{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/96","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Overview UniFi is a community of wireless access points, switches, routers, controller devices, VoIP phones, and access control products. It…","fields":{"slug":"/engineering/introduction-to-unifi-ubiquiti-network/"},"html":"<h2 id=\"overview\" style=\"position:relative;\"><a href=\"#overview\" aria-label=\"overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Overview</h2>\n<p>UniFi is a community of wireless access points, switches, routers, controller devices, VoIP phones, and access control products. It can be used for the corporate network and also for the home network. An Unifi network controller manages all the equipment in the UNIFI network. The best part of the Unifi network is that its controller can be hosted online with a Ubiquiti account using an Unifi Cloud Key, giving online access to the network to manage the Unifi devices and the connected client so can handle most of the operations remotely.</p>\n<h2 id=\"common-network-architecture\" style=\"position:relative;\"><a href=\"#common-network-architecture\" aria-label=\"common network architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Network Architecture</h2>\n<p><img src=\"/c3e6e550b445d3320a7c88a8397e1cf7/networkdiagram.webp\" alt=\"networkdiagram\"></p>\n<h2 id=\"benefits-of-ubiquiti-unifi-network\" style=\"position:relative;\"><a href=\"#benefits-of-ubiquiti-unifi-network\" aria-label=\"benefits of ubiquiti unifi network permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Ubiquiti UniFi Network</h2>\n<ol>\n<li><strong>Easy Deployment</strong></li>\n</ol>\n<p>Having an UniFi Controller on the cloud allows us easy deployment of hardware. On any UniFi network where we have UniFi Security Gateway (USG) Installed, any UniFi equipment plugged into the network is immediately recognized by the Unifi Controller and is also ready for adoption. Whenever the controller adopts the device, the device receives the correct configuration and comes up in the network within a short period.</p>\n<ol start=\"2\">\n<li><strong>Reduced Operating and Hardware Cost</strong></li>\n</ol>\n<p>UniFi devices are ideal and helpful for most small and <a href=\"https://www.loginradius.com/startups/\"><b>startups businesses</b></a> and even for some medium-sized businesses because they don't need the extra cost to buy high-priced products like cisco enterprise equipment. Businesses can achieve almost the same performance with Ubiquiti products. Many products have advanced enterprise hardware that is not even needed, so Ubiquiti is useful for smaller businesses that want enterprise-grade equipment.</p>\n<ol start=\"3\">\n<li><strong>Simplified Length of Service</strong></li>\n</ol>\n<p>UniFi products are built to be controlled remotely and its easy to <a href=\"https://www.loginradius.com/blog/fuel/2021/02/tips-managing-remote-team/\"><b>leading and managing remote teams</b></a>. All the Unifi products are designed with upgrades in mind, and they keep getting updates over some time for the new feature upgradation and the bug fixes.</p>\n<ol start=\"4\">\n<li><strong>Total Visibility</strong></li>\n</ol>\n<p>In the UniFi network, the user can see everything going on in their network, from connected clients, total traffic to speed and throughput tests to information broken down into individual protocol using deep packet inspection available right in the UniFi Controller. UniFi Controller offers information about your network, how it is being used, and that insight can optimize the network for better efficiency. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Having an Unifi network at the office or home can be more satisfying in deploying the devices and monitoring the network.  An Unifi controller gives transparency to the network.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 15, 2021","updated_date":null,"description":"Getting started with Unifi Network for getting the freedom of remote management of network devices. Here's what you need to know about UniFi network.","title":"Introduction to UniFi Ubiquiti Network","tags":["Network","Unifi Networking","Remote Team Management","Startups Solutions"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/58556/cover.webp","srcSet":"/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/61e93/cover.webp 200w,\n/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/1f5c5/cover.webp 400w,\n/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/58556/cover.webp 800w,\n/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/99238/cover.webp 1200w,\n/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/7c22d/cover.webp 1600w,\n/static/2ff418c0c1e6bfb2008ec62fd34e6cd3/c3d7c/cover.webp 6016w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Roshan Jangid","github":"roshan-jangid","avatar":null}}}},{"node":{"excerpt":"The equation of ideal business growth includes not just the acquisition of new customers but also the retention of already existing…","fields":{"slug":"/growth/how-customer-retention-can-help-businesses-grow/"},"html":"<p>The equation of ideal business growth includes not just the acquisition of new customers but also the retention of already existing customers. While you may acquire new customers based on effective marketing strategies, the loss of existing customers due to the potential lack of engagement with them can shake your business's base. This highlights the importance of customer retention for business management as well as growth.</p>\n<h2 id=\"what-is-customer-retention\" style=\"position:relative;\"><a href=\"#what-is-customer-retention\" aria-label=\"what is customer retention permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Customer Retention</h2>\n<p>Customer retention can simply be seen as a company's ability to maintain its existing customers by establishing strong relationships with them. Although this might sound like an easy task, customer retention is a complex process. This is because maintaining the existing customer base requires an increased level of active participation and <a href=\"https://www.loginradius.com/blog/fuel/2021/02/consumer-management-to-consumer-engagement/\">consumer engagement</a>  than acquiring new customers.</p>\n<p>Customer acquisition can be way more expensive and tedious than the cheaper and effective process of customer retention. The reason mainly lies in the fact that starting from scratch to generate progress demands effort, but maintaining progress requires consistency in the long run.</p>\n<p>Now, this raises the question, \"what is the 'ideal' customer retention rate? How many customers should be retained on average? It is important to understand that there is no ideal retention rate as it varies across industries. However, <a href=\"https://www.statista.com/statistics/1041645/customer-retention-rates-by-industry-worldwide/\">research</a> has proved that these rates can vary from 55% to 84%. This suggests that you should set your expectations for retaining customers accordingly.</p>\n<p>The purpose of customer retention programs and strategies is to increase the customer lifetime value (LTV). This value determines the total revenue generated from a customer's relationship with the company throughout their lifetime. Many strategies have been developed and refined over the years, mainly because the importance of customer retention has doubled in the digital era. These strategies work towards a simple goal of making the customers stay engaged with your company which will further boost its overall revenue and value in the market.</p>\n<h2 id=\"importance-of-customer-retention-in-2021\" style=\"position:relative;\"><a href=\"#importance-of-customer-retention-in-2021\" aria-label=\"importance of customer retention in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Importance of Customer Retention in 2021</h2>\n<p>With the increase in the e-commerce business and social media promotions, companies have recognized that <a href=\"https://hiverhq.com/blog/inspire-lifelong-customer-loyalty\">increasing loyal customers</a> is inevitable. Especially the COVID-19 lockdown has shed light on the changing consumer behaviors.</p>\n<p>The most observable of these changes is the heightened use of social media and online websites for buying the product and service that can even be bought from the basic offline markets. Consumers no longer buy anything for the sake of it or pick random products. This is because people don't merely buy a product. They also add an asset of value to their life. They are a click away from switching to a new company that matches their needs and demands.</p>\n<p>A customer-oriented vision  of a business can make it more sensitive and attentive to its customers' needs, which in turn makes it more resilient to the competitors  in the market. Thus, important customer retention benefits can help you recognize the trend of product development and refinement in the market to increase your company's retention rate.</p>\n<p>Today, more people are planning to invest in start-ups, making it necessary for entrepreneurs to improve customer retention as a top-most goal. It also boosts the Return on Investment (ROI) without putting the company at a loss.</p>\n<p>A good retention rate  signifies an increased revenue generation, higher levels of customer satisfaction, and customer loyalty. A study has highlighted that engaged customers are likely to produce <a href=\"https://www.researchgate.net/publication/285927801_Customer_Retention\">1.7 times more revenue</a> than general customers. Engaged employees and consumers can produce as much as 3.4 times the average revenue. Loyal customers can increase the overall revenue more than one-time customers and acts as a protective factor against the rainy days and the ever-increasing market competition.</p>\n<p><a href=\"https://www.loginradius.com/blog/fuel/2021/02/customer-relationship-business/\">Customer relationship</a> would help you strengthen the bonds with your customers by providing them with genuine services and valuable products. Similar products may be offered by all the other brands, too. Still, the elements of customer feedback and follow-ups can guide you in differentiating your services from the mainstream market.</p>\n<h2 id=\"customer-retention-management-strategies\" style=\"position:relative;\"><a href=\"#customer-retention-management-strategies\" aria-label=\"customer retention management strategies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customer Retention Management Strategies</h2>\n<p>Customer retention strategies aim to maintain the existing customer base, which is the after-process of providing services to your customers. These strategies strengthen customer relationships, which can increase their engagement with the organization.</p>\n<p>It is important to note that none of these strategies should be considered enough in isolation. They serve different purposes and goals to collectively increase the customer retention rate if implemented consistently and accurately.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-consumer-audit-trail\"><img src=\"/3415fb3613a33348a8315ccda1da6186/consumer-audit-trail.webp\" alt=\"Customer-audit-trail\"></a></p>\n<p>Some of the customer retention strategies  are listed below:</p>\n<ul>\n<li>Identifying the factors behind customer churn</li>\n</ul>\n<p>Knowing why your customers are  discontinuing the products and services being offered by your company can guide you about the exact gaps you need to work on. For instance, many people have shifted to online shopping in the current times. This information can guide you about the changes necessary to make your services and products more suitable for both online and offline customers alike.</p>\n<ul>\n<li>Seeking customer feedback</li>\n</ul>\n<p><a href=\"https://www.arcjournals.org/pdfs/ijmsr/v3-i2/6.pdf\">Research</a> highlights that customer satisfaction can independently account for as high as 71.7% variability in  customer retention. Customer feedback can help you examine the potential match between their expectations and your company's services. Any mismatch between these can be easily identified by actively seeking and evaluating customer-generated feedback to improve your services and products.</p>\n<p>Additionally, identifying the emotional values that the customers associate with your services can guide you in understanding their perspectives and expectations better, and using this understanding in business can help you increase customers.</p>\n<ul>\n<li>Setting clear goals</li>\n</ul>\n<p>It is common for customers to have generalized expectations from the market. However, it becomes impossible for companies to fulfill these expectations; thus, setting out your goals in advance will help your customers understand your services better. This will also improve your services' trust and inspire them to stay loyal to your business in the  long term. Goals in terms of quantity and quality of service that an organization seeks to fulfill can guide consumers to buy from you.</p>\n<ul>\n<li>Offering discounts and other benefits</li>\n</ul>\n<p>People are constantly engaging in comparisons between the diverse range of services and products companies offer them. This has become more common in the age of <a href=\"https://www.loginradius.com/blog/identity/2020/02/what-is-social-login/\">social login</a>, which makes it very easy for them to compare with other brands without having to step out of their houses. Even when a brand offers a decent amount of discount, people may still want to compare the offers  with other brands in the market. Thus, you must understand the trends that are being followed by your competitors so that you can update yours accordingly.</p>\n<ul>\n<li>Rewarding the loyal customers</li>\n</ul>\n<p>Rewards are not just a product for the customers as there's a high chance that they will attach some value to the rewards provided by your company. This association between rewards and your company would increase your brand's reputation. Rewards can be of many forms; for instance, a customer who has been engaged with the company for a particular number of years can be offered a discount for their next purchase from your company. This can increase their motivation to continue buying from your company and recommend it to their friends.</p>\n<ul>\n<li>Customer-oriented marketing</li>\n</ul>\n<p>A customer-oriented marketing strategy has gained importance over the years because it focuses on the principles of communication, trust, and mutual prosperity. Writing weekly newsletters is an excellent example of <a href=\"https://www.loginradius.com/blog/fuel/2021/02/importance-customer-onboarding/\">customer-oriented marketing</a>. Such small initiatives from the organization can motivate the consumers to trust your brand more than the other brands that lack effective communication. This is because these initiatives would allow you to put customer service in the spotlight and not just the one-way delivery of products and services to them.</p>\n<ul>\n<li>Training the consumer retention team</li>\n</ul>\n<p>The training and development programs specifically designed to improve customer retention can be increasingly useful for your company. They can help the team members understand the key elements in the process. The skill-building programs for training the team members can also prepare them for diverse consumer attitudes and demands. For instance, soft-skills training can be offered to the employees to help them communicate with the customers more effectively.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Customer acquisition and maintenance should not be seen as two mutually exclusive parts of the broader process of business growth. This is because the former can grow the business, while the latter is necessary for its expansion. Retaining the existing customers makes the business more recognizable as it focuses on creating brand loyalty and emotional bonding by prioritizing how the customers feel. Maintaining these customers becomes easy with customer loyalty programs, feedback, understanding customer churn patterns, and customer-oriented marketing.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-customer-retention-can-help-businesses-grow\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 15, 2021","updated_date":null,"description":" Customer retention can be seen as a company's ability to maintain its existing customers by establishing strong relationships with them. Today, more people are planning to invest in start-ups, making it necessary for entrepreneurs to improve customer retention as a top-most goal.","title":"How Customer Retention Can Help Businesses Grow","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/689e783d29c64db86fc5d9b439bdf7c0/58556/customer-retention-LoginRadius-colorized.webp","srcSet":"/static/689e783d29c64db86fc5d9b439bdf7c0/61e93/customer-retention-LoginRadius-colorized.webp 200w,\n/static/689e783d29c64db86fc5d9b439bdf7c0/1f5c5/customer-retention-LoginRadius-colorized.webp 400w,\n/static/689e783d29c64db86fc5d9b439bdf7c0/58556/customer-retention-LoginRadius-colorized.webp 800w,\n/static/689e783d29c64db86fc5d9b439bdf7c0/e30b5/customer-retention-LoginRadius-colorized.webp 1000w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"excerpt":"SDET  stands for Software Development Engineer in Test, QA Engineer, or Testers. On the other hand, it can be a manual tester or Automation…","fields":{"slug":"/engineering/software-development-engineer-in-test/"},"html":"<p><strong>SDET</strong>  stands for Software Development Engineer in Test, QA Engineer, or Testers. On the other hand, it can be a manual tester or Automation Engineer who does not participate in software development. SDET is often involved in developing testing-friendly code that is useful in scripting test cases or designing automation solutions. SDET is also engaged in the design, processes, and functionality level decisions of the software product.</p>\n<blockquote>\n<p>Presently, several organizations, are demanding such SDET professionals who can develop the software and test the software developed.</p>\n</blockquote>\n<p align=\"center\">\n  <img width=\"480\" height=\"480\" src=\"/dd06ad5f3013754ca86b6ecc63447d9f/sdet_role.webp\">\n</p>\n<h2 id=\"what-is-the-difference-between-sdet-and-automation-engineer\" style=\"position:relative;\"><a href=\"#what-is-the-difference-between-sdet-and-automation-engineer\" aria-label=\"what is the difference between sdet and automation engineer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the Difference Between SDET and Automation Engineer?</h2>\n<ul>\n<li>Although the SDETs and QA Automation Engineers required the same expertise in terms of languages and tools like Selenium, Java, and Cucumber, there are still certain differences between the two roles.</li>\n<li>An SDET is a developer-cum-tester who works with the development team as part of the test team. SDETs are responsible not only for testing the application but also for participating in the code. SDETs are responsible for writing the test cases and fix the written code in the Agile lifecycle model. SDETs are professionals who should have very strong technical, analytical, and problem–solving skills. On the other hand, Automation Engineers should know any automation Testing Framework with moderate programming experience as they usually are not exposed to the code.</li>\n<li>SDET is a highly skilled resource from the development as well as testing point of view. On the other hand, Automation Engineers are involved in preparing, scripting, and executing test cases by automation.</li>\n<li>Automation Engineers are skilled resources with programming skills, and they are much responsible for functional or black-box testing. In contrast, SDETs are responsible for performing both black-box and white-box testing as well.</li>\n</ul>\n<blockquote>\n<p>Tester or Quality Analyst who has good programming experience and developed the test automation framework can be promoted to a new role as SDET and can participate in the development cycle, acceptance testing, or unit testing.</p>\n</blockquote>\n<p>Automation Engineers or Quality Analysts are expected for more duties and more <a href=\"https://www.loginradius.com/blog/engineering/challenges_faced_by_qa/\"> QA processing challenges</a> over a general testing role like test planning, test environment setup, test execution, test-data preparation, performance, security testing, developing test automation tools, etc. In contrast, SDET is expected to have the domain knowledge to participate in designing the test cases. </p>\n<h2 id=\"sdets-the-need\" style=\"position:relative;\"><a href=\"#sdets-the-need\" aria-label=\"sdets the need permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SDETs: The need</h2>\n<p>Software Testing is an essential phase in the development cycle, and it takes lots of time and effort. Many other factors help reduce the efforts and timeline, which can be achieved by doing the Code Coverage, Unit Testing, and acceptance testing before delivering software to the QA stage. That's why hiring SDET helps them work for all those factors with the development team or designing the testing framework.</p>\n<p><strong>Benefits of SDET Professional</strong>:</p>\n<ul>\n<li>SDETs play a vital role to minimize the testing cycles by Code Coverage and Unit Tests</li>\n<li>SDETs can work as a standalone team, can build, deploy, run &#x26; manage the application individually</li>\n<li>Programming skills enable them for code coverage through unit testing</li>\n<li>SDETs can automate the acceptance test by leveraging their programming skills</li>\n<li>SDETs involved in the complete software development cycle, so it overall helps them to find out more use-cases and end-user scenarios</li>\n</ul>\n<p><strong>Skill Set</strong>:</p>\n<ul>\n<li>Sound knowledge in Java C#,.NET, or other programming languages.</li>\n<li>Experience in working with Agile and DevOps process management methodology.</li>\n<li>SDET should know various testing techniques, test methods &#x26; corresponding tools like JUnit, TestNG, Selenium WebDriver, etc.</li>\n<li>Should have exposure to both TDD and BDD</li>\n<li>SDET should know Test Planning, writing, and execution of the tests</li>\n<li>Able to find bottlenecks and thresholds in existing code with the help of automation tools.</li>\n</ul>\n<h2 id=\"responsibilities-of-an-sdet\" style=\"position:relative;\"><a href=\"#responsibilities-of-an-sdet\" aria-label=\"responsibilities of an sdet permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Responsibilities of an SDET</h2>\n<ul>\n<li>Set-up a robust and scalable Automation Framework for functional, regression, and performance testing </li>\n<li>Maintain and operate test automation solutions.  </li>\n<li>Building robust and high–quality test automation solutions </li>\n<li>Writing unit test coverage of the code</li>\n<li>Building, customizing, deploying, and managing the test environments</li>\n<li>Checking for product scalability, reliability, consistency, and performance</li>\n<li>Participating in design and architectural discussions</li>\n<li>Performing high-level debugging</li>\n<li>Prepare &#x26; manage test reports and communicate with the team.</li>\n<li>Able to build different test scenarios and acceptance tests.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>SDET is a tester or automation engineer with development experience who has exposure to testing techniques, <a href=\"https://www.loginradius.com/blog/engineering/qa-teams-deliver-quality-software/\">QA testing process</a>, automation frameworks, and software development &#x26; design techniques. SDET builds test automation tools and works with the development team and covers the code by unit tests and ultimately, it results in a quality software delivery</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 12, 2021","updated_date":null,"description":"A brief overview about the upcoming future of software testers and SDETs and the requirement of SDET role and responsibility in 2021.","title":"The Upcoming Future of Software Testers and SDETs in 2021","tags":["SDET","SDET vs Automation Engineer"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/efd3a736529d9ff3983544af7ed77c7e/58556/cover.webp","srcSet":"/static/efd3a736529d9ff3983544af7ed77c7e/61e93/cover.webp 200w,\n/static/efd3a736529d9ff3983544af7ed77c7e/1f5c5/cover.webp 400w,\n/static/efd3a736529d9ff3983544af7ed77c7e/58556/cover.webp 800w,\n/static/efd3a736529d9ff3983544af7ed77c7e/210c1/cover.webp 900w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Pareek","github":"rkpareek","avatar":null}}}},{"node":{"excerpt":"Cloud technology has become the focus of attention for organizations looking to increase productivity, scale up business goals and maintain…","fields":{"slug":"/engineering/effective-cloud-management-platform/"},"html":"<p>Cloud technology has become the focus of attention for organizations looking to increase productivity, scale up business goals and maintain cost-efficiency.</p>\n<p>Its regular optimization and security processes help match organizational targets with the added benefits of improved flexibility and accessibility, qualities bound to continue gaining focus in the future or work.</p>\n<p>As with any information technology, cloud computing involves the risks of reduced performance, lack of reliability, and environmental unsustainability if proper controls are not set in place. That’s where <a href=\"https://www.g2.com/categories/cloud-management-platforms\">cloud management platforms</a> come in. </p>\n<h2 id=\"what-is-cloud-management\" style=\"position:relative;\"><a href=\"#what-is-cloud-management\" aria-label=\"what is cloud management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is cloud management?</h2>\n<p>Cloud management refers to the management of all cloud infrastructure such as hardware, virtualized software, storage components, and networking servers. The control of resources and assets is employed for public, private, and hybrid cloud infrastructures.</p>\n<p>Some well-known cloud infrastructures that you may be familiar with include software-as-a-service (SaaS), Infrastructure-as-a-service (IaaS), and Platform-as-a-service (PaaS). Google Drive is another popular favorite that manages your data through cloud storage.</p>\n<p>Typically, cloud management consists of:</p>\n<ul>\n<li>Cloud migration, automation, and configuration</li>\n<li>Internal and external cloud security services</li>\n<li>Risk assessment and threat analysis</li>\n<li>Monitoring performance through set metrics</li>\n<li>Cost management </li>\n</ul>\n<p>Cloud management enables self-service measures for improved flexibility where IT specialists can access cloud-based resources, track usage, and allocate resources.</p>\n<p>With remote teams entering the new era of the workforce, cloud management services (CMS) can automate workflows, assist with <a href=\"https://www.g2.com/categories/remote-desktop\">remote desktop software</a>, and secure data with greater compliance.</p>\n<p>Cloud management also includes cloud analysis which helps monitor workloads and user experiences. Depending on the size and complexity of business requirements, they can manage cloud services for testing performance, backup options, recovery systems, and monitoring logs.</p>\n<h2 id=\"why-is-cloud-management-important\" style=\"position:relative;\"><a href=\"#why-is-cloud-management-important\" aria-label=\"why is cloud management important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is cloud management important?</h2>\n<p>Since the last year, most businesses have managed their resources and operations with the cloud through <a href=\"https://www.g2.com/categories/cloud-migration\">cloud migration</a>. This shift will continue to rise soon, with companies adapting to grow their performance and revenue by automating operations and processes.</p>\n<p>Cloud management platforms are an integral part of managing cloud resources and infrastructure. Here’s how they help in business operations.</p>\n<p>Cloud management is the best approach to adhere to cloud optimization practices. It heavily cuts down on user chargeback and billing costs since it essentially acts as a guide to navigating between different vendor pricing models. Cost efficiency is also maintained by choosing the right size of cloud applications for your business.</p>\n<p>One of the significant goals of cloud management is also to improve application performance through relevant tools and cloud architecture by reducing energy consumption. </p>\n<p>In a nutshell, CMS allows businesses to gain more control over their public cloud environments while minimizing costs, increasing security, and using expert knowledge to promote user efficiency with little to no human assistance.</p>\n<h2 id=\"how-do-cloud-management-platforms-help\" style=\"position:relative;\"><a href=\"#how-do-cloud-management-platforms-help\" aria-label=\"how do cloud management platforms help permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How do cloud management platforms help?</h2>\n<p>A cloud management platform (CMP) or cloud management tool is software that incorporates a collection of features or modules that allow various cloud environments to be controlled. Cloud management platforms are significant because a simple virtualization management console cannot control public, private, and hybrid clouds at once.</p>\n<p>To maximize resources and service usage, businesses should adopt cloud management platforms to optimize invested cloud infrastructure. </p>\n<h2 id=\"key-features-of-cloud-management-platforms\" style=\"position:relative;\"><a href=\"#key-features-of-cloud-management-platforms\" aria-label=\"key features of cloud management platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key features of cloud management platforms</h2>\n<p>CMPs are tools that sit above cloud platforms such as IaaS (Infrastructure as a Service), SaaS (Software as a Service), and PaaS (Platform as a Service). They can quickly gather business tools, processes, and technologies, to promote cloud environment management. </p>\n<ol>\n<li><strong>Self-service management:</strong>\nCloud management platforms support managing cloud resources and assets through self-service. This essentially means that organizations can provide resources for themselves without using a predetermined amount. CMPs help decides if the resource allocation is in sync with the cloud environment requirements.</li>\n<li><strong>Task automation:</strong>\nOrganizational productivity depends on reducing challenging tasks and eliminating the chances of duplicity and error to manage tasks efficiently. Cloud management platforms can automate repeatable tasks through different architectures and policies.</li>\n<li><strong>Reduced cloud costs:</strong>\nManaging expenses of cloud resources and infrastructure is necessary to maintain the financial health of a company. Cloud management platforms are built to monitor resource expenditure to help you track exactly where and how funds are being spent. This dramatically reduces unnecessary operational costs. </li>\n<li><strong>Easy cloud governance:</strong>\nWith the cloud, a single piece of data can be accessible to anyone if there is a lack of constant data checks; Cloud management platforms can simplify this governance through all security levels. They enable an environment that creates and implements required policies and compliances. This provides added control over assets and access. </li>\n</ol>\n<h2 id=\"better-management-equals-better-performance\" style=\"position:relative;\"><a href=\"#better-management-equals-better-performance\" aria-label=\"better management equals better performance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Better management equals better performance</h2>\n<p>Managing your cloud services is a great way to manage several infrastructures at once. Using cloud management platforms makes this even simpler by giving you a one-stop-shop for all your operational, financial, storage, and privacy needs for cloud environments.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 10, 2021","updated_date":null,"description":"Cloud management platforms are an integral part of managing cloud resources and infrastructure. They are a real asset, especially for a modern and remote workforce. Here’s how they help in business operations.","title":"Why You Need an Effective Cloud Management Platform","tags":["Cloud","Cloud Management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/7b9ebd4eb272d99fb0d02d48dbb4ebb0/a3e81/cover.webp","srcSet":"/static/7b9ebd4eb272d99fb0d02d48dbb4ebb0/61e93/cover.webp 200w,\n/static/7b9ebd4eb272d99fb0d02d48dbb4ebb0/1f5c5/cover.webp 400w,\n/static/7b9ebd4eb272d99fb0d02d48dbb4ebb0/a3e81/cover.webp 512w","sizes":"(max-width: 512px) 100vw, 512px"}}},"author":{"id":"Aayushi Sanghavi","github":null,"avatar":null}}}},{"node":{"excerpt":"Adaptive Authentication (also known as Risk-based Authentication) is a method to send notifications or prompt the consumers to complete an…","fields":{"slug":"/engineering/what-is-adaptive-authentication/"},"html":"<p>Adaptive Authentication (also known as Risk-based Authentication) is a method to send notifications or prompt the consumers to complete an additional step(s) to verify their identities when the authentication request is deemed malicious according to your organization's security policy. It allows users to log in using a username and password without presenting any additional authentication barrier while providing a security layer whenever a malicious attempt is made to access the system. </p>\n<h2 id=\"malicious-attempt-factors\" style=\"position:relative;\"><a href=\"#malicious-attempt-factors\" aria-label=\"malicious attempt factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Malicious Attempt Factors</h2>\n<p>Adaptive Authentication analyzes the user interaction with your application and intelligently builds a risk profile based on the consumer behavior or your organization's security policy. The system creates a user. You can define the risk factors in one of the following ways:</p>\n<h3 id=\"pre-defined-factors\" style=\"position:relative;\"><a href=\"#pre-defined-factors\" aria-label=\"pre defined factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pre-defined Factors</h3>\n<p>You can define one or more risk factors based on your business requirements: </p>\n<p><strong>User Role:</strong> The employees with higher user roles in the system can perform sensitive actions; hence, you can ask them to perform additional steps to complete the authentication. The employees with lower user roles pose a lower security risk and can log in with usernames and passwords for a frictionless user experience.\nAccessing sensitive resource: You can also ask the employees to perform additional authentication steps when they try to access a sensitive resource like financial statements, </p>\n<p><strong>Perform sensitive actions:</strong> If the employees are trying to perform sensitive actions like edit or delete actions on the sensitive information, they can be asked to verify the identity with additional steps. </p>\n<p><strong>Location:</strong> The employees are trying to login into a system using a public network instead of the office network. </p>\n<p><strong>Device:</strong> If employees use their personal laptop instead of using a company-issued laptop. </p>\n<h3 id=\"dynamic-factors\" style=\"position:relative;\"><a href=\"#dynamic-factors\" aria-label=\"dynamic factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Dynamic Factors</h3>\n<p>Most systems build a risk profile based on a consumer's recent interaction with your applications. The system generally leverages machine learning to create this profile on the fly. Here are the common risk factors: </p>\n<p><strong>Country:</strong> The system can trigger actions and notifications if the consumer is logged in from a different country. e.g., If the consumers travel outside of their country of residence and try to access the system, some financial instructions like credit card companies block the access for the consumers to the system. These companies require you to inform the companies before leaving the country to whitelist the country for your account in the system. </p>\n<p><strong>City:</strong> If the consumer has logged in from a different city than he usually logs in from, it will trigger Adaptive Authentication. Once the consumer completes the Adaptive Authentication for the new city, the city can be added to the system for future Logins without the Adaptive Authentication. </p>\n<p><strong>Device:</strong> If the consumer tries to login in from a new device, the request will be flagged as malicious under the Adaptive Authentication. Once the consumer completes the Adaptive Authentication for the new device, the city can be added to the system for future Login without Adaptive Authentication. </p>\n<p><strong>Browser:</strong> If the consumer was logging from the Chrome browser and suddenly tries to log in from the Firefox browser, the authentication attempt will be deemed malicious and trigger the Adaptive Authentication. Once the consumer completes the Adaptive Authentication step, it will whitelist the browser for future authentication attempts for the consumer account.</p>\n<h3 id=\"combination-of-factors\" style=\"position:relative;\"><a href=\"#combination-of-factors\" aria-label=\"combination of factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Combination of Factors</h3>\n<p>You can also combine the Pre-defined factors (as mentioned above) and Dynamic factors to trigger the Adaptive Authentication.</p>\n<h2 id=\"how-does-adaptive-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-adaptive-authentication-work\" aria-label=\"how does adaptive authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does adaptive authentication work?</h2>\n<p>Whenever an authentication request is deemed as a malicious attempt based on the risk factors defined for your application, it can trigger one or more of the following actions  according to your business requirements:</p>\n<p><strong>Email Notification:</strong> An email is sent to notify the consumer about the authentication request. If the consumer found the authentication request malicious, they can inform the company to take appropriate actions. </p>\n<p><strong>SMS Notification:</strong> An SMS is sent to the consumer's phone numbers to notify the consumer about the authentication request. It gives an advantage as the consumer checks the SMS more frequently than email, or the consumer might not have access to the email all the time. If the consumer found the authentication request malicious, they can inform the company to take appropriate actions. </p>\n<p><strong>Multi-Factor Authentication:</strong> The consumer is asked to verify the identity with the second factor of authentication. This factor can be configured in many ways as per your business requirements. Please see my blog on <a href=\"https://www.loginradius.com/blog/engineering/why-mfa-important/\">Multi-factor Authentication</a> for more details.</p>\n<p><strong>Blocking User Access:</strong> The account is blocked immediately for further login attempts once specific risk criteria have been met. The consumer needs to contact the company to unblock the access. </p>\n<p><strong>Security Questions:</strong> This forces the consumer to answer one or more security questions before authenticating the request.</p>\n<p><strong>Push authentication:</strong> User authentication is accomplished by delivering a push notification to a secure application on the user's device.</p>\n<p><strong>FIDO U2F tokens:</strong> FIDO U2F tokens allow users to utilise a single device to access any website or online service that supports the FIDO U2F protocol.</p>\n<h2 id=\"benefits-of-adaptive-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-adaptive-authentication\" aria-label=\"benefits of adaptive authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Adaptive Authentication</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">Multifactor authentication</a> creates a longer authentication process for the consumers, which causes lower consumer conversation at your application. Adaptive Authentication only triggers an elevated-risk situation while keeping the frictionless authentication process in place for normal conditions. </p>\n<p>You can configure actions based on the severity of the risk factors like if the consumer normally logs into your system from Vancouver and they make an authentication request to access the application from Cancun, this is an elevated-risk situation and you might want to block the account instead of sending the notification to the consumer. </p>\n<p>Adaptive Authentication is evolving as Machine learning can add more risk factors by studying consumer behavior over the period. Hence, it provides an updated layer of security against fraudulent attempts. </p>\n<p>Adaptive authentication is getting popular as it provides frictionless authentication for consumers while preventing fraudulent attempts to access the system. </p>\n<p>LoginRadius provides Adaptive Authentication to its customers to assist their businesses. Please see <a href=\"https://www.loginradius.com/docs/api/v2/admin-console/platform-security/risk-based-auth/\">Risk-Based Authentication</a> Document for more information on the LoginRadius Adaptive Authentication. </p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 09, 2021","updated_date":null,"description":"Adaptive Authentication intelligently identifies malicious attempt based on the defined risk factors and prompt the consumers to complete an additional step to verify their identities","title":"What is Adaptive Authentication or Risk-based Authentication?","tags":["Adaptive Authentication","Risk-based Authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.550387596899225,"src":"/static/c3ea768927bb2fea7249500bd3254e01/58556/adaptive-authentication.webp","srcSet":"/static/c3ea768927bb2fea7249500bd3254e01/61e93/adaptive-authentication.webp 200w,\n/static/c3ea768927bb2fea7249500bd3254e01/1f5c5/adaptive-authentication.webp 400w,\n/static/c3ea768927bb2fea7249500bd3254e01/58556/adaptive-authentication.webp 800w,\n/static/c3ea768927bb2fea7249500bd3254e01/bfa91/adaptive-authentication.webp 1071w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Jitender Agarwal","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Utility companies hold a unique position because of their huge user base and the massive amount of data they collect. This…","fields":{"slug":"/identity/ciam-addresses-utility-issues/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Utility companies hold a unique position because of their huge user base and the massive amount of data they collect. This allows them to provide a greater value than other companies. However, if the company uses an incompetent Consumer Identity and Access Management (CIAM) system, it may be susceptible to service outages and data breaches. </p>\n<p>Implementing a good CIAM can help utility companies steer clear of issues such as inefficient troubleshooting and vulnerability to cyberattacks. To find out how read on.</p>\n<h2 id=\"5-most-popular-issues-of-the-utility-industry-that-ciam-solves\" style=\"position:relative;\"><a href=\"#5-most-popular-issues-of-the-utility-industry-that-ciam-solves\" aria-label=\"5 most popular issues of the utility industry that ciam solves permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Most Popular Issues Of The Utility Industry That CIAM Solves</h2>\n<h3 id=\"1-solve-consumer-control-and-utilization-issues-easily-with-a-secure-dashboard\" style=\"position:relative;\"><a href=\"#1-solve-consumer-control-and-utilization-issues-easily-with-a-secure-dashboard\" aria-label=\"1 solve consumer control and utilization issues easily with a secure dashboard permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Solve consumer control and utilization issues easily with a secure dashboard.</h3>\n<p>A large number of utility companies often have a poorly constructed dashboard without any user management system. This might increase the number of service interruptions and the time taken to resolve them.</p>\n<p>Users would also be affected in real-time with issues big and small, from power outages to password resets. A centralized dashboard can help do away with these problems. It might even show a correlation between two data streams which would otherwise be thought of as unrelated. </p>\n<p>A good CIAM in utility sector system would even show which consumers have logged in along with their locations. Another feature of a high-quality product would be the ability to provide visual representations of data. An example would be providing a heat map of logins along with a unique customer identification number/feature.</p>\n<h4 id=\"importance-of-password-efficiency\" style=\"position:relative;\"><a href=\"#importance-of-password-efficiency\" aria-label=\"importance of password efficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Importance of Password Efficiency:</h4>\n<p>Changing passwords frequently is a good practice to avoid cyberattacks. However, without a well-functioning process to reset passwords, changing them often would be a tedious process. </p>\n<p>A dashboard would allow administrators to create a password reset page that can be customized as per the business needs.</p>\n<h3 id=\"2-understanding-consumers\" style=\"position:relative;\"><a href=\"#2-understanding-consumers\" aria-label=\"2 understanding consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Understanding consumers</h3>\n<p>A lot of utility companies require a good customer retention percentage—since the nature of their business is recurring and net revenue is dependent on how many times a consumer has used the service. Therefore, to retain consumers, it is vital to understand their needs. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">CIAM</a> in utility sector can help understand consumers better by incorporating data on their logins, devices, utility usage, and even <a href=\"https://www.loginradius.com/progressive-profiling/\">progressive profiling</a>. </p>\n<p>Progressive profiling is a method used to systematically build up a consumer's profile each time they interact with the utility company's website. This method can help organizations find out problems faced by consumers and improve their services. It can also help create new services and boost engagement. </p>\n<h3 id=\"3-consolidation-of-consumer-data\" style=\"position:relative;\"><a href=\"#3-consolidation-of-consumer-data\" aria-label=\"3 consolidation of consumer data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Consolidation of consumer data</h3>\n<p>As new technologies and energy sources emerge, the utility industry will go through some major shifts, such as creating a majorly mobile workforce, a reduction of infrastructure by using cloud-based services, etc.  Companies that implement a CIAM system will avoid costly mistakes and build long-lasting relationships with their consumers.</p>\n<h3 id=\"4-fast-access-provisioning-and-deprovisioning-from-a-centralized-portal\" style=\"position:relative;\"><a href=\"#4-fast-access-provisioning-and-deprovisioning-from-a-centralized-portal\" aria-label=\"4 fast access provisioning and deprovisioning from a centralized portal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Fast access provisioning and deprovisioning from a centralized portal</h3>\n<p>A CIAM in utility sector comes with a centralized portal that allows the administrators to control access quickly and easily - user accounts can be created, updated, or deleted from a central portal (i.e., provisioning and deprovisioning). This would, in turn, allow IT personnel to concentrate on critical tasks. </p>\n<h3 id=\"5-safe-high-risk-networks-and-database-access-procedures\" style=\"position:relative;\"><a href=\"#5-safe-high-risk-networks-and-database-access-procedures\" aria-label=\"5 safe high risk networks and database access procedures permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Safe high-risk networks and database access procedures</h3>\n<p>A good <strong>CIAM in utility sector</strong> would have protocols and procedures (such as <a href=\"https://www.loginradius.com/protocols/\">SSO protocols</a> including SAML, OAuth, JWT, OpenID, Delegation, and Multipass) when a user is accessing high-risk networks and databases. It also comes with NGFW, next-generation firewalls, which provide application-level security against cyber attacks.</p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\"><img src=\"/f91644b068ec78e0acdb60c2a9d83004/LoginRadius-Single-Sign-on.webp\" alt=\"SSO-loginradius\"></a></p>\n<h2 id=\"the-loginradius-ciam-in-utility-sector\" style=\"position:relative;\"><a href=\"#the-loginradius-ciam-in-utility-sector\" aria-label=\"the loginradius ciam in utility sector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The LoginRadius CIAM In Utility Sector</h2>\n<p>LoginRadius is a cloud-based SaaS Consumer Identity Access Management platform that comes with competitive features. They include user management, privacy compliances, data, and user security, account security, and privacy compliances with a provision for scalability.  </p>\n<p>Here’s how the <strong>LoginRadius CIAM in utility sector</strong> provides its solutions. </p>\n<p><strong>1. It enables one digital identity across all consumer services.</strong></p>\n<p>Due to the ever-evolving nature of the digital landscape, it has become almost mandatory to provide a seamless consumer experience where the consumer can self-serve without human intervention. </p>\n<p>With LoginRadius’ CIAM platform, utility companies can centralize all consumer-facing applications into one single portal. </p>\n<p>Some of the applications that LoginRadius has supported in previous implementations are account summaries, customer profiles, billing histories, bill payments, etc. Many companies have significantly reduced the number of manual processes handled by the consumer service team by implementing the solution</p>\n<p><strong>2. It centralizes and secures data.</strong></p>\n<p>Utility companies often have their consumer information, such as email addresses, phone numbers, etc., stored in multiple databases because they provide various services using different backend applications. This is not an efficient way to store data because it affects the company's productivity and the consumer experience.</p>\n<p>Also, having multiple databases increases the risk of a security breach since the company would have to implement various protocols across all of these databases. </p>\n<p>The LoginRadius <strong>CIAM in utility sector</strong> solution consolidates data into one platform, which effectively eliminates data silos. It also comes with the latest hashing algorithms, encryption-at- rest, etc. </p>\n<p><strong>3. It integrates data and identity with third-party applications.</strong></p>\n<p>Consumer data is valuable in driving business decisions and providing better services for customers’ problems. </p>\n<p>With the <strong>LoginRadius</strong> <strong>CIAM in utility sector</strong> solution, businesses can <a href=\"https://www.loginradius.com/cloud-integrations/\">integrate consumer data with third-party applications</a>. This solution comes with over 100 pre-built integrations allowing data flow in real-time. </p>\n<p><strong>4. It simplifies consumer management.</strong></p>\n<p>The LoginRadius CIAM in utility sector solution offers many user management capabilities, which allow the consumer service staff (of the organization implementing the solution) to view all of the data relating to an individual customer in the dashboard. </p>\n<p>Consumers can request changes in their profiles (such as an update to their residential address), and the admin can simultaneously make the desired changes using the LoginRadius CIAM solution.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With hackers getting smarter every day, companies need to implement stringent protocols like the <a href=\"https://www.loginradius.com/blog/identity/2019/09/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a>, especially if the said companies fall into the utility sector. This is because such companies often handle massive amounts of user data.</p>\n<p>If this data is compromised, it would be a massive loss to the company's reputation, eventually leading to financial losses as users might withdraw from using their services. In extreme cases, the company might even go bankrupt! Implementing a CIAM in utility sector solution can prevent this from happening and make the consumer experience better!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=ciam-addresses-utility-issues\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 09, 2021","updated_date":null,"description":"A lot of utility companies require a good customer retention percentage—since the nature of their business is recurring and net revenue is dependent on how many times a consumer has used the service. Therefore, to retain consumers, it is vital to understand their needs.","title":"How CIAM Will Address The 5 Most Popular Issues In The Utility Industry","tags":["ciam solution","compliance","cx","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/daa7e388cf6169ff84d8b17d89d60332/7f8e9/ciam-utility.webp","srcSet":"/static/daa7e388cf6169ff84d8b17d89d60332/61e93/ciam-utility.webp 200w,\n/static/daa7e388cf6169ff84d8b17d89d60332/1f5c5/ciam-utility.webp 400w,\n/static/daa7e388cf6169ff84d8b17d89d60332/7f8e9/ciam-utility.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":570,"currentPage":96,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}