IAM Blog

CIAM 2.0 Identity access management

Navigating the Future: CIAM 2.0 and Enhanced Customer Experience

In the next frontier of digital engagement, Customer Identity Access Management (CIAM) emerges as a pivotal cornerstone for future-ready business strategies. As organizations gear up to offer unparalleled user experiences in this new era, mastering the nuances of CIAM becomes more crucial than ever. Over the wall. Drilling down. Synergize. Drill the ocean. What do […]
Read More
ciam-implementation-cost

Why CIAM is Costing Companies $3.92 Million on Average

Customer Identity Access Management lets your company manage and capture customer ID and profile data. It lets you control how your customers access applications and services. A good CIAM solution will offer a variety of features, including: Self-service account management Preface and consent management Single sign-on Multifactor authentication Access management Data access governance Directory services […]
Read More
11-questions-CIAM

11 Question Not Being Asked Before a Failed CIAM Investment

This guide highlights 11 pivotal questions that can steer you clear of potential pitfalls and towards a robust CIAM strategy for the future. In the intricate realm of digital identity management, ensuring a seamless and secure customer experience is paramount. As businesses navigate the complexities of Customer Identity Access Management CIAM, asking the right questions […]
Read More

Top Cybersecurity Solutions in 2021

Identity & Access Management has evolved to respond to changes to processes and technology. Behavioral analytics and zero trust have become integral components of identity management and access products. COVID-19 has forced organizations to have employees work from home. This has made it crucial to limit the access that remote employees, and partners and customers, […]
Read More

Customizing Identity Selector List for Role Owner in IIQ 8.1

[vc_row][vc_column][vc_column_text] Tutorial for Identity Selector configuration for Role Owners Today’s blog features a tutorial detailing the Identity Selector configuration for Role Owners. We had a requirement to configure a Role Creation and Modification workflow for which there was a criterion defined for Role Owners. We have customized the Identity selector list for role owners in […]
Read More

12 Simple Steps for a Successful PAM Strategy

ICYMI — Lil’ CISO has garnered a lot of attention with his PAM (privileged access management) song and video. So much so, that it’s spawned numerous requests to provide more information on the 12 steps outlined by Lil’ CISO for implementing a successful Privileged Access Management (PAM) strategy. In this blog, we will outline PAM […]
Read More

Active Directory should be on SSL for IdentityIQ 8.0+ User/Account Creation Scenario

[vc_row][vc_column][vc_column_text] Problem We were working on a proof of concept and came across a scenario where Active Directory create user scenario was failing from IIQ 8.0+ with the following warning error: “Errors returned from IQService. An error occurred while setting a password for the account. The exception has been thrown by the target of an […]
Read More