{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/62","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"LoginRadius has been at the forefront of businesses' digital transformation with its advanced CIAM (Customer Identity and Access Management…","fields":{"slug":"/identity/loginradius-roi-enterprises-infographic/"},"html":"<p>LoginRadius has been at the forefront of businesses' digital transformation with its advanced CIAM (Customer Identity and Access Management) platform, redefining how companies securely manage their users. The cloud solution also offers a host of initiatives that enhance ROI like <a href=\"https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/\">high scalability</a>, customization, and customer-obsessed solutions. A few are explained below: </p>\n<h3 id=\"1-auto-scalable-infrastructure\" style=\"position:relative;\"><a href=\"#1-auto-scalable-infrastructure\" aria-label=\"1 auto scalable infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Auto-scalable infrastructure</h3>\n<p>Organizations these days need to enable networks, processes, and software to grow and manage increasing demands effectively. <a href=\"https://www.loginradius.com/scalability/\">Scalable infrastructure</a> provides companies with the ability to add servers and computers to a network to handle increased workloads efficiently.</p>\n<p>It, therefore, does not come as a surprise that scalable storage has gone from a novelty to a necessity with its ability to increase data capacity utilizing a single repository instead of multiple sentinel servers. </p>\n<p>To address the potential of applications growing over time, our platform is designed with scalability in mind and can resourcefully and seamlessly accommodate growth. At a peak load of 180K logins per second, you can rest assured our infrastructure can handle increased users and demand.</p>\n<h3 id=\"2-unparalleled-security\" style=\"position:relative;\"><a href=\"#2-unparalleled-security\" aria-label=\"2 unparalleled security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Unparalleled security</h3>\n<p>LoginRadius offers matchless security with password protection, account verification, auto re-authentication, <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">risk-based authentication</a>, multi-factor authentication, and in-built fraud email blocks. All these elements come together to form the most formidable and intelligent security system with protocols that enable access to users after thorough verification and authentication, restrict access to unauthorized elements, protect users from external threats and keep sensitive data secure.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-case-for-buying-over-building/\"><img src=\"/f1bef07434b10829d0210abc5d59dd61/EB-buy-build.webp\" alt=\"EB-buy-build\"></a></p>\n<h3 id=\"3-seamless-integration\" style=\"position:relative;\"><a href=\"#3-seamless-integration\" aria-label=\"3 seamless integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Seamless integration</h3>\n<p>Our automated data integration options improve organizational efficiency to automate tasks to run entirely without minimal human intervention. Automation of repetitive and tedious tasks associated with data integration such as ingestion, extraction, transformation, and migration across the enterprise drives up efficiency and saves your business time and money.</p>\n<p>LoginRadius provides customized data mapping to facilitate data integration, <a href=\"https://www.loginradius.com/blog/identity/loginradius-identity-import-manager-data-migration/\">data migration</a>, warehouse automation, automated data extraction, data synchronization, and meet other data management requirements. </p>\n<p>Data mapping is a crucial aspect, and quality data mapping will ensure top-quality data for analysis. Our customized data mapping ability will allow organizations to gather user data for valuable insights.</p>\n<p>Unified and centralized data further allows organizations to work from the exact blueprint to avoid discrepancies from different tools and disparate data. Furthermore, the availability of data at a single, central location improves accessibility. It enhances the decision-making process by providing a holistic and complete view of the organization's data. </p>\n<p>LoginRadius also provides two-way sync, allowing users to synchronize data irrespective of whether it has been uploaded from the source or the destination.</p>\n<p>To learn more on how LoginRadius empowers businesses and delivers the utmost ROI, check out the infographic below.\n<img src=\"/2f834ab450fe0c0aa3ad866d931475f8/ROI.webp\" alt=\"ROI\"></p>\n<h2 id=\"implementing-customer-obsessed-capabilities-for-your-business\" style=\"position:relative;\"><a href=\"#implementing-customer-obsessed-capabilities-for-your-business\" aria-label=\"implementing customer obsessed capabilities for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Customer-Obsessed Capabilities for Your Business</h2>\n<p>For businesses to grow and increase their profitability, there is a need to implement robust infrastructure to aid in productivity and increase efficiency. LoginRadius helps organizations scale up security, operability, data integration, and effective <a href=\"https://www.loginradius.com/data-governance/\">data management</a>, among others. </p>\n<p>LoginRadius has 35 data centers worldwide and helps companies manage the needs of 1.17 billion user identities with its efficient 24/7 support for its valued customers.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-roi-enterprises-infographic\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"LoginRadius Book a Demo\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 16, 2021","updated_date":null,"description":"For businesses to grow and increase their profitability, there is a need to implement robust infrastructure to aid in productivity and increase efficiency. LoginRadius helps organizations scale up security, operability, data integration, and effective data management, among others. Check out our infographic for more ROI-centric details.","title":"How LoginRadius Offers Customer-Centric Capabilities that Drive ROI","tags":["data management","digital transformation","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.1739130434782608,"src":"/static/021b01b3c7c3bdb21bed14ea13513b7c/58556/roi-cover.webp","srcSet":"/static/021b01b3c7c3bdb21bed14ea13513b7c/61e93/roi-cover.webp 200w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/1f5c5/roi-cover.webp 400w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/58556/roi-cover.webp 800w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/99238/roi-cover.webp 1200w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/f5538/roi-cover.webp 1464w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"The goal of any digital business is to boost its conversion rates and increase sales. However, with the plethora of authentication tools…","fields":{"slug":"/growth/advantage-social-login-as-marketer/"},"html":"<p>The goal of any digital business is to boost its conversion rates and increase sales. However, with the plethora of authentication tools available, it is not easy to select one.  <a href=\"https://www.loginradius.com/social-login/\">Social login</a> is one of the most common and preferred ways to achieve the target. It simplifies the login process for the user which directly results in boosted conversion rate. </p>\n<h2 id=\"what-is-social-login\" style=\"position:relative;\"><a href=\"#what-is-social-login\" aria-label=\"what is social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Social Login?</h2>\n<p>Social login is an authentication process that uses social networks to authenticate a user on the website. It is designed for making user registration easier, faster, and more efficient.  Social login can provide enterprises with new ways to deepen relationships with their customers, improve conversion rates, reduce abandonments, etc.</p>\n<p>Social login is good for your business because it saves the trouble of registering every single time your customer wants to utilize your digital property. </p>\n<h2 id=\"5-ways-how-social-login-boosts-conversion-rates\" style=\"position:relative;\"><a href=\"#5-ways-how-social-login-boosts-conversion-rates\" aria-label=\"5 ways how social login boosts conversion rates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Ways How Social Login Boosts Conversion Rates</h2>\n<p>Users look at social login as a simple and quick way to log in to a website. However, marketers must notice how successful organizations have been implementing it to maximize their sales conversion rates at every step of the <a href=\"https://www.loginradius.com/blog/fuel/consumer-journey-from-sign-up-to-purchase/\">customer journey</a>. </p>\n<p>The companies pull the user information to create a wholesome experience for the user. Thus, the notifications are more personalized and attractive to the users. Below are a few reasons as to what attracts the customers to social login:</p>\n<ol>\n<li><strong>It quickens the process of signing up for the website:</strong> Implementation of social login makes the registration and login process fast. It can lower the time from around two minutes to around two seconds. As brand managers, you will notice the impact on your sign-up conversion rate for the website.</li>\n<li><strong>It enables the usage of social media functionalities.</strong> Social login enables users to like, share, comment, subscribe, play online games, and much more without having to create an account or waste time by typing their login credentials over and over again.</li>\n<li><strong>It doesn't force the users to create a new password:</strong> The process utilizes the information of social media accounts of the users. Thus, they have one less password to remember. It is something they might appreciate and hence visit the website more frequently.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><img src=\"/2e684f2b11f83a63a098aa218d845638/WP-social-login-rec.webp\" alt=\"WP-social-login-rec\"></a></p>\n<ol start=\"4\">\n<li>\n<p><strong>It results in fewer unsuccessful logins:</strong> The users only need to click on the social media account they want to log in with. Thus, they will not have the scope of making mistakes while entering their login credentials. </p>\n<p>The feature might prove to be the most helpful for smartphone users. The reason is that sometimes it might be uncomfortable to type in info while you are traveling or are outside. Thus, you minimize the chance of losing customers<a href=\"https://www.loginradius.com/blog/identity/best-practices-choosing-good-security-questions/\"> who have forgotten their password</a> or choose not to log in as it would be inconvenient to type at the moment.</p>\n</li>\n<li><strong>You can expand your database and personalize your services</strong>: With the help of <strong>social login</strong>, you can get access to valuable data about the customer's preferences. Thus, you can personalize the content you share with them.</li>\n</ol>\n<p>The easier and more convenient it is for a user to log in to a website, the higher your conversion chances. Thus, as a marketer, you should be aware of how to utilize social login to improve the conversion rates for your company. Once you get the email IDs of the users, you can use them to send prospective customers push and email notifications as well.</p>\n<h2 id=\"how-to-drive-3x-engagement-with-push-and-email-notifications\" style=\"position:relative;\"><a href=\"#how-to-drive-3x-engagement-with-push-and-email-notifications\" aria-label=\"how to drive 3x engagement with push and email notifications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Drive 3X Engagement With Push and Email Notifications</h2>\n<p>The users who have enabled push notifications usually have approx three times the engagement rate than those who disabled the push notification. Thus, the push on mobile or email notifications plays a good role in engagement and re-engagement. </p>\n<p>What is the role of push notifications in our lives? There are many benefits that make it so popular. It keeps you in the know of what’s happening on your social media, or the latest offers on your eCommerce application. </p>\n<p>For example, you get a notification when someone likes or comments on your Facebook post or Instagram feed or when you get mentioned on Twitter. </p>\n<p>A significant impact of these notifications can be created when they engage inactive users too. </p>\n<h2 id=\"how-can-marketers-make-use-of-personalized-emails-to-boost-sales\" style=\"position:relative;\"><a href=\"#how-can-marketers-make-use-of-personalized-emails-to-boost-sales\" aria-label=\"how can marketers make use of personalized emails to boost sales permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How can Marketers Make Use of Personalized Emails to Boost Sales?</h2>\n<p>Marketers can use personalized emails to <a href=\"https://www.loginradius.com/blog/fuel/customer-relationship-business/\">build relationships with customers</a>. You can provide an engaging environment to the users by presenting notifications based on the knowledge of the relevant connections of the user. These notifications will let the users go back to the app again and reactivate. </p>\n<p>Thus, if used properly, <strong>social logins</strong> can boost conversion rates like no other authentication tool. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=advantage-social-login-as-marketer\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 12, 2021","updated_date":null,"description":"Using social login to drive sign-ups usually makes sense because it increases user privacy. If users like the site, they're more likely to return, and you're more likely to convert them into paying customers. This blog explains how social login can boost conversion rates.","title":"Can Social Login Boost Conversion Rates? 5 Things Marketers Should Know","tags":["social login","cx","data privacy"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.941747572815534,"src":"/static/316ac9f290dad44263d0056f8e80a6b9/58556/social-login-marketer.webp","srcSet":"/static/316ac9f290dad44263d0056f8e80a6b9/61e93/social-login-marketer.webp 200w,\n/static/316ac9f290dad44263d0056f8e80a6b9/1f5c5/social-login-marketer.webp 400w,\n/static/316ac9f290dad44263d0056f8e80a6b9/58556/social-login-marketer.webp 800w,\n/static/316ac9f290dad44263d0056f8e80a6b9/cc834/social-login-marketer.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"The existence of the Border Gateway Routing Protocol or BGP attacks is one of the primary reasons why transferring large volumes of…","fields":{"slug":"/identity/how-to-protect-business-bgp-hijacking/"},"html":"<p>The existence of the Border Gateway Routing Protocol or BGP attacks is one of the primary reasons why transferring large volumes of information across a network is possible today. BGP acts as a post office that analyses the logistics involved in transporting data from one part of the network to the other using the most optimal path. </p>\n<h2 id=\"history-of-bgp-hijacking\" style=\"position:relative;\"><a href=\"#history-of-bgp-hijacking\" aria-label=\"history of bgp hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>History of BGP Hijacking</h2>\n<p>Since the early 2000s, hackers have targeted and successfully infiltrated secure networks after hijacking the protocol. Upon gaining control of a network’s BGP, the hackers can redirect files or web traffic to their own devices. </p>\n<p>For example, a major BGP hijacking occurred in April of 2020, where over <a href=\"https://www.manrs.org/2020/04/not-just-another-bgp-hijack/\">8800 prefixes</a> were affected. These prefixes belonged to e-commerce giants like Amazon and Alibaba. This hijacking resulted in the disruption of servers across the world. Moreover, the complete estimate of how much data was infiltrated is still unknown.  </p>\n<p>Even tech giant Google is not immune to these attacks as a Chinese telecom company was allegedly behind the hijacking of 180 prefixes in 2018. Although the attack was small compared to other instances, it still resulted in the disruption of several Google services. This disruption was primarily seen in GSuite and Google search. </p>\n<h2 id=\"best-practices-to-prevent-and-mitigate-bgp-hijacking\" style=\"position:relative;\"><a href=\"#best-practices-to-prevent-and-mitigate-bgp-hijacking\" aria-label=\"best practices to prevent and mitigate bgp hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Prevent and Mitigate BGP Hijacking</h2>\n<p>BGP can be a liability that enterprises cannot ignore when it comes to <a href=\"https://www.loginradius.com/customer-security/\">enterprise security</a>. This is because it had dedicated security mechanisms in place until recently and instead required a company to put their trust in their ISP unless they maintain their autonomous system. </p>\n<p>In either case, the company or individual will have to ensure that there are measures to prevent or mitigate BGP hijacking. Most enterprises have turned to one of two security options. These include: </p>\n<h3 id=\"1-mutually-agreed-norms-for-routing-manrs\" style=\"position:relative;\"><a href=\"#1-mutually-agreed-norms-for-routing-manrs\" aria-label=\"1 mutually agreed norms for routing manrs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Mutually Agreed Norms For Routing (MANRS)</h3>\n<p>This is one of the more universally accepted routing <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">security measures</a> that are in use today. It is essentially a global initiative carried out by operators and enterprises to prevent route hijacking and other forms of DoS attacks. </p>\n<p>According to this initiative, most of the BGP hijacking incidents that have taken place to date occurred as a result of the following: </p>\n<p><strong>Prefix hijacking</strong></p>\n<p>This is the most common type of BGP hijacking, where there is an unauthorized takeover of IP addresses after hackers can corrupt internet routing tables or autonomous systems. </p>\n<p><strong>Route leaks</strong></p>\n<p>A route leak is often described as propagating or making a BGP announcement beyond the intended scope. In other words, the unauthorized party will announce prefixes changing the course of the web traffic to a destination that was not intended. </p>\n<p><strong>IP spoofing</strong></p>\n<p>This takes place when the hacker masquerades their device or entity as a legitimate one to gain access to files by redirecting them to a different IP address. </p>\n<p>To counter this, MANRS recommends implementing the following security measures: </p>\n<p><strong>Filtering</strong></p>\n<p>This measure can be introduced to ensure that the announcement of BGP routes is accurate and belongs to legitimate entities. Therefore, enterprises can secure inbound routing advertisements using prefix-level filters to filter out suspicious IP addresses. </p>\n<p><strong>Coordination:</strong></p>\n<p>This involves maintaining Regional Internet Registries (RIRs) that contain accurate and current contact information like NOC contacts. This will also include imposing authentication and authorization requirements on the maintainers to prevent the spread of misinformation. </p>\n<p><strong>Global validation</strong></p>\n<p>Network operators from around the world will have to release their data so that others can validate the routing information on a global scale. Therefore, this is a publicly documented routing policy for ASNs and prefixes. All information is stored on RIRs. </p>\n<p><strong>Anti-spoofing</strong></p>\n<p>This is a technique that is used to identify and drop information that has false IP addresses. The anti-spoofing filters which are used can deny service to spoofed IP addresses which try to gain access to a network. In most cases, if a packet coming from an external network contains an internal IP address, it gets blocked. </p>\n<p><a href=\"https://www.loginradius.com/resource/why-is-end-user-cyber-security-training-mandatory/\"><img src=\"/4223ac1e5bdbe1835a3d5aaf16ba1e76/WP-cybersecurty-training.webp\" alt=\"WP-cybersecurty-training\"></a></p>\n<h3 id=\"2-rpki-adoption\" style=\"position:relative;\"><a href=\"#2-rpki-adoption\" aria-label=\"2 rpki adoption permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. RPKI adoption</h3>\n<p>MANRS also recommends using Routing <a href=\"https://www.loginradius.com/blog/identity/pki-future-secure-communications/\">Public Key Infrastructure</a>, a security framework used to help internet service providers or operators make more informed decisions with regards to secure routing. </p>\n<p>Its main function is to prove the association between special IP address blocks. Doing so can reduce the occurrence of route leaks and mitigate the blast radius of any BGP hijacking incident.</p>\n<p>However, the only downside of RPKI adoption is that it can be significantly expensive for an ISP or an enterprise to introduce into their network. This is the reason why only a minority of the world’s network adopts an RPKI. </p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>The reliance on BGP can be a double-edged sword as, on the one hand, it can be extremely convenient, while on the other, it can have major security lapses. However, enterprises and ISPs can drastically reduce the risk of BGP hijacking by adopting the aforementioned safe practices. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-to-protect-business-bgp-hijacking\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 12, 2021","updated_date":null,"description":"The reliance on BGP can be a double-edged sword as, on the one hand, it can be extremely convenient, while on the other, it can have major security lapses. However, enterprises can drastically reduce the risk by adopting the practices mentioned in the blog.","title":"How to Mitigate BGP Attacks and Secure Your User's Data","tags":["enterprise security","cybersecurity"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7391304347826086,"src":"/static/8220c688456ad631244703ae9a6ef340/58556/bgp-attacks.webp","srcSet":"/static/8220c688456ad631244703ae9a6ef340/61e93/bgp-attacks.webp 200w,\n/static/8220c688456ad631244703ae9a6ef340/1f5c5/bgp-attacks.webp 400w,\n/static/8220c688456ad631244703ae9a6ef340/58556/bgp-attacks.webp 800w,\n/static/8220c688456ad631244703ae9a6ef340/cc834/bgp-attacks.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"User experience is the key to business success in today’s digital era, where consumers are always on a hunt for rich experiences every time…","fields":{"slug":"/growth/customize-marketing-programs-on-consumer-journey/"},"html":"<p>User experience is the key to business success in today’s digital era, where consumers are always on a hunt for rich experiences every time they interact with a brand. </p>\n<p>However, creating a good user experience isn’t the need of the hour; instead, creating a personalized consumer journey is what businesses need the most. </p>\n<p>A <a href=\"https://www.accenture.com/t20180503T034117Z__w__/nl-en/_acnmedia/PDF-77/Accenture-Pulse-Survey.pdf\">survey by Accenture Interactive</a> found that 48% of consumers have switched from one service provider to another just because the former lacked personalization—and the trend is swiftly increasing.</p>\n<p>This means that businesses that aren’t leveraging personalization for their consumers would surely stand behind their competitors. </p>\n<p>However, businesses need data as their primary fuel for creating customized consumer journeys. This data can only be extracted through a cutting-edge consumer identity and access management (CIAM) solution. </p>\n<p>Yes, a new-age CIAM solution like LoginRadius helps businesses get valuable insights regarding consumer behavior that helps channel your resources to the right audience with relevant, targeted marketing communication campaigns. </p>\n<p>Let’s understand how a <a href=\"https://www.loginradius.com/blog/fuel/consumer-journey-from-sign-up-to-purchase/\">personalized consumer journey</a> can help businesses stay ahead of the curve and how a CIAM solution like LoginRadius offers valuable insights for creating personalized user experiences. </p>\n<h2 id=\"why-personalized-consumer-journey-matters\" style=\"position:relative;\"><a href=\"#why-personalized-consumer-journey-matters\" aria-label=\"why personalized consumer journey matters permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Personalized Consumer Journey Matters?</h2>\n<p>Every consumer that lands on a website or downloads a mobile app has to go through a sign-up process, which decides whether a company is getting a loyal consumer or just another random user. </p>\n<p>Hence, it’s crucial for businesses to leverage user data's true potential to deliver the experience that users demand. </p>\n<p>Whether it’s personalized suggestions based on previous search history or recommendations of products based on their interests, brands can build credibility and further enhance user engagement for more conversions. </p>\n<p>But why is it so important to provide instant recommendations or personalized experiences to users when they interact for the first time with a brand? </p>\n<p>Well, consumers are already interacting with established brands, including Apple, Amazon, Microsoft, and Google; they know what personalized rich consumer experiences mean. Hence they expect something near to it. </p>\n<p>As a vendor, if you have the data regarding the buyer’s behavior, you can pitch exactly the same product or service for which they have landed. </p>\n<p><a href=\"https://www.loginradius.com/resource/making-customers-feel-seen-in-an-omnichannel-world/\"><img src=\"/d5d452c185b8b02d0349db4bfacccd22/EB-omnichannel.webp\" alt=\"EB-omnichannel\"></a></p>\n<h2 id=\"how-loginradius-helps-build-personalized-consumer-journeys\" style=\"position:relative;\"><a href=\"#how-loginradius-helps-build-personalized-consumer-journeys\" aria-label=\"how loginradius helps build personalized consumer journeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helps Build Personalized Consumer Journeys?</h2>\n<p>Businesses need to pay close attention to consumer experience, the total of digital and in-person interactions that a user has with a brand.</p>\n<p>At baseline, a good consumer experience needs to work to deliver products and services with minimal fuss.</p>\n<p>And if a business wants to pull out and stay ahead of the curve, that experience needs to be remarkable, personal, and delightful. </p>\n<p>With a smart CIAM like <a href=\"https://www.loginradius.com/\">LoginRadius</a>, businesses can collect user data over time that can be used to create marketing strategies as enterprises understand whom they should target. Moreover, you can successfully target your customer base with data collected and organized in the Admin Console. The LoginRadius Identity Platform makes complex customer analytics easy to understand via detailed graphs and customer insights.</p>\n<p>Also, enterprises can export data visualization elements, including graphs and pie charts, to Microsoft Excel by just clicking a button. Customer analytics has never been much easier with LoginRadius Admin Console as it also supports effortless integration with renowned insights and analytics applications for enhanced data visualization. </p>\n<h2 id=\"understand-customer-behaviour-over-time\" style=\"position:relative;\"><a href=\"#understand-customer-behaviour-over-time\" aria-label=\"understand customer behaviour over time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understand Customer Behaviour Over Time</h2>\n<p>Leverage the power of data with over 30 charts within customizable date ranges with LoginRadius.</p>\n<p>The smart CIAM lets you expand your understanding of customer activity over different periods of your sales or season cycles.</p>\n<p>What’s more remarkable is that you can export data visualization elements to third-party applications for in-depth data analysis that further helps in creating winning strategies. </p>\n<p>Customer analytics has never been more accessible with the LoginRadius Admin Console. </p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\">Download Digital Identity Trend Report</a> for detailed information regarding opportunities and risks within the identity environment through our comprehensive customer behavior analysis.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Consumer data can help businesses craft personalized consumer journeys that not only ensure improved conversion rates but eventually help them get more returning customers. </p>\n<p>With a <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/#:~:text=Customer%20identity%20and%20access%20management%20(CIAM)%20is%20a%20digital%20identity,while%20securely%20managing%20customer%20identities.\">consumer identity and access management (CIAM)</a> solution in place, enterprises can yield better results by creating rich, personalized user experiences that help engage potential clients and increase the chances of conversions. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=customize-marketing-programs-on-consumer-journey\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 10, 2021","updated_date":null,"description":"Personalized consumer experience is becoming the need of the hour. Let’s understand how a personalized consumer journey can help businesses stay ahead of the curve and how a CIAM solution like LoginRadius offers valuable insights for creating personalized user experiences.","title":"Why You Should Customize Your Marketing Programs Based on Consumer Journey","tags":["ciam solution","cx","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6528925619834711,"src":"/static/a88956f735416a085d5fe6ac8eea51fe/58556/customer-marketing.webp","srcSet":"/static/a88956f735416a085d5fe6ac8eea51fe/61e93/customer-marketing.webp 200w,\n/static/a88956f735416a085d5fe6ac8eea51fe/1f5c5/customer-marketing.webp 400w,\n/static/a88956f735416a085d5fe6ac8eea51fe/58556/customer-marketing.webp 800w,\n/static/a88956f735416a085d5fe6ac8eea51fe/cc834/customer-marketing.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are…","fields":{"slug":"/identity/3-stages-gartner-carta-it-security/"},"html":"<p>IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are just a loophole away. </p>\n<p>CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner in 2017 that helps cybersecurity experts ensure a stringent mechanism to handle vulnerabilities. </p>\n<p>Businesses embarking on a <a href=\"https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/\">digital transformation journey</a> shouldn’t overlook security since data breaches cause losses worth millions of dollars every year and eventually tarnishes brand repute. </p>\n<p>This post will cover all aspects of CARTA and how businesses can implement it to ensure robust cybersecurity. </p>\n<h2 id=\"what-is-carta-how-does-it-benefit-businesses\" style=\"position:relative;\"><a href=\"#what-is-carta-how-does-it-benefit-businesses\" aria-label=\"what is carta how does it benefit businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is CARTA? How Does it Benefit Businesses?</h2>\n<p>Gartner, an information technology (IT) research and consultancy company, introduced CARTA back in 2017. CARTA is an approach built on <a href=\"https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/\">adaptive security architecture</a> that helps businesses manage risks associated with security. </p>\n<p>CARTA ensures businesses employ a consistent, up-to-date approach to cybersecurity in the ever-increasing digital landscape where we’re interconnected with millions of devices.</p>\n<p>Since digitalization offers endless opportunities and business advancements through efficiency and accessibility, the fact that specific vulnerabilities are associated with it can’t be overlooked. </p>\n<p>Here’s where enterprises need to adopt a robust approach to manage the risks successfully. CARTA allows businesses to make more informed decisions through the degree of trust and depth of a risk. </p>\n<h2 id=\"carta-approach\" style=\"position:relative;\"><a href=\"#carta-approach\" aria-label=\"carta approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CARTA Approach</h2>\n<p>CARTA stipulates various aspects for cybersecurity and risk management, including: </p>\n<ul>\n<li>Continuous monitoring, assessment, and immediate response for remediation of an underlying risk</li>\n<li>100% device visibility</li>\n<li>Automated control</li>\n<li>Micro-segmentation for containing data breaches </li>\n<li>Adequate security management for IoT devices </li>\n<li>Risk and trust shouldn’t be static </li>\n</ul>\n<h2 id=\"stages-of-it-security-for-implementation-of-carta\" style=\"position:relative;\"><a href=\"#stages-of-it-security-for-implementation-of-carta\" aria-label=\"stages of it security for implementation of carta permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stages of IT Security for Implementation of CARTA</h2>\n<p>According to Gartner, CARTA can be applied in three 3 diverse IT phases to monitor and assess continuously. These include Run, Plan, and Build. </p>\n<p>Let’s understand these phases where businesses can implement CARTA. </p>\n<ul>\n<li><strong>Run:</strong> Organizations utilize intelligent analytics to detect anomalies and to detect the baseline in the run phase. This helps organizations notice and respond to security incidents rapidly without hampering the overall security mechanisms. Automated solutions for the run phase can help enhance evaluations through valuable insights driving more success. </li>\n<li><strong>Build:</strong> Since organizations utilize public libraries for creating personalized, efficient, and updated cybersecurity solutions, CARTA dictates they analyze these libraries for security risks before implementing them carefully. </li>\n<li><strong>Planning:</strong> Before implementing IT security solutions, businesses must carefully focus on their priorities and assets. They must plan their budget and roadmap early to ensure better decisions in the long run. </li>\n</ul>\n<p><strong>Also Download</strong>: <a href=\"https://www.loginradius.com/resource/adaptive-authentication-in-the-age-of-digital-apocalypse/\">Adaptive Authentication in the Age of Digital Apocalypse</a></p>\n<p>In a nutshell, CARTA ensures organizations manage the risks associated with the digital world by emphasizing and developing security mechanisms that are continuously monitoring and assessing every aspect.  </p>\n<p>Through a simplistic view of the digital world, organizations can protect their assets by analyzing what is good and bad well in advance and taking the necessary steps to prevent any harm. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Every business in the digital landscape is prone to several security threats if stringent security measures aren’t in place. </p>\n<p>CARTA’s risk reduction model is <a href=\"https://www.loginradius.com/on-premises-deployment/\">built on the premise</a> that everything should be assessed and monitored and eventually proposes a revolutionary security and risk management mindset for the upcoming decade. </p>\n<p>Hence, businesses striving to implement the best security practices must consider relying on CARTA for enhanced risk management for their organization.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=3-stages-gartner-carta-it-security\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 10, 2021","updated_date":null,"description":"CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner to help cybersecurity experts ensure a stringent mechanism to handle vulnerabilities.","title":"3 Best Stages of IT Security for Implementing Gartner's CARTA","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/d61f7309ee63ba983095bdd0735a4454/58556/carta.webp","srcSet":"/static/d61f7309ee63ba983095bdd0735a4454/61e93/carta.webp 200w,\n/static/d61f7309ee63ba983095bdd0735a4454/1f5c5/carta.webp 400w,\n/static/d61f7309ee63ba983095bdd0735a4454/58556/carta.webp 800w,\n/static/d61f7309ee63ba983095bdd0735a4454/cc834/carta.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"In this tutorial, you'll learn how to easily convert an OpenCV project into a web app that you can showcase. You'll use a library called…","fields":{"slug":"/engineering/guest-post/opencv-web-app-with-streamlit/"},"html":"<p>In this tutorial, you'll learn how to easily convert an OpenCV project into a web app that you can showcase. You'll use a library called Streamlit, which helps you easily build a web user interface in Python. Yes, you heard it right — no HTML, CSS, or JavaScript required. Just Python!</p>\n<h2 id=\"prerequisites\" style=\"position:relative;\"><a href=\"#prerequisites\" aria-label=\"prerequisites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prerequisites</h2>\n<ul>\n<li>You should be comfortable using basic <a href=\"https://opencv.org/\">OpenCV</a> functions.</li>\n<li>You should be comfortable coding in Python.</li>\n</ul>\n<p>Let's get started.</p>\n<h2 id=\"install-dependencies\" style=\"position:relative;\"><a href=\"#install-dependencies\" aria-label=\"install dependencies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Install Dependencies</h2>\n<p>Install OpenCV and Streamlit using pip. You would also need Pillow — another image library.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"py\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">pip install opencv-python streamlit Pillow</span></span></code></pre>\n<blockquote>\n<p>If you use Python 2.7, note that OpenCV doesn't directly support Python 2.7 in their latest versions. Accordingly, you have to specify an older version like this <code>pip install opencv-python==4.2.0.32</code></p>\n</blockquote>\n<h2 id=\"create-a-small-opencv-project\" style=\"position:relative;\"><a href=\"#create-a-small-opencv-project\" aria-label=\"create a small opencv project permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a Small OpenCV Project</h2>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"py\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> cv2</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">brighten_image</span><span class=\"mtk1\">(</span><span class=\"mtk12\">image</span><span class=\"mtk1\">, </span><span class=\"mtk12\">amount</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    img_bright = cv2.convertScaleAbs(image, </span><span class=\"mtk12\">beta</span><span class=\"mtk1\">=amount)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> img_bright</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">blur_image</span><span class=\"mtk1\">(</span><span class=\"mtk12\">image</span><span class=\"mtk1\">, </span><span class=\"mtk12\">amount</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    img = cv2.cvtColor(image, </span><span class=\"mtk7\">1</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    blur_img = cv2.GaussianBlur(img, (</span><span class=\"mtk7\">11</span><span class=\"mtk1\">, </span><span class=\"mtk7\">11</span><span class=\"mtk1\">), amount)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> blur_img</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">enhance_details</span><span class=\"mtk1\">(</span><span class=\"mtk12\">img</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    hdr = cv2.detailEnhance(img, </span><span class=\"mtk12\">sigma_s</span><span class=\"mtk1\">=</span><span class=\"mtk7\">12</span><span class=\"mtk1\">, </span><span class=\"mtk12\">sigma_r</span><span class=\"mtk1\">=</span><span class=\"mtk7\">0.15</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> hdr</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">img = cv2.imread(</span><span class=\"mtk12\">filename</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&#39;tony_stark.webp&#39;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\"># do some cool image processing stuff</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">img = enhance_details(img)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">img = brighten_image(img, </span><span class=\"mtk12\">amount</span><span class=\"mtk1\">=</span><span class=\"mtk7\">25</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">img = blur_image(img, </span><span class=\"mtk12\">amount</span><span class=\"mtk1\">=</span><span class=\"mtk7\">0.2</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">cv2.imshow(</span><span class=\"mtk8\">&#39;Tony Stark&#39;</span><span class=\"mtk1\">, img)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">cv2.waitKey(</span><span class=\"mtk7\">0</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">cv2.destroyAllWindows()</span></span></code></pre>\n<p>Here are three image processing functions that accept an image, do some processing, and return the processed image.</p>\n<ol>\n<li><code>brighten_image</code> — increases the brightness of the image.</li>\n<li><code>blur_image</code> — applies a blur effect on the image.</li>\n<li><code>enhance_details</code> — applies an effect to enhance the details of the image.</li>\n</ol>\n<p>These functions make use of the OpenCV functions to do the actual processing — for e.g.: cv2.GaussianBlur, etc. I'm not explaining in-depth about them and the various parameters they accept since this tutorial is more focused on integrating OpenCV with Streamlit. However, feel free to jump to the OpenCV documentation to know more details about them. </p>\n<p>This program reads the image from the <code>filepath</code> using <code>cv2.imread()</code>; then, it passes the image to these functions that do the processing. Finally, the image is displayed using <code>cv2.imshow()</code>. <code>cv2.waitKey(0)</code> is to wait till the user presses any key, after which the program is exited.</p>\n<h2 id=\"streamlit-basics\" style=\"position:relative;\"><a href=\"#streamlit-basics\" aria-label=\"streamlit basics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Streamlit Basics</h2>\n<p>Streamlit offers some common UI components out of the box that you can place on your webpage. This makes it super easy to code up something real quick. The way Streamlit works is that it reruns the Python script every time a user interacts with the components. They have some caching and optimizations, but this simple design makes it easy to build interactive webpages using Streamlit.</p>\n<blockquote>\n<p>Someone said, “Talk is cheap. Show me the code.” So, let's see some code.</p>\n</blockquote>\n<p>Open an editor and copy-paste this to <code>demo-app.py</code></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"py\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> streamlit </span><span class=\"mtk15\">as</span><span class=\"mtk1\"> st</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">st.title(</span><span class=\"mtk8\">&quot;OpenCV Demo App&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">st.subheader(</span><span class=\"mtk8\">&quot;This app allows you to play with Image filters!&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">st.text(</span><span class=\"mtk8\">&quot;We use OpenCV and Streamlit for this demo&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">if</span><span class=\"mtk1\"> st.checkbox(</span><span class=\"mtk8\">&quot;Main Checkbox&quot;</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    st.text(</span><span class=\"mtk8\">&quot;Check Box Active&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">slider_value = st.slider(</span><span class=\"mtk8\">&quot;Slider&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">min_value</span><span class=\"mtk1\">=</span><span class=\"mtk7\">0.5</span><span class=\"mtk1\">, </span><span class=\"mtk12\">max_value</span><span class=\"mtk1\">=</span><span class=\"mtk7\">3.5</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">st.text(</span><span class=\"mtk4\">f</span><span class=\"mtk8\">&quot;Slider value is </span><span class=\"mtk4\">{</span><span class=\"mtk1\">slider_value</span><span class=\"mtk4\">}</span><span class=\"mtk8\">&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">st.sidebar.text(</span><span class=\"mtk8\">&quot;text on side panel&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">st.sidebar.checkbox(</span><span class=\"mtk8\">&quot;Side Panel Checkbox&quot;</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>To start a streamlit app, simply run the command <code>streamlit run</code> with the filename — for example:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"py\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">streamlit run demo-app.py</span></span></code></pre>\n<p>You should get a similar output as follows. </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  You can now view your Streamlit app in your browser.</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">  Local URL: http://localhost:8501</span>\n<span class=\"grvsc-line\">  Network URL: http://192.168.1.8:8501</span></code></pre>\n<p>Click on the links in the output to open the Streamlit app in your browser. You'll see something as follows. </p>\n<p><img src=\"/9202979fe96eb015f5209a8591dbc320/streamlit-1.webp\" alt=\"Streamlit basic web app\" title=\"Streamlit Basic Demo\"></p>\n<p>If you see the code, it's very straightforward. It imports streamlit as st. The default is a simple linear layout where you can place components on the webpage in a sequential manner.</p>\n<p>For example, <code>st.title() , st.checkbox(), st.slider()</code> places the components on the main page in the order they're called.. </p>\n<p>Streamlit also offers a side panel. In order to place components in the sidepanel, you can do as follows:</p>\n<p><code>st.sidebar.title() , st.sidebar.checkbox(), st.sidebar.slider()</code></p>\n<p>There are other components also apart from these. You can <a href=\"https://docs.streamlit.io/library/get-started\">explore more in the docs</a>.</p>\n<h2 id=\"integrate-streamlit-into-your-opencv-project\" style=\"position:relative;\"><a href=\"#integrate-streamlit-into-your-opencv-project\" aria-label=\"integrate streamlit into your opencv project permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Integrate Streamlit into Your OpenCV Project</h2>\n<p>Let's integrate your OpenCV program into Streamlit. Here is the complete code:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"py\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> cv2</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> streamlit </span><span class=\"mtk15\">as</span><span class=\"mtk1\"> st</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> numpy </span><span class=\"mtk15\">as</span><span class=\"mtk1\"> np</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">from</span><span class=\"mtk1\"> PIL </span><span class=\"mtk15\">import</span><span class=\"mtk1\"> Image</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">brighten_image</span><span class=\"mtk1\">(</span><span class=\"mtk12\">image</span><span class=\"mtk1\">, </span><span class=\"mtk12\">amount</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    img_bright = cv2.convertScaleAbs(image, </span><span class=\"mtk12\">beta</span><span class=\"mtk1\">=amount)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> img_bright</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">blur_image</span><span class=\"mtk1\">(</span><span class=\"mtk12\">image</span><span class=\"mtk1\">, </span><span class=\"mtk12\">amount</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    blur_img = cv2.GaussianBlur(image, (</span><span class=\"mtk7\">11</span><span class=\"mtk1\">, </span><span class=\"mtk7\">11</span><span class=\"mtk1\">), amount)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> blur_img</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">enhance_details</span><span class=\"mtk1\">(</span><span class=\"mtk12\">img</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    hdr = cv2.detailEnhance(img, </span><span class=\"mtk12\">sigma_s</span><span class=\"mtk1\">=</span><span class=\"mtk7\">12</span><span class=\"mtk1\">, </span><span class=\"mtk12\">sigma_r</span><span class=\"mtk1\">=</span><span class=\"mtk7\">0.15</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> hdr</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">def</span><span class=\"mtk1\"> </span><span class=\"mtk11\">main_loop</span><span class=\"mtk1\">():</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    st.title(</span><span class=\"mtk8\">&quot;OpenCV Demo App&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    st.subheader(</span><span class=\"mtk8\">&quot;This app allows you to play with Image filters!&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    st.text(</span><span class=\"mtk8\">&quot;We use OpenCV and Streamlit for this demo&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    blur_rate = st.sidebar.slider(</span><span class=\"mtk8\">&quot;Blurring&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">min_value</span><span class=\"mtk1\">=</span><span class=\"mtk7\">0.5</span><span class=\"mtk1\">, </span><span class=\"mtk12\">max_value</span><span class=\"mtk1\">=</span><span class=\"mtk7\">3.5</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    brightness_amount = st.sidebar.slider(</span><span class=\"mtk8\">&quot;Brightness&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">min_value</span><span class=\"mtk1\">=-</span><span class=\"mtk7\">50</span><span class=\"mtk1\">, </span><span class=\"mtk12\">max_value</span><span class=\"mtk1\">=</span><span class=\"mtk7\">50</span><span class=\"mtk1\">, </span><span class=\"mtk12\">value</span><span class=\"mtk1\">=</span><span class=\"mtk7\">0</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    apply_enhancement_filter = st.sidebar.checkbox(</span><span class=\"mtk8\">&#39;Enhance Details&#39;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    image_file = st.file_uploader(</span><span class=\"mtk8\">&quot;Upload Your Image&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">type</span><span class=\"mtk1\">=[</span><span class=\"mtk8\">&#39;jpg&#39;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&#39;png&#39;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&#39;jpeg&#39;</span><span class=\"mtk1\">])</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> </span><span class=\"mtk4\">not</span><span class=\"mtk1\"> image_file:</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk4\">None</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    original_image = Image.open(image_file)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    original_image = np.array(original_image)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    processed_image = blur_image(original_image, blur_rate)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    processed_image = brighten_image(processed_image, brightness_amount)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> apply_enhancement_filter:</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        processed_image = enhance_details(processed_image)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    st.text(</span><span class=\"mtk8\">&quot;Original Image vs Processed Image&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    st.image([original_image, processed_image])</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">if</span><span class=\"mtk1\"> </span><span class=\"mtk12\">__name__</span><span class=\"mtk1\"> == </span><span class=\"mtk8\">&#39;__main__&#39;</span><span class=\"mtk1\">:</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    main_loop()</span></span></code></pre>\n<p><strong>Let's understand what's happening here.</strong></p>\n<p>Apart from the image processing functions, you have a 'main_loop' function to add the logic for the webpage.</p>\n<p>Nothing fancy about <code>st.title(), st.subheader(), st.text()</code> — they just print some text in different sizes.</p>\n<p>Next, there are two sliders to get the amount by which you need to apply the blur and brightness filters.</p>\n<p>Note that <code>st.sidebar</code> places these components in the sidebar.</p>\n<p><code>slider()</code> takes in some arguments: name of the slider, min value, max value, and the default value of the slider. This function returns the current value of the slider.</p>\n<p>Next, there's a checkbox component.</p>\n<p><code>checkbox()</code> returns <em>True</em> if the checkbox is checked; else, it would return <em>False</em>.</p>\n<p>Next, there's a <code>file_uploader</code> component, through which users can upload files of different types specified by the <code>type</code> parameter. Here, it's restricted to the image file types needed for the demo usecase.</p>\n<p>When the program starts, there are no files selected by the user. At this time, this component returns <em>None</em>. When a file is uploaded from the UI, this component returns the path of the file. </p>\n<p>This is why there's an if-check on the return value of this component. If no files are selected, you can skip the rest of the program by returning from the <code>main_loop()</code> function.</p>\n<p>Remember that the entire program is rerun whenever there's user interaction on any components of the page. When a user uploads a file, the whole program is executed again — and the if-check fails so that the program executes the image processing logic.</p>\n<p><code>Pillow.Image()</code> is used to open this file, then it's converted to a numpy array using <code>np.array()</code> so that OpenCV can process it.</p>\n<p>Now, it's passed to the different processing functions along with the <code>amount</code> parameter.</p>\n<p>Finally, the program displays the original and processed images using the <code>st.image()</code> component.</p>\n<p>The web app is ready! </p>\n<p>To start the app, simply run:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">streamlit run demo-app.py</span></code></pre>\n<p>Now you can play with the filters. Of course, these are some basic filters, but you can extend it to more interesting filters — like cartoonify filters, etc. — using the rich features of OpenCV.</p>\n<p><img src=\"/8a3adfc96648a8ef90ba512e93ba1648/streamlit-final.webp\" alt=\"Streamlit final Screenshot\" title=\"Streamlit OpenCV Webapp\"></p>\n<h2 id=\"how-to-publish-your-app\" style=\"position:relative;\"><a href=\"#how-to-publish-your-app\" aria-label=\"how to publish your app permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Publish Your App?</h2>\n<p>To publish your app, you need to host this program somewhere. There are different hosting providers for complex projects. But for this hobby project, is there a simple and quick solution?</p>\n<p>Yes, there's one!</p>\n<p>You can host the Streamlit application in <a href=\"https://streamlit.io/cloud\">Streamlit Cloud</a> for free. You can host up to 3 apps in an account for free with up to 1GB of memory.</p>\n<p>Check out this tutorial from the community to host your app in Streamlit Cloud.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>You can find the source code for this tutorial <a href=\"https://github.com/LoginRadius/engineering-blog-samples/tree/master/Python/OpenCV-Streamlit-Integration\">here</a>. The web app discussed above is <a href=\"https://share.streamlit.io/dingusagar/opencv-streamlit-demo/main/demo-app.py\">hosted here</a> if you want to try it out.</p>\n<p>Want to add user authentication and registration in your app quickly? Check out the <a href=\"https://www.loginradius.com/integrations/python/\">LoginRadius Python integration</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk3 { color: #6A9955; }\n</style>","frontmatter":{"date":"November 10, 2021","updated_date":null,"description":"You can now easily publish your OpenCV apps to the web using Streamlit, a Python library. Follow this tutorial to learn the process step by step.","title":"How to Build an OpenCV Web App with Streamlit","tags":["OpenCV","Streamlit","Python"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/818e31111fb212b94c72ff9edb09bd3f/58556/coverimage.webp","srcSet":"/static/818e31111fb212b94c72ff9edb09bd3f/61e93/coverimage.webp 200w,\n/static/818e31111fb212b94c72ff9edb09bd3f/1f5c5/coverimage.webp 400w,\n/static/818e31111fb212b94c72ff9edb09bd3f/58556/coverimage.webp 800w,\n/static/818e31111fb212b94c72ff9edb09bd3f/99238/coverimage.webp 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Dingu Sagar","github":"dingusagar","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":366,"currentPage":62,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}