{"componentChunkName":"component---src-templates-tag-js","path":"/tags/customer-authentication/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":2,"edges":[{"node":{"fields":{"slug":"/identity/role-of-customer-authentication-digital-first-cx/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In a fast-paced digital business landscape, digital agility is undeniably becoming the backbone of enterprises striving to stay ahead of the curve. </p>\n<p>And when we talk about overall business growth, we can’t overlook the role of <a href=\"https://www.loginradius.com/authentication/\">customer authentication</a> in reinforcing digital agility for thriving business success. </p>\n<p>With digital agility, businesses can easily and rapidly update, change, or adapt their processes to meet current and future customer needs and opportunities. </p>\n<p>Just like agility is the way to move quickly and easily, digital agility is now the means to adopt digital transformation quickly and easily through the right tools and processes. And customer authentication plays a vital role in incorporating digital agility. </p>\n<p>Let’s understand the aspects of digital agility and how businesses can ensure they’re on the right path to achieving digital agility through the right customer authentication tools and technologies. </p>\n<h2 id=\"what-is-digital-agility-whats-the-role-of-customer-authentication-in-invoking-the-potential-of-digital-agility\" style=\"position:relative;\"><a href=\"#what-is-digital-agility-whats-the-role-of-customer-authentication-in-invoking-the-potential-of-digital-agility\" aria-label=\"what is digital agility whats the role of customer authentication in invoking the potential of digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Agility? What’s the Role of Customer Authentication in Invoking the Potential of Digital Agility?</h2>\n<p>Digital agility is the ease with which any organization can adapt to changing business needs – by enabling or changing their business processes. </p>\n<p>And for a <a href=\"https://www.loginradius.com/blog/growth/4-things-consider-starting-digital-transformation/\">successful digital transformation</a>, organizations need to invest in resilient business operations, consumer experience initiatives, and technology. </p>\n<p>And how do you go about achieving your business objectives in digital agility? Among its primary building blocks, identity and access management (or IAM) can help in bringing business agility into any organization.</p>\n<p>Traditionally, IAM has always been viewed as an effective security solution necessary for software applications and mobile apps. In short, it has been used solely to ensure the right person has access to the right resource. This is true, but IAM is now much more than simply acting as an authentication tool.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Customer identity and access management</a> (CIAM) has changed how businesses leverage customer insights and provide authentication to users without hampering the overall user experience. </p>\n<h2 id=\"how-a-ciam-solution-helps-paving-the-way-for-digital-agility\" style=\"position:relative;\"><a href=\"#how-a-ciam-solution-helps-paving-the-way-for-digital-agility\" aria-label=\"how a ciam solution helps paving the way for digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How a CIAM Solution Helps Paving the Way for Digital Agility?</h2>\n<p>For effective digital transformation, technology-enabled companies must move from a fixed and rigid IT infrastructure – to a more flexible and component-based API architecture, which can easily be reconstructed or reused. </p>\n<p>And, we shall see how an API-based consumer identity and access management (or CIAM) can be the foundation of digital agility and transformation.</p>\n<p>A robust CIAM solution helps businesses stay ahead of the competition by offering valuable insights that help invoke the true potential of digital agility, including:</p>\n<ul>\n<li>Which users or identities require access rights to the applications?</li>\n<li>How can they go about utilizing these applications?</li>\n<li>What resources do they need for access?</li>\n<li>How can you prevent unauthorized access to the applications?</li>\n<li>How many times does a user access the application?</li>\n</ul>\n<p>This information helps businesses quickly understand user demands and can eventually prepare strategies for future requirements. </p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ciam-ds\"\n        title=\"ciam-ds\"\n        src=\"/static/5585e9b7c984efdccda767c38763e342/e5715/ciam-ds.png\"\n        srcset=\"/static/5585e9b7c984efdccda767c38763e342/a6d36/ciam-ds.png 650w,\n/static/5585e9b7c984efdccda767c38763e342/e5715/ciam-ds.png 768w,\n/static/5585e9b7c984efdccda767c38763e342/63ff0/ciam-ds.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-the-loginradius-ciam-solution-can-help-in-your-digital-agility\" style=\"position:relative;\"><a href=\"#how-the-loginradius-ciam-solution-can-help-in-your-digital-agility\" aria-label=\"how the loginradius ciam solution can help in your digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How the LoginRadius CIAM Solution Can Help in Your Digital Agility</h2>\n<p>As a leading provider of CIAM solutions that works for any business model, LoginRadius ensures digital agility and a seamless consumer experience. </p>\n<p>With the LoginRadius identity management platform, you can achieve digital transformation by connecting your consumer data to a host of API-driven tools in analytics, business intelligence (BI), and consumer relationship management (CRM).</p>\n<p>Using the LoginRadius <a href=\"https://www.loginradius.com/blog/identity/digital-agility/\">consumer identity APIs</a>, you can quickly validate and automate your consumer identification process and prevent spam or fraudulent accounts.</p>\n<p>With its preconfigured integration with third-party tools and applications, you can pull your latest consumer data – thus eliminating data silos and generating valuable insights.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With businesses quickly stepping towards digital transformation, the role of digital agility remains unmatched. </p>\n<p>Businesses can leverage the true potential of digital agility by incorporating a reliable CIAM solution like LoginRadius CIAM that helps thrive agility and overall business growth. </p>\n<p>Reach us if you wish to see the future of digital agility through a robust cloud-based CIAM solution. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 06, 2022","updated_date":null,"title":"The Role of Customer Authentication in Paving the Way for Digital Agility","tags":["customer authentication","digital transformation","ciam"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4184397163120568,"src":"/static/2314b7626fb020000bafa287a12e12f7/33aa5/digital-cx.jpg","srcSet":"/static/2314b7626fb020000bafa287a12e12f7/f836f/digital-cx.jpg 200w,\n/static/2314b7626fb020000bafa287a12e12f7/2244e/digital-cx.jpg 400w,\n/static/2314b7626fb020000bafa287a12e12f7/33aa5/digital-cx.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"fields":{"slug":"/identity/calcualting-roi-build-vs-buy/"},"html":"<p>Customer Authentication and Identity platforms offer a seemingly, complex web of tools that touch every aspect of a customer-facing business and can have a significant impact on your bottom line. </p>\n<p>Most businesses with legacy systems are stuck between choosing to maintain an existing in-house system, investing in building a new in-house system, or working with a vendor. Making </p>\n<p>the wrong decision can be expensive, time-consuming, can put you at risk of a data breach, and may only keep you in regulatory compliance in the short-term. </p>\n<p>Working with an identity vendor who is an expert in the space is the safest and most economical approach to avoiding the pitfalls I mentioned above. </p>\n<p>A modern solution offers short-term wins and long-term value, highlighted by:</p>\n<ul>\n<li>Reducing costs.</li>\n<li>Boosting revenue.</li>\n<li>Ensuring your data is protected.</li>\n<li>Allowing your business to be more adaptable in a shifting technological and legal landscape. </li>\n</ul>\n<p>Mix those benefits in with a speedy implementation period, and your teams can get back to focusing on innovating and growing your business. </p>\n<p>This blog is a multi-part series where we will outline the value of working with LoginRadius over maintaining and building up your existing systems.</p>\n<h2 id=\"time-effort-and-maintenance\" style=\"position:relative;\"><a href=\"#time-effort-and-maintenance\" aria-label=\"time effort and maintenance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Time, Effort, and Maintenance</h2>\n<p>Most businesses that hesitate to invest in a vendor solution are often unaware of how much their existing approach is costing them – and not just in money. </p>\n<p>To understand why a vendor approach is so economical, we must first outline the existing costs associated with maintaining an outdated and decentralized authentication and identity system.</p>\n<p>At the end of this section, you should have a blueprint for understanding what your internally built system costs to run today. </p>\n<p>Use a chart like the one below to enter your costs. Remember, even rough estimated will very quickly outline the scale of these costs:</p>\n<ul>\n<li><strong>Assigned staff</strong>: Maintaining an authentication and identity offering is usually a full-time job for at least one developer. Larger businesses with more complex use-cases may require multiple developers to manage these systems. Enter the total salary of the staff members assigned to these functions. You may also use a percentage of an annual salary if a team member is not dedicating 100% of their time to this work. </li>\n<li><strong>Adding or fixing features</strong>: In any given year, a business will undertake several projects related to their authentication or customer data management systems. This work can include maintaining integrations, building new integrations, maintaining authentication systems, adding new features, and <a href=\"https://www.loginradius.com/resource/fixing-broken-authentication-with-adaptive-mfa/\">fixing broken features</a>. Enter the total salary of the staff members assigned to these functions. You may also use a percentage of an annual salary if a team member is not dedicating 100% of their time to this work.</li>\n<li><strong>Customer service</strong>: Dealing with authentication-related issues such as lost passwords take up most of a support desk’s time. Try to calculate a percentage of their salaries as it relates to these efforts.</li>\n</ul>\n<table>\n  <tr>\n   <td>\n#\n   </td>\n   <td>Item\n   </td>\n   <td>Amount ($)\n   </td>\n  </tr>\n  <tr>\n   <td>1\n   </td>\n   <td>Assigned Staff Salary Totals\n   </td>\n   <td>\n   </td>\n  </tr>\n  <tr>\n   <td>2\n   </td>\n   <td>Adding or Fixing Features Totals\n   </td>\n   <td>\n   </td>\n  </tr>\n  <tr>\n   <td>3\n   </td>\n   <td>Customer Service Salary Totals\n   </td>\n   <td>\n   </td>\n  </tr>\n  <tr>\n   <td>4\n   </td>\n   <td><p style=\"text-align: right\">\nTotal</p>\n   </td>\n   <td>\n   </td>\n  </tr>\n</table>\n<p>The maintenance costs of in-house Authentication and Identity are pretty high even if we only define “maintenance” as keeping the existing system working properly. </p>\n<p>When businesses embark on a project to improve or update those systems, those costs skyrocket – entire teams of developers, project managers, and executives must turn their efforts towards these pushes. </p>\n<p>Customer service efforts make up a huge chunk of the hidden costs associated with legacy authentication systems. These teams see large swaths of their time drained by dealing with end-users trying to reset their passwords, recover their accounts, cancel memberships, revoke access to data, and more.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-case-for-buying-over-building/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"The Case for Buying over Building 1\"\n        title=\"The Case for Buying over Building 1\"\n        src=\"/static/57f557d0de5a1542f05a0772cc1131c7/e5715/The-Case-for-Buying-over-Building-1.png\"\n        srcset=\"/static/57f557d0de5a1542f05a0772cc1131c7/a6d36/The-Case-for-Buying-over-Building-1.png 650w,\n/static/57f557d0de5a1542f05a0772cc1131c7/e5715/The-Case-for-Buying-over-Building-1.png 768w,\n/static/57f557d0de5a1542f05a0772cc1131c7/2bef9/The-Case-for-Buying-over-Building-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"case-study\" style=\"position:relative;\"><a href=\"#case-study\" aria-label=\"case study permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Case Study</h2>\n<p>One of our news and media customers told us a story about a project they took on a couple of years before working with us. It started with a question: _Do we want to add Google as a social login option to our website? _</p>\n<p>They launched a research team that was asked to determine whether their users would leverage that option enough to make a difference in conversion; these findings had to be presented to leadership, and then a decision had to be made by that group. Once that decision was, they assigned a project manager and a series of front-end and back-end developers to update their site and apps with the new login option. This involved developing the social login connectors, QA testing, staging environments, then a go-live team for their web and mobile offerings. This effort took over four months to complete. </p>\n<p>This same project would take LoginRadius customers no more than a couple of weeks. How?</p>\n<p>Well, the connectors are already built. We have detailed step-by-step guides in our documentation. Our support is available 24/7/365 to help solve any issues, and our dashboard-driven deployment tools offer pre-built and customizable options from a UI/UX perspective. </p>\n<p>If the business decision is already made, you could easily add a <a href=\"https://www.loginradius.com/blog/identity/2021/02/social-login-infographic/\">social login</a> option to your website and mobile apps in the afternoon and go live that same night – we know this because we see our customers do it all the time!</p>\n<p><strong>Stayed tuned for Part II of this series, where I will help you calculate lost revenue associated with authentication and system availability.</strong></p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 31, 2021","updated_date":null,"title":"Calculating ROI, Build vs Buy (Part 1)","tags":["customer authentication","identity management","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/95457fd0469650a4a716e0d2837f0db5/14b42/calcualting-roi-build-vs-buy-cover.jpg","srcSet":"/static/95457fd0469650a4a716e0d2837f0db5/f836f/calcualting-roi-build-vs-buy-cover.jpg 200w,\n/static/95457fd0469650a4a716e0d2837f0db5/2244e/calcualting-roi-build-vs-buy-cover.jpg 400w,\n/static/95457fd0469650a4a716e0d2837f0db5/14b42/calcualting-roi-build-vs-buy-cover.jpg 800w,\n/static/95457fd0469650a4a716e0d2837f0db5/16310/calcualting-roi-build-vs-buy-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Cooper Matheson","github":null,"avatar":null}}}}]}},"pageContext":{"tag":"customer authentication"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}