Posts tagged 'ciam'

  • Customer Identity and Access Management (CIAM) vs Identity and Access Management (IAM)

    Both Customer Identity and Access Management (CIAM) and IAM (Identity and Access Management) are about people who are users of your system: who can access what, how do they prove who they are, and how you manage access over time. Though there are similarities between CIAM and IAM, at their heart they serve different needs.

    Let’s take a look at these two identity management archetypes and see how they differ.

    READ MORE
  • Supercharge Development with FusionAuth

    Businesses have begun to acknowledge that the physical health of developers is an asset. As a result, many workstations now come equipped with furniture and devices designed to encourage natural posture, reduce exertion, and function within optimal reach zones. Such tools boost productivity by helping eliminate employee absences caused by repetitive strain injuries.

    But employers often overlook the mental strain developers can experience from repetitive and complex coding tasks. Fortunately, the team at FusionAuth is working to reduce such pain points in the massively complex customer identity access management (CIAM) space.

    Read more over at hostingadvice.com

    READ MORE
  • Open Office Hours To Ask Anything About Identity, Authorization, and Authentication

    On December 17th we had the first of what will be many Open Office Hours here at FusionAuth and we are damn happy with how it went. The first time out of the gate for anything always brings risks of glitches but everything went down as smooth as a fine whiskey. Check out the video and summary below to see and hear for yourself.

    READ MORE
  • User Data Security is a Breach

    If you follow us on Twitter (if you don’t, you can fix that now) you’ll see that we post about data security breaches hitting the internet community. We don’t do it to be malicious or gloat about their failures, but to increase awareness beyond the core community of security professionals. We deal with security every day so we know that keeping data secure is a complex challenge. Few people are well-versed in its many facets and subtleties, and it can be difficult to stay informed of the current trends and risks. We hear all the time “See? You can’t stop cyber breaches.” Fortunately, that’s a load of crap.

    READ MORE
  • Is FusionAuth GDPR Compliant?

    It’s been about a year since the General Data Protection Regulation (GDPR) became fully enforceable. Are you compliant yet? We started making FusionAuth GDPR compliant as soon as the regulation was adopted, although to be honest, there wasn’t a lot we needed to do. We fully agree with these regulations and feel they provide effective guidelines that any application should follow with their users’ personal data. If you are trying to catch up with the GDPR news, read our Developer’s Guide to the GDPR here and you’ll have a good idea of what you should be aware of. Our developers have been working with these concepts for years now, so it was exciting to see our caution around user data validated.

    READ MORE
  • Keycloak and FusionAuth Comparison

    Keycloak and FusionAuth are CIAM platforms designed to register, login and manage users in modern applications. They eliminate the risk, costly development and maintenance time required to build an in-house solution. Keycloak and FusionAuth share many features, but also have important differences. Use this information to compare the two and determine which matches your needs.

    READ MORE
  • Auth0 and FusionAuth - A Tale of Two Solutions

    We’ve seen a lot of news lately about Authentication as a Service platforms like Auth0 and FusionAuth and hope that trend will continue. Auth0 and FusionAuth both provide advanced customer identity and access management (CIAM) and it is exciting to see a company that we respect recognized by the wider community. Strangely, when I say this at the CIAM events we attend I get a few curious looks. Why would we want them to be recognized? Shouldn’t we want FusionAuth to get the attention?

    READ MORE
  • 8 Things to Know About Okta And FusionAuth

    If you have been paying attention to news in the software industry, you’ve probably seen more than a few articles about the ‘steady growth’ and ‘expanding market’ for identity and access management platforms. This should be no surprise. Every year thousands of new applications for desktop, mobile, IoT and beyond are released to the market, and every one of them needs to register and manage their customers. With so many business opportunities, of course there are a variety of solutions available. Okta and FusionAuth are two popular solutions, although they have different perspectives that make a big difference in what they provide.

    READ MORE
  • OneLogin and FusionAuth - Different Enough To Make A Difference

    If you have any type of application, site or service, you already know that secure customer identity and access management (CIAM) is vital to register, authenticate, and manage your users. OneLogin and FusionAuth both have powerful identity solutions, but the way they approach the challenge makes their platforms very different. Understanding their unique perspectives can help clarify which one is a better match for your company’s needs.

    READ MORE
  • A Quick Comparison Of Ping Identity And FusionAuth

    Ping Identity and FusionAuth are two customer identity and access management solutions that have received a lot of attention recently. They share many features, but since they are designed to solve different challenges, they have important differences. Use this information to compare the two solutions and determine which has the features that match your company’s needs.

    READ MORE
  • Firebase and FusionAuth CIAM Comparison

    As we talk to and win new clients, we learn about the other identity management platforms that are available today. One of the more interesting discoveries is that Firebase and FusionAuth are coming up as comparable products. While they are both called identity management solutions, the truth is that Firebase and FusionAuth are very different products designed with a substantially different set of features. As true CIAM solutions, they really don’t compare.

    READ MORE
  • Amazon Cognito and FusionAuth Comparison

    Identity management is a hot topic lately—stories about cyber breaches, industrial-scale data mining and the EU’s GDPR all connect back to a company’s identity system eventually. Too often those stories gloss over that fact that many of these data protection failures were avoidable if companies implemented more effective customer identity and access management (CIAM) solutions. Two popular solutions, Amazon Cognito and FusionAuth approach the problem from different perspectives.

    READ MORE
  • Active Directory and FusionAuth CIAM Comparison

    Active Directory and FusionAuth CIAM often come up together in conversations about identity solutions for modern web-enabled applications. While they fall under the umbrella of “identity management solutions,” the truth is that Active Directory and FusionAuth have a substantially different set of features. Active Directory was originally developed for centralized domain management within Windows networks with hundreds of users. Over time they layered additional identity-focused services on the core hierarchical structure.

    READ MORE