Technology Buyer

Put the power of Gigya's Customer Identity Management to work for you.

Customer Identity and Access Management (CIAM) and traditional IAM vary significantly in terms of function and performance requirements. While traditional IAM systems excel at managing employee identities, CIAM solutions must adapt to handling the massive scale and variety of unstructured data inherent to managing the identities of your customers.

The notion that one can simply be adapted to serve the requirements of the other is unrealistic. CIAM demands a new set of rules and expectations. Gigya’s Customer Identity Management Platform offers a more intelligent and efficient way to collect and organize your customer data, so you can make better informed decisions and maximize its value.

Collect and Manage

All of the Data

The heart of Gigya’s CIAM Platform is a dynamic schema database that manages and consolidates all of your permission-based profile and behavioral data—structured and unstructured—creating a unified customer view that you can access via console reporting tools or directly through the API. Full indexing maximizes the breadth of queries you can run. Your data is normalized and always retrievable.

 

None of the Hassle

All of this flexibility and power is implemented with a single API that connects to more than 35 social networks and third-party identity providers (IdPs). All kinds of user data can be seamlessly collected and managed: shares, comments, likes, clicks, tags, text analytics and more. Gigya takes care of all API and privacy compliance updates, so you can focus on running your organization.

Pre-Built Integrations

Gigya’s IDX partner ecosystem gives you instant access to over 50 pre-built integrations with a who’s-who of marketing platform heavyweights. We partner with a growing range of leading technology partners, including content management systems, marketing automation providers, data management platforms, analytics solutions and more to enable plug-and-play integration that saves you time and money.

Gigya also employs generic data exchange services to simplify swapping data with systems that don’t have integrations—like central data warehouses—so you can count on a painless implementation that maximizes your productivity.

Here’s a Few of Our Integration Partners Sample of Gigya's Pre-Built Integrations View Integrations

Security

Cloud Performance—Grounded Security

Advanced security is built into the DNA of our platform. Gigya’s proven, reliable performance within large-scale enterprise environments is backed up with our ISO27001-certified standards for application security, data encryption and transactional authentication. Our advanced infrastructure ensures continuous service and full disaster recovery. Additionally, Gigya maintains data compliance with over 35 social providers and keeps step with compliance standards like COPPA.

Safe-at-Rest

Safe at Rest

Personally identifiable information (PII) and other sensitive information is automatically encrypted and passwords are hashed. Two-factor & Risk-based authentication, along with robust roles and permissions, gives site admins granular control over user access.

Safe-in-Motion

Safe in Motion

Sensitive data travels to and from Gigya servers via a secure channel. Critical operation REST API calls—such as “delete_user”—must be signed and made server-to-server only.

Stay-in-Control

Stay in Control

Monitor user-level privileges and permissions and access robust audit logging to track transactional behavior, investigate errors, bugs and anomalies to keep your system running smoothly.

Internal-Facing IAM vs. Customer-Facing

Scale

Traditional IAM

From hundreds to tens of thousands of users.

Gigya CIAM

From tens of thousands to billions of users.

User Onboarding

Traditional IAM

User identities are typically provisioned and managed by a small team of IT administrators.

Gigya CIAM

Registration is self-service. Users enter their own profile data and set permissions from preference settings on IdPs.

Structured vs. Unstructured Data

Traditional IAM

Identities are captive and subject to a governed registration process.

Enterprise IAM systems generally have a rigid data structure to capture and manage well-defined fields such as name, location or email address. This familiar IT process is most prudent for efficiency and security.

Gigya CIAM

Identities are earned; dynamically changing and growing over time.

Users register for services in ways that are familiar to them. Trust is established with any IdP or service that each user has registered with. Profiles expand as the user “journeys” online and touches more data points.

Single Sign-On (SSO)

Traditional IAM

SSO is expected to provide seamless access to all of the business applications a user needs to do his or her job from a variety of on-site and mobile devices.

Gigya CIAM

SSO is expected to provide seamless access to all of the websites and touch points a registered user connects with through your business, even if those properties are managed by a third-party.

Federating Identities

Traditional IAM

Federation connects a person’s electronic identity attributes across multiple systems. Enterprise IAM typically federates data for multiple on-premises business system applications, authenticating data using the SAML protocol.

Gigya CIAM

CIAM federation must aggregate data from a larger selection of internal and external applications and properties, and requires the use of a wider variety of authentication protocols such as OpenID and SAML.

On-Premises vs. Cloud

Traditional IAM

Because of security requirements, relatively minimal data processing needs and the ability to easily scale to steady growth, enterprise IAM has traditionally been an on-premises solution.

Although provisioning and identity management is administered on-site, users can typically access business systems remotely from any mobile device or computer that can access the internet.

Gigya CIAM

Social network protocols change frequently, making it challenging to keep up-to-date using on-premises software.

A CIAM system must handle dramatic shifts in traffic volume and offer access from environments such as web and mobile apps. Cloud providers also tend to invest more in system and application security than most on-premises clients.

Direct Integrations

Traditional IAM

Integrations with enterprise IAM are typically implemented on-premises and primarily connect internal business users with database, messaging, CRM and other business process services.

Significant administrative resources are generally required to build these integrations, which must then be maintained.

Gigya CIAM

A CIAM system must integrate with a variety of technologies that dynamically access and manipulate data to drive marketing efforts.

A solution with pre-built integrations not only accommodates fast, multi-channel API interactions, but also helps get your system to market quicker, with fewer IT hours.

Want more information?

See Our Developer's Guide

“We needed a registration system with SSO and social login. We didn’t have a registration system and looked for a ready to use software. After evaluating time / effort / maintenance needed if we were to build this, we decided Gigya was the way to go.”

Clarin

Pablo Ferro

IT Director
Clarín

“HBR has been a satisfied Gigya client for four years now. Gigya's technology continues to save us significant development time and resources, as well as enables us to offer our readers seamless usability without sacrificing security.”

Harvard Business Review

Kevin Newman

Director of Technology
Harvard Business Review

“TV is no longer a one-way medium, and products from Gigya have allowed us to change the way we approach television production with the ability to unify user identities and experiences across Utopia’s TV show, website and mobile apps.”

Talpa

Hylke Sprangers

CTO Digital
Talpa Media