Customer Identity and Access Management (CIAM) and traditional IAM vary significantly in terms of function and performance requirements. While traditional IAM systems excel at managing employee identities, CIAM solutions must adapt to handling the massive scale and variety of unstructured data inherent to managing the identities of your customers.
The notion that one can simply be adapted to serve the requirements of the other is unrealistic. CIAM demands a new set of rules and expectations. Gigya’s Customer Identity Management Platform offers a more intelligent and efficient way to collect and organize your customer data, so you can make better informed decisions and maximize its value.
Collect and Manage
All of the Data
The heart of Gigya’s CIAM Platform is a dynamic schema database that manages and consolidates all of your permission-based profile and behavioral data—structured and unstructured—creating a unified customer view that you can access via console reporting tools or directly through the API. Full indexing maximizes the breadth of queries you can run. Your data is normalized and always retrievable.
None of the Hassle
All of this flexibility and power is implemented with a single API that connects to more than 35 social networks and third-party identity providers (IdPs). All kinds of user data can be seamlessly collected and managed: shares, comments, likes, clicks, tags, text analytics and more. Gigya takes care of all API and privacy compliance updates, so you can focus on running your organization.
Cloud Performance—Grounded Security
Advanced security is built into the DNA of our platform. Gigya’s proven, reliable performance within large-scale enterprise environments is backed up with our ISO27001-certified standards for application security, data encryption and transactional authentication. Our advanced infrastructure ensures continuous service and full disaster recovery. Additionally, Gigya maintains data compliance with over 35 social providers and keeps step with compliance standards like COPPA.
Safe at Rest
Personally identifiable information (PII) and other sensitive information is automatically encrypted and passwords are hashed. Two-factor & Risk-based authentication, along with robust roles and permissions, gives site admins granular control over user access.
Safe in Motion
Sensitive data travels to and from Gigya servers via a secure channel. Critical operation REST API calls—such as “delete_user”—must be signed and made server-to-server only.
Stay in Control
Monitor user-level privileges and permissions and access robust audit logging to track transactional behavior, investigate errors, bugs and anomalies to keep your system running smoothly.
Internal-Facing IAM vs. Customer-Facing
From hundreds to tens of thousands of users.
From tens of thousands to billions of users.
User identities are typically provisioned and managed by a small team of IT administrators.
Registration is self-service. Users enter their own profile data and set permissions from preference settings on IdPs.
Structured vs. Unstructured Data
Identities are captive and subject to a governed registration process.
Enterprise IAM systems generally have a rigid data structure to capture and manage well-defined fields such as name, location or email address. This familiar IT process is most prudent for efficiency and security.
Identities are earned; dynamically changing and growing over time.
Users register for services in ways that are familiar to them. Trust is established with any IdP or service that each user has registered with. Profiles expand as the user “journeys” online and touches more data points.
Single Sign-On (SSO)
SSO is expected to provide seamless access to all of the business applications a user needs to do his or her job from a variety of on-site and mobile devices.
SSO is expected to provide seamless access to all of the websites and touch points a registered user connects with through your business, even if those properties are managed by a third-party.
Federation connects a person’s electronic identity attributes across multiple systems. Enterprise IAM typically federates data for multiple on-premises business system applications, authenticating data using the SAML protocol.
CIAM federation must aggregate data from a larger selection of internal and external applications and properties, and requires the use of a wider variety of authentication protocols such as OpenID and SAML.
On-Premises vs. Cloud
Because of security requirements, relatively minimal data processing needs and the ability to easily scale to steady growth, enterprise IAM has traditionally been an on-premises solution.
Although provisioning and identity management is administered on-site, users can typically access business systems remotely from any mobile device or computer that can access the internet.
Social network protocols change frequently, making it challenging to keep up-to-date using on-premises software.
A CIAM system must handle dramatic shifts in traffic volume and offer access from environments such as web and mobile apps. Cloud providers also tend to invest more in system and application security than most on-premises clients.
Integrations with enterprise IAM are typically implemented on-premises and primarily connect internal business users with database, messaging, CRM and other business process services.
Significant administrative resources are generally required to build these integrations, which must then be maintained.
A CIAM system must integrate with a variety of technologies that dynamically access and manipulate data to drive marketing efforts.
A solution with pre-built integrations not only accommodates fast, multi-channel API interactions, but also helps get your system to market quicker, with fewer IT hours.
“We needed a registration system with SSO and social login. We didn’t have a registration system and looked for a ready to use software. After evaluating time / effort / maintenance needed if we were to build this, we decided Gigya was the way to go.”
“HBR has been a satisfied Gigya client for four years now. Gigya's technology continues to save us significant development time and resources, as well as enables us to offer our readers seamless usability without sacrificing security.”
Director of Technology
Harvard Business Review
“TV is no longer a one-way medium, and products from Gigya have allowed us to change the way we approach television production with the ability to unify user identities and experiences across Utopia’s TV show, website and mobile apps.”