.</li>\n</ul>\n</li>\n<li>About 92% websites still prefer providing Facebook as one of the options for Social Login leading the favourites list since 2013.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 15, 2016","updated_date":null,"title":"Customer Identity Preference Trends Q1 2016","tags":["customer identity management","ciam platform","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":0.7751937984496124,"src":"/static/5fc5c5ffde6b586e913dd01591c4796e/e1953/customer-identity-preference-trends-q1-2016.png","srcSet":"/static/5fc5c5ffde6b586e913dd01591c4796e/69585/customer-identity-preference-trends-q1-2016.png 200w,\n/static/5fc5c5ffde6b586e913dd01591c4796e/e1953/customer-identity-preference-trends-q1-2016.png 250w","sizes":"(max-width: 250px) 100vw, 250px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"ciam platform"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}